Closed Bob36180 closed 5 years ago
You can capture the packets with wireshark and take a look at them, counld't get the entered key
2018-06-14 22:23 GMT+08:00 Bob36180 notifications@github.com:
Hello, I actually am working on this new mdk3 version. I'm interested by the "b attack" of this program, which allows to create fake APs... Let us imagine that I type this command mdk4 wlan0 b -n Livebox_123 -t 0 -w a -h -c 3 ... what happens when someone try to connect to Livebox_123 ?? If the victim insert a random WPA key thinking it is his own box (Rogue AP principle), is it possible to get the entered key ?? Thanks in advance.
— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub https://github.com/aircrack-ng/mdk4/issues/5, or mute the thread https://github.com/notifications/unsubscribe-auth/AQtlsA6QcBWqXHSxC9L_6Ptb1hco78Mkks5t8nHcgaJpZM4UoDx0 .
Hello, I actually am working on this new mdk3 version. I'm interested by the "b attack" of this program, which allows to create fake APs... Let us imagine that I type this command
mdk4 wlan0 b -n Livebox_123 -t 0 -w a -h -c 3
... what happens when someone try to connect to Livebox_123 ?? If the victim insert a random WPA key thinking it is his own box (Rogue AP principle), is it possible to get the entered key ?? Thanks in advance.