A penetration tester has successfully deployed an evil twin and is starting to see some victim traffic. The next step the penetration tester wants to take is to capture all the victim web traffic unencrypted.
Which of the following would BEST meet this goal?
A . Perform an HTTP downgrade attack.
B . Harvest the user credentials to decrypt traffic.
C . Perform an MITM attack.
D . Implement a CA attack by impersonating trusted CAs.
Answer: A