First Move on a Hacked Home Network as the Attacker?

A few months ago, I wrote a piece on doing a dissociation attack to capture a three-way handshake between a device and router. Once obtained, I brute-force the hash. Simple stuff. It was a final project for my security boot camp. Well, I'd like to follow it up with part 2, and I want to write it on what a hacker does once they are on your home network. What type of damage they can do.

My thoughts were that if I'm able to be on the home network I'm checking the default gateway for default credentials. If I can log into that then I can truly own it, right? Am I off base, what would you do?

submitted by /u/strider-no9
[link] [comments]

from hacking: security in practice https://ift.tt/3fkMrZ6

Comments