上一页 1 ··· 38 39 40 41 42 43 44 45 46 ··· 57 下一页
摘要: Nmap Nmap is a network discovery tool that can be used to gather detailed information about any client or network. We shall have a look at some of its 阅读全文
posted @ 2019-11-25 22:50 晨风_Eric 阅读(111) 评论(0) 推荐(0)
摘要: Post Connection Attacks Sophisticated attacks that can be used after connecting to the target AP. Gathering Information Now that we are connected to a 阅读全文
posted @ 2019-11-25 22:10 晨风_Eric 阅读(145) 评论(0) 推荐(0)
摘要: Securing your Network From the Above Attacks. Now that we know how to test the security of all known wireless encryption(WEP/WPA/WPA2), it is relative 阅读全文
posted @ 2019-11-24 18:55 晨风_Eric 阅读(152) 评论(0) 推荐(0)
摘要: WPA Craking WPA was designed to address the issues in WEP and provide better encryption. The main issue in WEP is the short IV which means that they c 阅读全文
posted @ 2019-11-24 18:18 晨风_Eric 阅读(379) 评论(0) 推荐(0)
摘要: WEP Cracking Packet Injection What if the AP was idle, or had no clients associated with it? In this case, we have to inject packets into the traffic 阅读全文
posted @ 2019-11-14 23:14 晨风_Eric 阅读(118) 评论(0) 推荐(0)
摘要: WEP Cracking Basic case Run airdump-ng to log all traffic from the target network. At the same time, we shall use aircrack-ng to try and crack the key 阅读全文
posted @ 2019-11-11 22:59 晨风_Eric 阅读(400) 评论(0) 推荐(0)
摘要: Gaining Access to encrypted networks Three main encryption types: 1. WEP 2.WPA 3.WPA2 WEP Cracking WEP is old encryption, but it is still used in some 阅读全文
posted @ 2019-11-10 20:49 晨风_Eric 阅读(420) 评论(0) 推荐(0)
摘要: Creating a fake access point (honeypot) Fake access points can be handy in many scenarios, one example is creating an open AP, this will attract a lot 阅读全文
posted @ 2019-11-10 11:38 晨风_Eric 阅读(241) 评论(0) 推荐(0)
摘要: Deauthentication Attacks Theory This attack is used to disconnect any device from any network within our range even if the network is protected with a 阅读全文
posted @ 2019-11-09 18:19 晨风_Eric 阅读(125) 评论(0) 推荐(0)
摘要: Targeted packet sniffing Now all the data will be stored in the file name specified after the -write option. We can analyze this data using Wireshark. 阅读全文
posted @ 2019-11-09 17:55 晨风_Eric 阅读(123) 评论(0) 推荐(0)
上一页 1 ··· 38 39 40 41 42 43 44 45 46 ··· 57 下一页