Jump to content

brook

Active Members
  • Posts

    4
  • Joined

  • Last visited

Posts posted by brook

  1. It'll support WPA -- you can totally spoof WPA protected access points. All you have to do is change the SSID to that of the WPA protected network you're mimicking and set your MK5 up with the same password*

    * it's this last bit that's could be an issue. Check with your client and see if they'll authorize a release of the PSK for your pentest.

    ** Reaver may be useful in figuring out the PSK if your client doesn't have it handy.

    *** Of course only for use in an authorized audit.

    Thanks Darren

    thats the answer that i was looking for :-)

    I was looking for a more targeted approach to attack an WPA AP - then just fishing an open AP

    Cool

×
×
  • Create New...