As a penetration tester, you have been tasked to assess the security of a company's wireless infrastructure. You decide to simulate an evil twin attack to test the network's resilience to credential theft. Which tool would you use to create a rogue access point that replicates the company's WPA2-Enterprise network in order to capture employee credentials?
Implement Kismet for network detection and packet sniffing on the target wireless network.
Use EAPHammer to create the rogue access point and facilitate the attack to capture credentials.
Utilize Aircrack-ng to crack the WPA2 password and gain unauthorized access to sensitive information.
Deploy mdk4 to conduct a denial-of-service attack on the network, effectively disrupting the wireless services.