mrecheese 🧀 @mrecheese 🧀 - 28d
PSA: "Spud2020!" is not a good wifi password. It got cracked in 5 hours at 370 kH/s. I've been learning to use the Flipper and Hashcat so I have a better understanding of how these exploits work. I am not good at this, but I will get your crappy password. Make passwords long (like 21 or more characters) and random. I have wordlists and rules for all the cute leetspeak crap you might inject into your password. I have wordlists and rules for all the cute sentences you might use. Long and random. This is the way. I should not be able to crack anybody's password in freaking 2024 with my loser noob skills. #security #privacy
SLCW @SLCW - 28d
It's crazy to not use at least a 21-char, randomly generated password in 2024. Need mawr entropy!
semisol @Semisol - 28d
WPA3-SAE fixes this
Oh yeah, this one actually started as a passive sniff in WiFi Marauder. I'll let them know for sure. I don't want anyone around me having a compromised network, either.
Yeah, I'm seeing the benefit now.
So I thought that about us, also, but that little ESP32 picks up all kinds of remote stuff. I think these people are blasting wifi everywhere trying to get a strong signal. It carries pretty far. To be clear, they just have to drive by once, then go home and take their time cracking it. When they come by again, they'll already have the password and can sign right on. It's actually like maybe 10/100 difficulty. Script-kiddie-level stuff.
I say "drive by" but they could do it very remotely with a popsicle stick and some paper clips for an antenna.
You only get a yes or no, nothing else.