- Kali Linux:An Ethical Hacker's Cookbook(Second Edition)
- Himanshu Sharma
- 92字
- 2021-06-24 15:59:17
Cracking the PSK
- Adding a –P flag in the ike-scan command will show a response with the captured hash.
- To save the hash, we provide a filename along with the –P flag.
- Next, we can use psk-crack with the following command:
psk-crack –b 5 /path/to/pskkey
-b is brute force mode and length is 5.
- To use a dictionary-based attack, we use the following command with -d flag to input the dictionary file:
psk-crack –d /path/to/dictionary /path/to/pskkey
The following screenshot shows the output of the preceding command:

推薦閱讀
- 樂學(xué)Windows操作系統(tǒng)
- Linux運(yùn)維實(shí)戰(zhàn):CentOS7.6操作系統(tǒng)從入門到精通
- Linux Mint Essentials
- Extending Puppet
- 網(wǎng)絡(luò)操作系統(tǒng)教程:Windows Server 2016管理與配置
- Joomla! 3 Template Essentials
- Kali Linux 2018:Windows Penetration Testing
- Python UNIX和Linux系統(tǒng)管理指南
- 分布式高可用架構(gòu)之道
- UI設(shè)計(jì)手繪表現(xiàn)從入門到精通
- Windows Server 2008組網(wǎng)技術(shù)與實(shí)訓(xùn)(第3版)
- Hadoop Real-World Solutions Cookbook
- Windows網(wǎng)絡(luò)編程(第2版)
- 鴻蒙入門:HarmonyOS應(yīng)用開發(fā)
- Python機(jī)器學(xué)習(xí)系統(tǒng)構(gòu)建(原書第3版)