Replies: 1 comment
-
To recover a PSK, hashcat and JtR need this information:
Usually you get this information if you capture a 4way handshake and at least one management frame that contain the ESSID. In case a an EAPOL M1M2 ROGUE attack hcxdumptool takes on the task of the AP |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I've got a + in 2, which should mean that a rogue ap attack was done successfully. I'm curious about its working. May i request you to fully explain the working of rogue ap/client attack of Hcxdumptool?
Beta Was this translation helpful? Give feedback.
All reactions