File tree Expand file tree Collapse file tree 1 file changed +1
-1
lines changed Expand file tree Collapse file tree 1 file changed +1
-1
lines changed Original file line number Diff line number Diff line change @@ -14,7 +14,7 @@ Wifite runs existing wireless-auditing tools for you. Stop memorizing command ar
1414
1515Wifite is designed to use all known methods for retrieving the password of a wireless access point (router). These methods include:
16161 . WPS: The [ Offline Pixie-Dust attack] ( https://en.wikipedia.org/wiki/Wi-Fi_Protected_Setup#Offline_brute-force_attack )
17- 1 . WPS: The [ Online Brute-Force PIN attack] ( https://en.wikipedia.org/wiki/Wi-Fi_Protected_Setup#Online_brute-force_attack )
17+ 1 . WPS: The [ Online Brute-Force PIN attack] ( https://en.wikipedia.org/wiki/Wi-Fi_Protected_Setup#Online_brute-force_attack ) < br >
1818 WPS: The [ Offline NULL PIN attack] ( https://github.com/t6x/reaver-wps-fork-t6x/wiki/Introducing-a-new-way-to-crack-WPS:-Option--p-with-an-Arbitrary-String )
19192 . WPA: The [ WPA Handshake Capture] ( https://hashcat.net/forum/thread-7717.html ) + offline crack.
20203 . WPA: The [ PMKID Hash Capture] ( https://hashcat.net/forum/thread-7717.html ) + offline crack.
You can’t perform that action at this time.
0 commit comments