July 2018
Beginner
564 pages
12h 22m
English
Everything we've done so far has not involved us connecting to a network. In this section, we're going to be talking about post-connection attacks—in other words, attacks that we can do after connecting to a network. Now, it doesn't matter if this network is a wireless or a wired network, and it doesn't matter how we managed to connect to it. We're going to forget all about what we did so far, and we're just going to assume that we have a connection to the network. We could have just connected physically using a wire to the router or to the server, we could have managed to crack the key, if the target was using a WEP or WPA key, or perhaps the network was a wireless network that wasn't using any encryption, and we ...