fifothekid asked:

For more information, please visit: forums.remote-exploit.org

Advertisement
Tagged with →  
Share →

7 Responses to Backtrack Series – 9: Cracking AP-less WPA Protected Network Using Rogue AP

  1. theinvictus1 says:

    but you still have to use a dictionary attack? it’s just local and faster now? what if the password isn’t a dictionary word?

  2. KeybladerAlf says:

    Good job..i think the same with @falthas how can you control what ap is the right ap for the victim

  3. fifothekid says:

    @brianleong3099 you can find the text on the forum

  4. brianleong3099 says:

    please make your font bigger. we can’t read

  5. falthas says:

    And how you force the client to reconnect to your SoftAP since there suddenly will be 2 AP’s with the same name and the original one will probably have better reception on the victim’s side?

  6. maigpl2 says:

    thanks for a great tutorial, however after getting handshake and running aircrack-ng -r testdb -e essid capture-01.cap I am getting: SQL error: no such table: pmk…
    I am quite new to linux, tried to search forum but had no luck….
    would be grateful for any suggestions(bt4 pre installed on virtualbox, tried live cd as well same error)
    thanks

  7. LarsX2 says:

    In fact, -W 1 is supposed to specify the WEP flag since it is needed for wep/wpa.

    Nice Collection of Videos.

Leave a Reply

Your email address will not be published. Required fields are marked *

* Copy This Password *

* Type Or Paste Password Here *

Looking for something?

Use the form below to search the site:


Still not finding what you're looking for? Drop us a note so we can take care of it!

Set your Twitter account name in your settings to use the TwitterBar Section.