Closed Jake-Grafton closed 5 months ago
Good idea, thanks. Merged
@ZerBea What do you think about me writing a document that showcases an attack on an access point along with the cracking of it's PSK? Would this walkthrough be too much or do you think it's a good idea?
First part (a layer 2 attack on an access point) is fine, but please keep in mind that there is no comprehensive solution (that is the reason why hcxdumptool/hcxtools offer so many options).
Second part (cracking of a PSK) is hascat/JtR playground (it should be be reported/explained there), but please keep in mind that there is no comprehensive solution (that is the reason why the GPU crackers offer so many attack modes). https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2 https://www.openwall.com/john/doc/EXAMPLES.shtml
These commits match the style of the end of the README with it's beginning. It also fixes a few errors and offloads the PCAPNG Option Codes section to it's own document in the /docs/ folder. The new GPS device listed is the GPS unit I use and it seems to work well.