You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Ok evil twin jams specific wifis and create a rogue access point with that name so victims can connect to it , and then prompt a credential webpage for user to insert their wifi password .
This concept does not have much success because victim will find suspicious , at least the young generation .
A better concept would be hacking the wpa source code to accept any password inserted on wifi with some exclusions , witch is if password is less than 6 characters , doing this then when victim connects to the rogue wifi access point their device is already sending the correct password , all that is needed is to tell wpa drivers to accept connection and parse that password to a file .
The text was updated successfully, but these errors were encountered:
Ok evil twin jams specific wifis and create a rogue access point with that name so victims can connect to it , and then prompt a credential webpage for user to insert their wifi password .
This concept does not have much success because victim will find suspicious , at least the young generation .
A better concept would be hacking the wpa source code to accept any password inserted on wifi with some exclusions , witch is if password is less than 6 characters , doing this then when victim connects to the rogue wifi access point their device is already sending the correct password , all that is needed is to tell wpa drivers to accept connection and parse that password to a file .
The text was updated successfully, but these errors were encountered: