![]() The essence of the attack lies in the fact that it is necessary to capture completely (or at least part) the transmitted data and find the appropriate password by brute-force. When a Client connects to a WPA/WPA2-enabled Access Point, EAPOL, security protocol, is used during which a step-by-step data exchange is performed between an Access Point and a Client that wants to connect. The most universal attack (working on almost all access points) is the attack on WPA/WPA2 technology, because it is used in the vast majority of wireless access points. There are a lot of various attacks on Wi-Fi.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |