Originally posted by jetcyc
Both tools are exploiting flaws in WEP and management frame
Both tools are exploiting flaws in WEP and management frame
A 30MB wordlist is used for the attack. The decryption of WEP keys is only possible if the key is contained in the dictionary (or at least part of).
flood wireless networks
...
flood accesspoints
...
flood accesspoints
Leave a comment: