kasadyツK
Cyber Info4w ago
19 replies
kasadyツ

Wi-fi Injection

I am new at cybersec and in the past few days i've been searching methods and theory about it, now i know the theory, and the code behind it, the de-auth prosses, and i am making a local lab to try to hack into it, but i just feel that there is some piece of information i am missing about it, there is two specific methods i really studyied, and it is the de-auth and just brute-forcing it, but how will i be able to listen to the return of the de-auth of the router, and brute-forcing it is a easy way to go, but very slow, is there something i am missing ( apart from sucking on using wireshark )?
Was this page helpful?