Here's a detailed write-up of the EAP bug that affected all Apple devices (except watchOS), CVE-2019-6203. It includes a deep dive into MSCHAPv2 https://sensepost.com/blog/2019/understanding-peap-in-depth/ … there's some code at https://github.com/sensepost/understanding-eap … too
-
-
https://github.com/sensepost/wpa_sycophant/pull/3 … from
@_cablethief looks exciting. Sycophant can not only get you on the network but let you keep the victim device connected to your rogue AP.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Ooh nice. Will check it out.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.