Evil hacker Nikolai is aware that his target and user are compatible with both WPA2 and WPA3 encryption mechanisms. He sets up a rogue access point that only supports WPA2 and forces the victim to go through the WPA2 four-way handshake to establish a connection. Once the connection is made, Nikolai intends to use automated tools to crack WPA2-encrypted messages. Which attack is Nikolai attempting to perform?