ethical-hacker video for boris, a professional hacker, wanted to check whether the target AP is in a locked state. He attempted using different tools and
Boris, a professional hacker, wanted to check whether the target AP is in a locked state. He attempted using different tools and techniques to identify WPS-enabled APs in the targeted wireless network. Ultimately, he succeeded with one special command-line tool. Which of the following command-line tools allowed Boris to discover the WPS-enabled APs?