Showing posts from May, 2019
mitmAP WiFi access point to intercept passwords

mitmAP WiFi access point to intercept passwords

WiFi access point to intercept passwords: configure and analyze data mitmAP is a small Python3 script that automates the creation of a wi...
Rogue access point guide

Rogue access point guide

How rogue access point work? The attack using a fraudulent access point (Rogue access point) is to create a wireless network without e...
Rogue AP - fake access points

Rogue AP - fake access points

Most modern devices remember the name of the WiFi network to which they successfully connected at least once, and immediately connect to it...
mdk3 examples & Tutorial

mdk3 examples & Tutorial

What is mdk3 mdk3 is a multifunctional program, the main purpose of which is to show the weak points of WiFi networks. The mdk3 utility c...
Wifiphisher Evil Twin Attack

Wifiphisher Evil Twin Attack

How Wifiphisher Works Wifiphisher uses social engineering to get a password for WiFi and websites the method is called Evil Twin Attack . ...
How To Create Fake WiFi AP using Fluxion 5

How To Create Fake WiFi AP using Fluxion 5

What is Fluxion  Fluxion is a security audit and research tool for social engineering. The script tries to get a password (WPA / WPA2 key...
BruteForce 5 GHz wifi Networks

BruteForce 5 GHz wifi Networks

BruteForce Keys for Unconfigured 5 GHz Networks  Contents When analyzing large amounts of disclosed keys for wireless access...
The easiest way to hack WiFi (for beginners, with airgeddon)

The easiest way to hack WiFi (for beginners, with airgeddon)

Until recently, I considered WiFite the most “Nubian” (in a good sense of the word) program for hacking wireless WiFi networks (“ Wifite a ...
WiFi Attack with WPS using Reaver

WiFi Attack with WPS using Reaver

WiFi Attack with WPS using Reaver What is WPS? WiFi Protected Setup (secure installation), WPS - standard (and the same protocol) of the...
Effective selection of WPS PINs based on known and generated PINs

Effective selection of WPS PINs based on known and generated PINs

Effective selection of WPS PINs based on known and generated PINs Busting WPS PINs with Reaver takes hours or even a day, especially if t...
Search for wireless access points with WPS enabled

Search for wireless access points with WPS enabled

Search for wireless access points with WPS enabled: using Wash, Airodump-ng and Wifite software Before attacking Wi-Fi from WPS, we need ...
Hacking WPA/WPA2 passwords with Aircrack-ng & Hashcat

Hacking WPA/WPA2 passwords with Aircrack-ng & Hashcat

Hacking WPA / WPA2 passwords with Aircrack-ng: dictionary searching, collaboration with Hashcat, maskprocessor, statsprocessor, John the...
Basic and advanced use of oclHashcat (Hashcat)

Basic and advanced use of oclHashcat (Hashcat)

Basic and advanced use of oclHashcat (Hashcat) for hacking WPA/WPA2 passwords from the Handshake General information about oclHashcat (HA...
How to convert .cap file to .hccapx || Hashcat format

How to convert .cap file to .hccapx || Hashcat format

How to convert a handshake Hashcat format Solving the problem “ Old hccap file format detected! You need to update  If you crack the WiF...
How to extract a handshake from a capture file with multiple handshakes

How to extract a handshake from a capture file with multiple handshakes

More than one handshake can be contained in a single network data capture file (pcap format). This can happen, for example, during long wor...
Automatic Collection Handshake with Besside-ng

Automatic Collection Handshake with Besside-ng

Automatic collection of handshakes is interesting for both novice users and those who are perfectly able to capture handshakes “manually”. ...
 Capture Handshake using Pyrit

Capture Handshake using Pyrit

how to Capture Handshake with Pyrit Usually, Airodump-ng is used to capture handshakes . I will tell you about another alternative.  Pyr...
Advanced use of pyrit

Advanced use of pyrit

The basic use of Pyrit, as well as the most efficient algorithm for implementing an attack, is described in the section “ Breaking a Hands...
Pyrit Hacking captured handshakes the fastest way using GPUs and pre-calculating hashes.

Pyrit Hacking captured handshakes the fastest way using GPUs and pre-calculating hashes.

Benefits of using Pyrit Hacking captured handshakes is the only way to break WPA / WPA2 passwords. It is produced by the brute force metho...
Intercept and analysis open WiFi traffic

Intercept and analysis open WiFi traffic

Is it dangerous to use open WiFi Internet access via WiFi is currently very popular. WiFi is in many apartments, in the workplace. When ...
How to bypass Captive Portal (hotspot with authorization on the web-interface)

How to bypass Captive Portal (hotspot with authorization on the web-interface)

What is Captive Portal Contents You can encounter the Captive Portal at the airport, hotel, condo, business center, and now...
How to strengthen the WiFi signal

How to strengthen the WiFi signal

WiFi signal enhancement There are situations when we have access to a WiFi network (there is a password), but the signal is weak and not a...
Enable WiFi monitor mode on Kali Linux

Enable WiFi monitor mode on Kali Linux

Putting a wireless card into monitor (monitor) mode on Kali Linux using the IP and iw commands Almost Any attack on WiFi begins with the ...
Types of WiFi attacks

Types of WiFi attacks

For myself, I group the types of attacks on wireless access points as follows: Hacking WPA / WPA2 passwords WEP attack Hacking WPS Pin...
how to find ip behind cloudflare

how to find ip behind cloudflare

Cloudflare is a gasket between the user and the site. It works on the principle of reverse proxy, providing additional services, including ...
practice of attacking Directory Traversal

practice of attacking Directory Traversal

Today I want to show you in practice how the Directory Traversal or Path Traversal attack can be used. This is a very simple and popular at...

Search

Popular Posts

USB WiFi adapters that support monitor mode and wireless injection

usb wifi adapter with monitor mode and wireless injection (100% compatibl…

how to update Kali Linux and Fix update error

Kali Linux one of the best Linux distro for penetration testing it's freq…

Fix Kali Linux sources.list Repositories

Fix default repository First after installing a clean Kali Linux the sou…

Recent Comments

Contact Me