If you dont succeed to crack a network it shows the network is secure in that case.
When doing a pen testing you can document you did several attacks on it and it withstand it.
When you do an assessment on a remote WiFI access point several factors such as router brand, signal strength, encryption used, security updates on the remote access point.
We use the latest techniques for the attacks and when new attacks get revealed we add those quickly.
That is why the rapid update cycle on the software.
Please study all the FAQ with answered questions here
https://support.secpoint.com/hc/en-us/sections/115000166289-Portable-Penetrator-F-A-Q
We already include large wordlists in the software you can upgrade to in the menu.
You can use your own list as well if you have some more specific list.
Now another approach is the one you also mention they are already working on a similar way which is very sneaky.
In that case you choose an remote access point. The Penetrator knock it offline
The challenge is if it can be done with only 1 wifi adapter or if more are needed.
Then it spoof the access point and you must wait for users to connect.
This way it will trick valid users to connect to it and ask them to reveal their password for an update.
Comments
0 comments
Please sign in to leave a comment.