My third giveaway :) enjoy!
Our website: https://www.proexplainers.com
7 Comments - Last post 1 hour ago by SlavenHarkin
5 Comments - Last post 1 hour ago by iubjaved
352 Comments - Last post 2 hours ago by ChrisKutcher
3,111 Comments - Last post 2 hours ago by meruleron
16 Comments - Last post 3 hours ago by Comiclove
2,038 Comments - Last post 9 hours ago by LordDarkness
551 Comments - Last post 13 hours ago by Warriot
144 Comments - Last post 24 minutes ago by Wintermute75
646 Comments - Last post 30 minutes ago by alexfirehouse
202 Comments - Last post 31 minutes ago by Wintermute75
445 Comments - Last post 1 hour ago by mijamal7
2,372 Comments - Last post 2 hours ago by Zipsy
49 Comments - Last post 3 hours ago by SquishedPotatoe
53 Comments - Last post 3 hours ago by Lugum
Thanks ! <3
Comment has been collapsed.
Thanks! :D
Comment has been collapsed.
thx bro!
Comment has been collapsed.
Thanks!
Comment has been collapsed.
thanks for the chance
Comment has been collapsed.
This comment was deleted 3 years ago.
Comment has been collapsed.
This comment was deleted 5 years ago.
Comment has been collapsed.
I've been searching until now for that damn Q4 of Level 1 but still nothing. Could I have at least the format? ><
Comment has been collapsed.
It's a word of course, wifi exploits are mostly abbreviations. (like WEP exploit, WEP is an abbreviation)
other than that I really can't help because the question would be easily answered.
You can always make a GA for a hint :)
Comment has been collapsed.
So it's not the name of the specific tool/app but the name of the "technique" for example "sniffing"?
Comment has been collapsed.
No, it's a method / exploit name.
Comment has been collapsed.
Since we're pretty private here I'll write down all the attempts I've made for that question,, can you tell me if at least I'm on the right track? ><
sniff
sniffer
sniffing
bruteforce
bruteforcing
brute force
brute forcing
brute-force
brute-forcing
mitm
man in the middle
mitm attack
man in the middle attack
bruteforce attack
brute force attack
brute-force attack
denial of service
denial of service attack
hack
hacking
crack
cracking
handshake
handshake capture
handshake capturng
capturing
eavesdropping
detecting
I'm going insane ç_ç
Comment has been collapsed.
Not at all, it has a special name, like WEP and other exploits.
Comment has been collapsed.
But WEP it's not the name of an exploit .-.
Comment has been collapsed.
There is WEP exploit, that's what's meant by it, if the question was about WEP, both WEP and WEP exploit are accepted.
Comment has been collapsed.
Oooooooooooooooooooooooooooooooooooh, now I've understood the question
( ͡° ͜ʖ ͡°)
Comment has been collapsed.
Last question, I swear...what do you mean by "top" in the playerbase question?
Comment has been collapsed.
Top = Best, biggest playerbase, that has most players.
Comment has been collapsed.