John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

Which of the following tools is John using to crack the wireless encryption keys?
Lindy
4 months agoCiara
4 months agoTula
4 months agoHenriette
4 months agoDominga
5 months agoSharika
5 months agoKristeen
5 months agoGwenn
5 months agoFabiola
5 months agoCandra
5 months agoLuann
5 months agoArlene
5 months ago