alkemyst
No Lifer
- Feb 13, 2001
- 83,769
- 19
- 81
Those tools won't do anything to help crack WPA2/AES.
If you are local to the AP, you have all the time in the world to brute force it.
Those tools won't do anything to help crack WPA2/AES.
Can you actually show me an exploit that can retrieve a 15-character randomly-generated alphanumeric password from a WPA2-protected network?
EDIT: Without taking 15 million years.
Can you actually show me an exploit that can retrieve a 15-character randomly-generated alphanumeric password from a WPA2-protected network?
EDIT: Without taking 15 million years.
If you are local to the AP, you have all the time in the world to bruce force it.
NETGEAR
Am I really the first one with this?
1. Reaver or pyrit will do it, and if it is used with a GPU it will do it even faster. Why don't you try it on yourself and see how fast it goes. The tools will only get better.
2. Since you are using MAC filtering you just need to get the MAC of a whitelisted device then impersonate it.
Can you actually show me an exploit that can retrieve a 15-character randomly-generated alphanumeric password from a WPA2-protected network?
EDIT: Without taking 15 million years.
Impersonatig the MAC wouldn't do anything if you didn't crack the encryption key.
Even so, I've connected to MAC-filtered networks that had no encryption and didn't even have to clone a MAC. I suspect MAC restriction only determines if DHCP IP settings are assigned automatically. I just used a manual IP address of 192.168.1.99.
(this was a neighbor's Linksys router with no encryption)