an attacker is trying to compromise a wireless network that has been secured using wpa2-psk and aes. she first tried using airsnort to capture packets, but found that she couldn't break the encryption. as an alternative, she used software to configure her laptop to function as an access point. she configured the fake access point with the same ssid as the wireless network she is trying to break into. when wireless clients connect to her access point, she presents them with a web page that asks them to enter the wpa2 passphrase. when they do, she uses the password to connect a wireless client to the real access point. which attack techniques did the attacker use in this scenario? smurf pharming evil twin denial of service man-in-the-middle