6) Traffic generation


Traffic generation is required if we don’t have a second client in our house (that we can use to generate encrypted traffic just by downloading something). If this is the case we will need to use packet injection to masquerade as a client and persuade the access point to generate encrypted packets.
Documentation on this is included with Aircrack – good luck!

Be Sociable, Share!
 Posted by at 10:38 pm

 Leave a Reply



You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>