User Tools

Site Tools


dcrack

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revisionBoth sides next revision
dcrack [2018/04/19 02:30] – improved mister_xdcrack [2018/04/19 22:48] – Fixed missing word. mister_x
Line 66: Line 66:
 ===== Tips ===== ===== Tips =====
  
-  * In an untrusted network, use a SSH tunnel or any other protocol allowing authentication and eavesdropping.+  * In an untrusted network, use a SSH tunnel or any other protocol allowing authentication and prevents eavesdropping.
   * If the capture file contains multiple handshakes, the best one will be selected. However, manual selection is strongly recommended in that case. Check out our [[wpa_capture|WPA Capture analysis]] tutorial. Make sure to include at least one beacon in the capture file. If the network is hidden, an association frame is required too.   * If the capture file contains multiple handshakes, the best one will be selected. However, manual selection is strongly recommended in that case. Check out our [[wpa_capture|WPA Capture analysis]] tutorial. Make sure to include at least one beacon in the capture file. If the network is hidden, an association frame is required too.
dcrack.txt · Last modified: 2018/04/20 23:35 by mister_x