
上QQ阅读APP看书,第一时间看更新
Cracking the PSK
- Adding a –P flag in the ike-scan command will show a response with the captured hash.
- To save the hash, we provide a filename along with the –P flag.
- Next, we can use psk-crack with the following command:
psk-crack –b 5 /path/to/pskkey
-b is brute force mode and length is 5.
- To use a dictionary-based attack, we use the following command with -d flag to input the dictionary file:
psk-crack –d /path/to/dictionary /path/to/pskkey
The following screenshot shows the output of the preceding command:
