- Kali Linux:An Ethical Hacker's Cookbook
- Himanshu Sharma
- 81字
- 2021-07-08 09:41:15
How it works...
In aggressive mode the authentication hash is transmitted as a response to the packet of the VPN client that tries to establish a connection Tunnel (IPSEC). This hash is not encrypted and hence it allows us to capture the hash and perform a brute force attack against it to recover our PSK.
This is not possible in main mode as it uses an encrypted hash along with a six way handshake, whereas aggressive mode uses only three way.
推薦閱讀
- Learn Blockchain Programming with JavaScript
- 嵌入式軟件系統測試:基于形式化方法的自動化測試解決方案
- iOS開發實戰:從零基礎到App Store上架
- 程序員考試案例梳理、真題透解與強化訓練
- BIM概論及Revit精講
- Practical Game Design with Unity and Playmaker
- 零基礎學Kotlin之Android項目開發實戰
- Java并發編程之美
- 從程序員角度學習數據庫技術(藍橋杯軟件大賽培訓教材-Java方向)
- Learning Unreal Engine Game Development
- Python Machine Learning Cookbook
- 分布式數據庫HBase案例教程
- Mastering Drupal 8
- SFML Essentials
- Java從入門到精通(第7版)