πŸ§‘β€πŸ«Extraneous Topics

Where can you go from here?

While what we have shown here is specific to cracking WiFi passwords, a lot of the base techniques are the same across many different types of attacks. Pretty much any hash-cracking attack will use the principles taught here in this guide. What changes is how the hashes are obtained. Many password, credit card, and other sensitive information leaks that you hear about in the news end the same way: Hash cracking. If you’re interested in these other types of attacks, we encourage you to learn more! We unfortunately do not cover those types of attacks in this guide.

Last updated