Greeting to all!
We just released our fourth lab and are very excited to share it with you all !
Like other 3 labs, this one is not a continuation to the wifi hacking series but a rather standalone exercise.
We are calling it “Hacking Remote WiFi”. a.k.a AP-less WPA2 Cracking
In this lab we aim to teach you how to tackle a situation where you have access to the target wireless client but not the target access point. Usually when you have both, you end up performing either a Man in the Middle (MITM) attack or a forceful authentication by disconnecting the connected client. What would you do if you have only a client and no AP to perform deauth on?
That’s what this exercise aims for. As a wireless pen-tester you must be prepared for situations like this and practice is the only way forward.
That will help you understand how wireless client behaves in both associated and un-associated states. Which will give you a good head-start towards the hardening of you own network.
As a Mega thread, please use it to provide your feedback based on following questions:
- How difficult was it for you? on a scale of 1-10.
- How much time it took you to solve the exercise? mind sharing a screenshot of “Verify Flag” section confirmation.
- Was it real-world enough? If not, please suggest.
- What was the best and the worst thing about the lab?
We hope you find the labs useful. Please use this thread to share your ideas about a lab you want to see at rootsh3ll Labs