• Based on being fully connected to the wireless network
  • Using a MiTM attack with ettercap
  • Saving network data as pcap file
  • Running pcap file through chosen tools for data examination


video ;
Extracting files & Info from network captures