You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If it's a Macbook it may be your EAP type, if it's Windows 10 and you're using a self signed cert it simply won't connect without modifying the registry (OR GPO Policies). Lots of factors may restrict you connecting to a certain type of network or performing a "rogue attack". It's based on the end device's supplicant support, so an iOS or Mac OS device is going to use different EAP types by default differently. While Windows doesn't even have EAP-GTC or EAP-TTLS support built into the OS for wireless connectivity.
Hi,
I have used this tool successfully for wireless attacks before. I am now trying to use this tool for a wired rogue PEAP attack.
I can see the client connecting: vendor=0 method=1. But when I input a password in the client, the hash doesnt appear in the rogue server.
Any idea how to fix this?
Thanks
The text was updated successfully, but these errors were encountered: