Diferències
Ací es mostren les diferències entre la revisió seleccionada i la versió actual de la pàgina.
| Ambdós costats versió prèvia Revisió prèvia | |||
| info:cursos:pue:ethical-hacker:sesion4 [20/02/2025 07:31] – [Module 17: Hacking Mobile Platforms] mate | info:cursos:pue:ethical-hacker:sesion4 [20/02/2025 07:54] (actual) – [Lab 2: Perform Wireless Attacks] mate | ||
|---|---|---|---|
| Línia 370: | Línia 370: | ||
| - {{: | - {{: | ||
| - The result appears, showing the WPA handshake packet captured with airodump-ng. The target access point’s password is cracked and displayed in plain text next to the message KEY FOUND!, as shown in the screenshot. | - The result appears, showing the WPA handshake packet captured with airodump-ng. The target access point’s password is cracked and displayed in plain text next to the message KEY FOUND!, as shown in the screenshot. | ||
| - | - If the password is complex, aircrack-ng will take a long time to crack it.{{: | + | - If the password is complex, aircrack-ng will take a long time to crack it. |
| + | - {{: | ||
| - You can also use other tools such as: | - You can also use other tools such as: | ||
| - hashcat (https:// | - hashcat (https:// | ||