John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

Which of the following tools is John using to crack the wireless encryption keys?
Lindy
5 months agoCiara
6 months agoTula
6 months agoHenriette
6 months agoDominga
6 months agoSharika
6 months agoKristeen
6 months agoGwenn
6 months agoFabiola
6 months agoCandra
6 months agoLuann
6 months agoArlene
6 months ago