Sandra, a wireless network auditor, discovered her client is using WEP. To prove the point that the WEP encryption is very weak, she wants to decrypt some WEP packets. She successfully captured the WEP data packets, but could not reach the content as the data is encrypted.
Which of the following will help Sandra decrypt the data packets without knowing the key?
A . Fragmentation Attack
B . Chopchop Attack
C . ARP Poisoning Attack
D . Packet injection Attack
Answer: B