Diferències
Ací es mostren les diferències entre la revisió seleccionada i la versió actual de la pàgina.
| Ambdós costats versió prèvia Revisió prèvia Següent revisió | Revisió prèvia | ||
| info:cursos:pue:ethical-hacker:sesion4 [20/02/2025 07:16] – mate | info:cursos:pue:ethical-hacker:sesion4 [20/02/2025 07:54] (actual) – [Lab 2: Perform Wireless Attacks] mate | ||
|---|---|---|---|
| Línia 370: | Línia 370: | ||
| - {{: | - {{: | ||
| - The result appears, showing the WPA handshake packet captured with airodump-ng. The target access point’s password is cracked and displayed in plain text next to the message KEY FOUND!, as shown in the screenshot. | - The result appears, showing the WPA handshake packet captured with airodump-ng. The target access point’s password is cracked and displayed in plain text next to the message KEY FOUND!, as shown in the screenshot. | ||
| - | - If the password is complex, aircrack-ng will take a long time to crack it.{{: | + | - If the password is complex, aircrack-ng will take a long time to crack it. |
| + | - {{: | ||
| - You can also use other tools such as: | - You can also use other tools such as: | ||
| - hashcat (https:// | - hashcat (https:// | ||
| Línia 376: | Línia 377: | ||
| - WepCrackGui (https:// | - WepCrackGui (https:// | ||
| == Module 17: Hacking Mobile Platforms | == Module 17: Hacking Mobile Platforms | ||
| + | === Lab 1 | ||
| + | ==== Task 1: Exploit the Android Platform through ADB using PhoneSploit-Pro | ||
| + | ==== Task 2: Hack an Android Device by Creating APK File using AndroRAT | ||
| + | === Lab 2 | ||
| + | ==== Task 1: Secure Android Devices from Malicious Apps using AVG | ||