Menu
![]() If you don't know, when you capture a wpa/wpa2 handshake, you are essentially capturing the password itself - only it is hashed. ![]() The attack took about 40 minutes to complete, and it got me thinking about the hardware limitations of the laptop we were using. ![]() To hack the router, we captured a packet with a handshake to the router and used aircrack-ng to run a dictionary attack using the rockyou wordlist against the router to find the password. The competition involved hacking into an August smart lock, a Ring doorbell, a WRT54GL router with updated tomato firmware, and a raspi C. I was at HackArizona 2018 this past weekend, and I participated in Raytheon's IoT hacking competion.
0 Comments
Leave a Reply. |