Solution to Scenario Password
A possible solution to this scenario is to tap the password and use it yourself. You proceed as follows:
- You create a connection between the attacker’s computer and Router 1 or Router 2.
- Attack Router 1 or Router 2 (it must appear red now).
- You start the protocol from the client via the button Authenticate client. As soon as the data packet is transferred from Router1 or Router 2, a copy is forwarded to you so you can obtain the password.
- Now you can start the protocol from the attacker’s computer via the button Authenticate attacker and you will be authenticated because you know the password.
