- Kali Linux:An Ethical Hacker's Cookbook
- Himanshu Sharma
- 81字
- 2021-07-08 09:41:15
How it works...
In aggressive mode the authentication hash is transmitted as a response to the packet of the VPN client that tries to establish a connection Tunnel (IPSEC). This hash is not encrypted and hence it allows us to capture the hash and perform a brute force attack against it to recover our PSK.
This is not possible in main mode as it uses an encrypted hash along with a six way handshake, whereas aggressive mode uses only three way.
推薦閱讀
- AWS Serverless架構(gòu):使用AWS從傳統(tǒng)部署方式向Serverless架構(gòu)遷移
- 神經(jīng)網(wǎng)絡編程實戰(zhàn):Java語言實現(xiàn)(原書第2版)
- jQuery從入門到精通 (軟件開發(fā)視頻大講堂)
- C語言程序設計立體化案例教程
- 云計算通俗講義(第3版)
- Python忍者秘籍
- Orchestrating Docker
- 零代碼實戰(zhàn):企業(yè)級應用搭建與案例詳解
- Python Deep Learning
- MongoDB Cookbook(Second Edition)
- LabVIEW數(shù)據(jù)采集
- 交互設計師成長手冊:從零開始學交互
- Raspberry Pi Blueprints
- 前端程序員面試算法寶典
- Isomorphic JavaScript Web Development