Here's a detailed write-up of the EAP bug that affected all Apple devices (except watchOS), CVE-2019-6203. It includes a deep dive into MSCHAPv2 https://sensepost.com/blog/2019/understanding-peap-in-depth/ … there's some code at https://github.com/sensepost/understanding-eap … too
-
Prikaži ovu nit
-
This might also be useful for WiFi generalists studying for their CWNP or CWNE cc @robrobstation
1 proslijeđeni tweet 5 korisnika označava da im se sviđaPrikaži ovu nit
https://github.com/sensepost/wpa_sycophant/pull/3 … from @_cablethief looks exciting. Sycophant can not only get you on the network but let you keep the victim device connected to your rogue AP.
0 replies
1 proslijeđeni tweet
2 korisnika označavaju da im se sviđa
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.