![]() Or the vulnerabilities (bugs) will be used against the router model, allowing to get the necessary information and/or bypass the authorization process. The program will try to guess a pair of username/password to the router from a list of standard passwords, thereby get access. Getting information occurs in two possible ways: Router Scan is able to find and identify a variety of devices from large number of known routers and that the most important thing is to get from them useful information, in particular the characteristics of the wireless network: a method of protecting the access point (encryption), access point name (SSID) and access point key (passphrase).Īlso it receives information about the WAN connection (useful when scanning a local network) and show the model of router.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |