- Kali Linux:An Ethical Hacker's Cookbook
- Himanshu Sharma
- 81字
- 2021-07-08 09:41:15
How it works...
In aggressive mode the authentication hash is transmitted as a response to the packet of the VPN client that tries to establish a connection Tunnel (IPSEC). This hash is not encrypted and hence it allows us to capture the hash and perform a brute force attack against it to recover our PSK.
This is not possible in main mode as it uses an encrypted hash along with a six way handshake, whereas aggressive mode uses only three way.
推薦閱讀
- Learning LibGDX Game Development(Second Edition)
- FreeSWITCH 1.8
- Bootstrap Essentials
- Magento 1.8 Development Cookbook
- 從學徒到高手:汽車電路識圖、故障檢測與維修技能全圖解
- Python編程與幾何圖形
- Web程序設計(第二版)
- Haxe Game Development Essentials
- RealSenseTM互動開發(fā)實戰(zhàn)
- Advanced Express Web Application Development
- 移動互聯(lián)網(wǎng)軟件開發(fā)實驗指導
- Scala for Machine Learning(Second Edition)
- Web前端應用開發(fā)技術
- Flutter從0基礎到App上線
- Natural Language Processing with Python Cookbook