![]() ![]() If the process sounds really time consuming to you, then its because it is. Now if the hashes match, we know what plain text password gave rise to the hash, thus we know the password. Then we'll match the hash we created with the one that's there in the handshake. We can take all possible passwords that can exists, and convert them to hash. Now there's no direct way of getting the password out of the hash, and thus hashing is a robust protection method. This handshake has the hash of the password. What happens is when the client and access point communicate in order to authenticate the client, they have a 4 way handshake that we can capture. What you need is you, the attacker, a client who'll connect to the wireless network, and the wireless access point.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |