Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

A WPA 2 karma attack (saved network handshaker ) #111

Open
minanagehsalalma opened this issue Jan 23, 2020 · 0 comments
Open

A WPA 2 karma attack (saved network handshaker ) #111

minanagehsalalma opened this issue Jan 23, 2020 · 0 comments

Comments

@minanagehsalalma
Copy link

as karma attacks works on saved open networks only and not secured ones so we will need to have the password first to get it work although this seems a bit hard... the number of saved networks Guarantee that there is a one with a weak password... so will need to make the karma attack start two networks of the targeted prob one open and the second secured and the victim will auto connect to the one with the correct configuration with the saved obviously correct password and we save that handshake with the other handshakes captured form the same device to brute force and break the ones with the weak passwords. And then use it to get the victim auto connected to use in case of no saved open networks on the victim device !

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant