Jump to content

Ellimist

Members
  • Posts

    1
  • Joined

  • Last visited

Recent Profile Visitors

201 profile views

Ellimist's Achievements

Newbie

Newbie (1/14)

  1. After reading this I have to say I agree. Reaver is all but dead, and was never quite as reliable as the WEP crack back in the day and trying to crack a handshake is fairly unreliable lately. I do find this social engineering topic quite interesting. Spoofing a targets AP Name and sending deauths does seem like a reliable way to get someone to connect to you, but after that it's very hit or miss. I can't imagine very users typing in their own WPA password on a random popped up page. Is there a way to capture the WPA password a user has typed in when attempting to authenticate with our newly spoofed AP? Are there any other methods? This IS very interesting and would love to hear more thoughts on it.
×
×
  • Create New...