What do you think about bruteforce attack to find Wi-Fi password ? It's not lame ?
What do you think about bruteforce attack to find Wi-Fi password ? It's not lame ?
Other urls found in this thread:
you are an idiot
Why not just ask politely?
Dictionary attacks hardly ever work, and sequential numerical dictionary attacks like the one in OPs pic take forever, and hardly ever work also.
Bruteforcing sucks. It's a shame reaver is obsolete too.
it's save ?
My name is OP. I watched Mr Robot once and want to be a hacker now. Control is an illusion. I do things like download Kali Linux and immediately lose interest when I can't find a GUI.
wtf
this. intelligent bruteforcing reduces attack time, but if you don't hit paydirt quickly then it's time to abandon the tactic.
Try a good wordlist. Then try bruteforcing.
>My name is OP
I doubt that.
> turn on old microwave oven to make coffee
> wait for keys to be resent
Get a handshake.
>Sup Forums has children
>they're named pepe, wojak, OP, moot
You might be literally retarded, OP.
You forgot CIA
underrated post
>What do you think about bruteforce attack to find Wi-Fi password ?
Those are 100% lame, you should really sniff the packets out of the air with tin foil and decode it with magnets connected to your brain, you pleb.
mfw they try to bruteforce cc95788cf6a149f8b9605e6caad39c0e
thx, added to dictionary.
add the rest of the ones here guidgenerator.com
FBI*
Can someone get this hothead out of here?
>baneposter
>a hothead
It doesn't matter who I am, what matters is my plan
preferred method would be to deathenticate them from their current AP, and have them authenticate to your rogue AP.
then they will give you the pw
this can be done multiple ways and skids can find simple tuts online
I'll call it in
pfff lame, I do it manually, it takes less time
Reaver is for bruteforcing wps. Op is bruteforcing a gateway and hes retarded.
>immediately lose interest when I can't find a GUI
lost
>bruteforce
kek this
if I was designing stuff I'd just lock out IPs after some attempts
All lower case, you fool!
You can already do such things.
Can't be done. They why would they authenticate to a different network with different credentials? Namely the password would be different. Clients don't just send their password to anyone who just happens to have the same SSID and even if they did try to authenticate to your rogue ap (for some reason) they still don't send their password, they use it to hash a random number in the handshake.
>what is man in the middle
Be an hero OP