Constructing PTK key from sniffed traffic and decrypting WPA2 network traffic using it

Suppose there is a WPA2/PSK access point (AP) and 2 clients are connected to it, say X and Y. So X and Y both know the password or PSK required for authentication.
From here:

In case of WPA2/PSK when device authenticates with access point… Continue reading Constructing PTK key from sniffed traffic and decrypting WPA2 network traffic using it

Extrapolating home address of a visitor when they click on an e-mail phishing link (Mr Robot)

In Mr Robot season 3, the feds are set up in a safe house spying on Elliot’s internet communications (with packet sniffers?) when they intercept an email from Elliot to someone else containing a link that they think is secret information. … Continue reading Extrapolating home address of a visitor when they click on an e-mail phishing link (Mr Robot)