Aditya Anand
1 min readJul 31, 2018

In the case that the password was not available in the rockyou.txt file. Then the next thing would have been to setup a fake wifi / hotspot with the same name using Evil Twin. After that I would have used my Kali machine to send out de-auth packets to disconnect the user from the legitimate WiFi point and pump up my WiFi signal, that will make the user connect to my fake WiFi point and I can carry out the attack.

It’s a tiresome process and you need to do all these things in a very precise manner to carry out this attack smoothly.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Aditya Anand
Aditya Anand

No responses yet

Write a response