Last year a new attack on WPA2 was announced by the creators of hashcat - one that didn't require capturing the 4-way handshake, any client interaction or any kind of client even connected.
The PWK Course [https://www.offensive-security.com/information-security-training/penetration-testing-training-kali-linux/] was something that had been on my radar for years and I'd been wanting to take it for quite a while. Having heard of
I attended BSidesSF 2019 and skipped this presentation based on the title because I assumed it was going to be some cheesy IronMan thing. I could not have been more wrong. While Burp