Professional Documents
Culture Documents
IV. EVALUATION
Fig. 3. Retrieved SSIDs and Passwords
We conducted the WiFi attack in three
separate trials. If the results are consistent
A. Limitations
throughout the three trials, we would assume
that the attack is successful and that the Python
One aspect that our team wishes we
script works. Our first hope was to use a
could have improved upon was the delivery of
the Python code to the victim. In order for the
attack to correctly execute, the victim needs to V. CONCLUSION