Description: In this video i will show you how to perform post exploitation on Wireless using Metasploit Framework, for Information-Gathering.
So I'm going to cover four module of Wireless
Wlan-BSSList, - In this module you will receive connections.
Wlan-Current-Connection - In this module you will get Current connection, means where this card is connected.
Wlan-Profile - In this module you will get current connection, profile essid, encryption, Encrypted key. etc..
Wlan-Disconnect - In this module you can fire a disconnect single using Metasploit. In short deauthentication.
Tags: wireless , post-exploitation , hacking ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.