• Conduct wireless information gathering.
• Circumvent wireless network access restrictions.
• Crack various WEP, WPA, and WPA2 implementations/encrypted networks.
• Implement transparent man-in-the-middle attacks.
• Scan and sniff wireless networks for rogue access points and logins.
• Identify and detect vulnerable hosts.
• Run vulnerability scans and exploit systems.
• Pivot between networks and systems to access other hosts and networks.
0 comments:
Post a Comment