Im currently working on my finalwork about 'BYOD enterprise wifi security'. The idea is to test some of the authentication protocols to see how 'hackable' they are. I have done a MS-CHAPv2 handshake capture with a rogue AP and decrypted the password but i want to do some other tests because i dont have enough content. I dont really know where to start next and time is ticking away.
Do you guys have any ideas for test i can do or write some content about?
thanks
>>55765016
Idk what are you talking about, but /g/ stands for gayness and consumerism
>>55765418
oh ok thanks
>>55765016
bump for interest
rebump
>>55765314
someone explain this to me
>>55766807
just your random asian?
>>55765016
> nice mmx buttons
wat de, op-senpai?
>>55767034
wat
>>55767034
That Window Compositor theme is astounding!
What Desktop Environment and theme are you using, buddy?
>>55767411
ayyyy buddy
>>55765016
Looking at the picture you're basically reducing the strength of the authentication protocols to the strength of the passphrase being used. What if the password is weird enough to not appear in the most common dictionaries?
>>55767562
yy i know, thats not the point here. its just a proof of concept to point out where the vulnerabilities are