- Kali Linux:An Ethical Hacker's Cookbook(Second Edition)
- Himanshu Sharma
- 80字
- 2021-06-24 15:59:17
There's more...
In Aggressive mode, the authentication hash is transmitted as a response to the packet of the VPN client that tries to establish a connection tunnel (IPSec). This hash is not encrypted and hence it allows us to capture the hash and perform a brute force attack against it to recover our PSK.
This is not possible in Main mode, as it uses an encrypted hash along with a 6-way handshake, whereas Aggressive mode uses only a 3-way handshake.
推薦閱讀
- 從零開始寫Linux內核:一書學透核心原理與實現
- 玩到極致 iPhone 4S完全攻略
- 異質結原理與器件
- 蘋果OS X Mavericks 10.9應用大全
- 計算機系統:基于x86+Linux平臺
- Windows 8實戰從入門到精通(超值版)
- Learn CUDA Programming
- Learning BeagleBone
- Linux 從入門到項目實踐(超值版)
- Web Penetration Testing with Kali Linux(Third Edition)
- Implementing Domain-Specific Languages with Xtext and Xtend(Second Edition)
- Android NDK Beginner's Guide
- Getting Started with Raspberry Pi Zero
- 計算機系統平臺
- OpenStack Trove Essentials