A few months ago, I wrote a piece on doing a dissociation attack to capture a three-way handshake between a device and router. Once obtained, I brute-force the hash. Simple stuff. It was a final project for my security boot camp. Well, I'd like to follow it up with part 2, and I want to write it on what a hacker does once they are on your home network. What type of damage they can do.
My thoughts were that if I'm able to be on the home network I'm checking the default gateway for default credentials. If I can log into that then I can truly own it, right? Am I off base, what would you do?
[link] [comments]
from hacking: security in practice https://ift.tt/3fkMrZ6
Comments
Post a Comment