Wireless Pentesting

waiting for the handshake:

Using de-auth:

where -0 = (deauth)

1 = one time

-a = BSSID

-c = STATION id

and the wireless card

we need to crack the cap file

Last updated