The target AP I'm trying to attack has Fast BSS enabled. Everytime handshake captured, it contains FT using PSK. Normal handshake doesn't get captured ever. And this capture can't be/fails to processed using hcxpcapngtool. Making the capture useless to crack.
What could be done to attack such AP successfully???
[link] [comments]
from hacking: security in practice https://ift.tt/vNY0xkE
Comments
Post a Comment