Metasploit Posted May 31, 2017 Share Posted May 31, 2017 Hello, how can find with the Tetra the wpa2 password Quote Link to comment Share on other sites More sharing options...
b0N3z Posted June 1, 2017 Share Posted June 1, 2017 you cant. Do some research first plz. Quote Link to comment Share on other sites More sharing options...
Dave-ee Jones Posted June 1, 2017 Share Posted June 1, 2017 5 hours ago, b0N3z said: you cant. Do some research first plz. Well, I think he means phishing. Like Evil Portals? You know? Quote Link to comment Share on other sites More sharing options...
Metasploit Posted June 1, 2017 Author Share Posted June 1, 2017 6 hours ago, Dave-ee Jones said: Well, I think he means phishing. Like Evil Portals? You know? Yes! Thank you Quote Link to comment Share on other sites More sharing options...
Metasploit Posted June 1, 2017 Author Share Posted June 1, 2017 6 hours ago, Dave-ee Jones said: Well, I think he means phishing. Like Evil Portals? You know? I mean phishing Quote Link to comment Share on other sites More sharing options...
Metasploit Posted June 1, 2017 Author Share Posted June 1, 2017 How geht ist with the evil Portral? Quote Link to comment Share on other sites More sharing options...
barry99705 Posted June 1, 2017 Share Posted June 1, 2017 You don't. Quote Link to comment Share on other sites More sharing options...
Dave-ee Jones Posted June 2, 2017 Share Posted June 2, 2017 Just look into Evil Portals. Understand that is for ethical hacking, not for actually stealing passwords for your own gain. 1 Quote Link to comment Share on other sites More sharing options...
barry99705 Posted June 2, 2017 Share Posted June 2, 2017 Here, I'll help you out. Go back to the main forum page and in the search box type in "4 way handshake" . Read through a few of those threads so you have a general understanding of how wpa2 encryption works. Then you'll understand why trying to fish a wireless password won't work unless the user is unbelievably stupid. Then you'll wonder how they even managed to turn on their laptop. Quote Link to comment Share on other sites More sharing options...
Forkish Posted June 4, 2017 Share Posted June 4, 2017 I remember asking essentially same question. These always sound great in theory/brain. And then it slowly gets more daunting as you realize that you don't know shit. Yay! 1 Quote Link to comment Share on other sites More sharing options...
Decoy Posted July 14, 2017 Share Posted July 14, 2017 On 6/1/2017 at 6:14 PM, Ulrich Fuchs said: How geht ist with the evil Portral? You could find out the router manufacturer from the MAC Address, and spin up a router/firmware update page and host it on the Pineapple. Then deauth the crap out of the original AP, and as Barry said... On 6/2/2017 at 7:48 AM, barry99705 said: ...you'll understand why trying to fish a wireless password won't work unless the user is unbelievably stupid. Then you'll wonder how they even managed to turn on their laptop. If they are stupid, they'll click on your rogue AP, and enter in their key on your spoofed upgrade page. This is more successful than you would think; however this most likely won't be successful on a professional engagement. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.