802.11r handshake capture

The target AP I'm trying to attack has Fast BSS enabled. Everytime handshake captured, it contains FT using PSK. Normal handshake doesn't get captured ever. And this capture can't be/fails to processed using hcxpcapngtool. Making the capture useless to crack.

What could be done to attack such AP successfully???

submitted by /u/InsaneIslandDweller
[link] [comments]

from hacking: security in practice https://ift.tt/vNY0xkE

Comments