- Kali Linux:An Ethical Hacker's Cookbook(Second Edition)
- Himanshu Sharma
- 80字
- 2021-06-24 15:59:17
There's more...
In Aggressive mode, the authentication hash is transmitted as a response to the packet of the VPN client that tries to establish a connection tunnel (IPSec). This hash is not encrypted and hence it allows us to capture the hash and perform a brute force attack against it to recover our PSK.
This is not possible in Main mode, as it uses an encrypted hash along with a 6-way handshake, whereas Aggressive mode uses only a 3-way handshake.
推薦閱讀
- Mastering ElasticSearch
- Designing Purpose:Built Drones for Ardupilot Pixhawk 2.1
- Linux從零開始學(視頻教學版)
- 構建可擴展分布式系統:方法與實踐
- Learning Bootstrap
- 巧學活用Windows 7
- Application Development in iOS 7
- ElasticSearch Cookbook
- Python UNIX和Linux系統管理指南
- Kali Linux高級滲透測試(原書第3版)
- 精解Windows 10
- CentOS 6 Linux Server Cookbook
- Responsive Web Design with AngularJS
- Gradle Effective Implementations Guide(Second Edition)
- Windows XP操作系統5日通