- Ping the target network to check whether it is live or not ultimately choose a valid target.
- make a list of all possible password (easily available online )
- Define the priority of each password on the basis of the key defined
- Try to get access using password , in case of failure again try with different password
Please follow and like us: