Backtrack Series 7 (Cracking Apless Wep Protected Network Using Hirte Attack)
Description:
This attack targets the client by making an access point with the same attributes as the one which is stored in the WIFI settings of the OS. Note that I had to keep on disconnecting the fake AP in order to force the client in to rejoining the network as the packet flow stops if I don't do that. This happens even if the firewall is disabled on the client. Perhaps setting up a DHCP server can solve this problem. This will be tested in the future
For more information, please check the following link.This video has been contributed by Fifo_thekid ( fifo_thekid@yahoo.com )
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Comments: