The most vulnerable thing (unless you're doing client exploitation) is the secure hash that's revealed when a client authenticates to the network. You can literally get the key with just some packet sniffing. If you make a kali linux live USB and boot it, both of those come preinstalled. Best tools IMO are aircrack suite plus hashcat. Modern network protocols have pretty decent security, barring human error. If you want to break into a network that you don't have the password to in any form, you're gonna need something a lot better than just cmd.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |