ethical-hacker video for an attacker employs a Wi-Fi Pineapple to create a deceptive access point with an authentic-looking SSID associated with a nearby
An attacker employs a Wi-Fi Pineapple to create a deceptive access point with an authentic-looking SSID associated with a nearby business, intending to capture the wireless password. What type of attack is being executed in this scenario?