This is a dedicated watch page for a single video.
An attacker detected that both a user and an access point support both WPA2 and WPA3 encryption. Exploiting this, the attacker deployed a rogue access point with exclusive WPA2 compatibility in the vicinity. The victim was compelled to undergo the WPA2 four-way handshake during the connection process. Subsequently, the attacker utilized automated tools to crack WPA2-encrypted messages. What is the specific attack executed in the above scenario?