تقييمات الطلاب
( 5 من 5 )
١ تقييمات
فيديو شرح WPA3 Hacked! ضمن كورس اختبار اختراق الشبكات شرح قناة zSecurity، الفديو رقم 7 مجانى معتمد اونلاين
This video covers all the flaws Mathy Vanhoef and Eyal Ronen discovered in WPA3 and the dragonfly handshake used in it.
Link to the full paper (Dragonblood: A Security Analysis of WPA3's SAE Handshake):
https://papers.mathyvanhoef.com/dragonblood.pdf
Tools to test whether a network is vulnerable or not:
Dragonslayer: https://github.com/vanhoefm/dragonslayer
Dragondrain: https://github.com/vanhoefm/dragondrain-and-time
Dragontime: https://github.com/vanhoefm/dragondrain-and-time
Dragonforce: https://github.com/vanhoefm/dragonforce
---------------------------------------------------------------
Subscribe and use this link to opt-in to the course giveaway
https://forms.gle/987ViTu4tH6Ah3PcA
---------------------------------------------------------------
My hacking courses
https://zsecurity.org/courses/
---------------------------------------------------------------
Website - https://zsecurity.org/
Facebook - https://www.facebook.com/ZSecurity-1453250781458287/
Twitter - https://twitter.com/_zSecurity_
Instagram - https://www.instagram.com/zsecurity_org/
Linkedin - https://www.linkedin.com/company/zsecurity-org/
---------------------------------------------------------------
This video is made for educational purposes only, we only test devices and systems that we own or have permission to test, you should not test the security of devices that you do not own or do not have permission to test.