So, only the verification stage of the password / user login is encrypted.įurther access to the account is supported by regular codes, which are sent along with the site’s “cookies”. The principle of the program is based on the traffic transmission vulnerability. The user selects the “victim” and, after seconds of waiting, can already send messages on behalf of the “victim” from her account in the social network or forum, make orders on the site, and also carry out other illegal actions. The utility scans the common access point and determines the sessions available for interception. You are connecting to a public Wi-fi network. The functionality of the utility will provide an opportunity to hack accounts even with an encrypted network (WPA2 only).įaceNiff is used to intercept web sessions. This application is known in certain circles on the Android OS, which allows you to scan and intercept Internet sessions.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |