fifothekid asked:

This attack targets the client by making an access point with the same attributes as the one which is stored in the WIFI settings of the OS Note that I had to keep on disconnecting the fake AP in order to force the client in to rejoining the network as the packet flow stops if I don’t do that This happens even if the firewall is disabled on the client Perhaps setting up a DHCP server can solve this problem This will be tested in the future For more information, please check the following link:

Tagged with →  
Share →

2 Responses to Backtrack Series – 7: Cracking AP-less WEP Protected Network Using Hirte Attack

  1. hellomoromios says:

    A method with low data injection (#/sec)

  2. Vivi88Vivi88Vivi88 says:

    Hirte and Caffe Latte has been exchanged..

    BTW, thanks for those videos 🙂

Leave a Reply

Your email address will not be published. Required fields are marked *

Looking for something?

Use the form below to search the site:

Still not finding what you're looking for? Drop us a note so we can take care of it!

Set your Twitter account name in your settings to use the TwitterBar Section.