fifothekid asked:
This attack can be used on a network that has at least one active client This video is based on: forums.remote-exploit.org
Advertisement
This attack can be used on a network that has at least one active client This video is based on: forums.remote-exploit.org
Use the form below to search the site:
Still not finding what you're looking for? Drop us a note so we can take care of it!
A few highly recommended friends...
All entries, chronologically...
Excellent, currently making my own program to do this on.
nice tutorial man helped me out alot! thanks 4 th1s
Dude, can you add voice or bigger text please.
Nevermind, I followed the link in the description, and all my questions were answered. Thanks for making the video!
So, what’s the difference between a BSSID, and a client?
They both look like MAC addresses to me, but why would a router have two MAC addresses?
Also, how did you find the address you entered for client? You did it a little too fast for me to see.
It’s a matter of trial and error
collect a maiximum of 50,00
Try 64 bit
If it doesn’t work, try 128 bit
If it doesn’t work, then there’s a program that filters the fake IVs from the capture files, I don’t remember it’s name now
How can you find the bit-strength of the key?
I know they are supposed to be 64,128,..
But is there a way to find this?