Chapter 4
Network Bug Bounty – External Attack
Section 4
Exploit Wireless Network and Become Internal User
This video will help you exploit WPA wireless. - Understand the use of Fern Wi-fi Cracker - Lab setup to learn exploitation - Exploit WPA/WPA2 using Kali Linux