Aditya Anand
1 min readJul 31, 2018

--

In the case that the password was not available in the rockyou.txt file. Then the next thing would have been to setup a fake wifi / hotspot with the same name using Evil Twin. After that I would have used my Kali machine to send out de-auth packets to disconnect the user from the legitimate WiFi point and pump up my WiFi signal, that will make the user connect to my fake WiFi point and I can carry out the attack.

It’s a tiresome process and you need to do all these things in a very precise manner to carry out this attack smoothly.

--

--