Forum

  • I've seen a lot of times how to break the WPA2 key (by brute force)... but I want to know AFTER!
    If I already have the WPA2 Key, how can I get the traveling data in the network ?

    I imagine that I should capture the 4-way-handshaking (already knowing the WPA2 Key) to get the derived keys used in the cryptography.

    am I right ?

    Thanks!

Page 1 of 1
  • 1