- Kali Linux:An Ethical Hacker's Cookbook(Second Edition)
- Himanshu Sharma
- 92字
- 2021-06-24 15:59:17
Cracking the PSK
- Adding a –P flag in the ike-scan command will show a response with the captured hash.
- To save the hash, we provide a filename along with the –P flag.
- Next, we can use psk-crack with the following command:
psk-crack –b 5 /path/to/pskkey
-b is brute force mode and length is 5.
- To use a dictionary-based attack, we use the following command with -d flag to input the dictionary file:
psk-crack –d /path/to/dictionary /path/to/pskkey
The following screenshot shows the output of the preceding command:

推薦閱讀
- Linux系統文件安全實戰全攻略
- 精解Windows 8
- 深入Linux內核架構與底層原理(第2版)
- 混沌工程:復雜系統韌性實現之道
- 數據中心系統工程及應用
- 蘋果OS X Mavericks 10.9應用大全
- 計算機應用基礎(Windows 7+Office 2016)
- Cassandra 3.x High Availability(Second Edition)
- 從零開始學安裝與重裝系統
- Linux操作系統
- Learning BeagleBone
- Learning Continuous Integration with Jenkins(Second Edition)
- Android應用性能優化最佳實踐
- Windows網絡編程(第2版)
- Learn OpenShift