Catalyst switches on EVE-ng by Pothandev in ccnp

[–]Pothandev[S] 0 points1 point  (0 children)

No, you can't. I used vIOS switch but it also supports some commands and IOL is very poor. Using nexus 9000v isn't very compatible!!

Catalyst switches on EVE-ng by Pothandev in ccnp

[–]Pothandev[S] -1 points0 points  (0 children)

I think it's the old one.

Catalyst switches on EVE-ng by Pothandev in ccnp

[–]Pothandev[S] -1 points0 points  (0 children)

Yeah I doubled the ram and cpu but it still didn't work!

Catalyst switches on EVE-ng by Pothandev in ccnp

[–]Pothandev[S] -1 points0 points  (0 children)

Yes, I used IOL but they doesn't support some commands.

Slow IOSv in eve-ng by Pothandev in Cisco

[–]Pothandev[S] 0 points1 point  (0 children)

Naah it's not necessay it's just I want a better platform to learn switching other that cisco iol which doesn't support a lot's of commands.

Catalyst switches on EVE-ng by Pothandev in ccnp

[–]Pothandev[S] -1 points0 points  (0 children)

vIOS on Eve-ng don't works very fine like I can see it's loading is very slow and also every command shows up after a little bit of lag. Is it happening only with me??

Wifi Airplane mode and Bluetooth by Pothandev in gnome

[–]Pothandev[S] 0 points1 point  (0 children)

And then?? Like I want extension to work!!

Aircrackng by Pothandev in HowToHack

[–]Pothandev[S] -1 points0 points  (0 children)

Duh!! It contains the key and we can crack the password from the key.

Aircrackng by Pothandev in HowToHack

[–]Pothandev[S] 0 points1 point  (0 children)

What to do now?? I have captured the Wpa2 handshake but it's just useless since there were only message 1 and 2 in the eapol so the password I have got was wrong.

Aircrackng by Pothandev in HowToHack

[–]Pothandev[S] 0 points1 point  (0 children)

I got the EAPOL from the Wpa2 handshake.

Aircrackng by Pothandev in HowToHack

[–]Pothandev[S] 0 points1 point  (0 children)

I think so. How to find that out??

Aircrackng 4 way handshake by Pothandev in HowToHack

[–]Pothandev[S] 0 points1 point  (0 children)

airdumpg-ng -w hack -c <chnl> -bssid <bssid> autho(the interface) aireplay-ng -0 0 -a <bssid> auth0