Capturing WPA Passwords by Targeting Users with a Fluxion Attack

With tools such as Reaver becoming less and less viable options for penetration testers as ISPs replace vulnerable routers, there becomes fewer certainties about which tools will work against a particular target. If you don’t have time to crack the … Continue reading

How to Hack Wi-Fi: Evading an Authentication Proxy Using ICMPTX

In previous Wi-Fi hacking tutorials, I have shown you ways to create an Evil Twin, to DoS a wireless AP, and to crack WEP and WPA2 passwords, but in this tutorial, I will show you something a little bit different. … Continue reading

wifite – Automated Wireless (wifi) Attack Auditor

Hacking Wifi

Wifite v2 is now available Get the latest version on Github What’s new in this version: support for cracking WPS-encrypted networks (via reaver) 2 new WEP attacks more accurate WPA handshake capture various bug fixes Version 2 does not include … Continue reading

Useful Linux WiFi Commands

NOTE: NOT ALL CARDS/FIRMWARE SUPPORT ALL OF THE COMMANDS LISTED BELOW. Note: To connect your Linux machine to a WLAN using WPA, WPA2 or 802.1X you will need to use WPA Supplicant Connecting to an OPEN / WEP WLAN (DHCP) … Continue reading

Crack Wifi Encryption with Kali Linux – Fern Wifi Cracker for WEP Hacking

Today we will cover cracking WEP Wifi Network Encryption with Fern Wifi Cracker. This Hacking tool comes prepacked in Kali Linux. This is a relatively simple process anyone can do with the proper equipment and following this tutorial. First you … Continue reading

How to Pivot from Victim System to Owning the Network with Metasploit

To own a network and retrieve the key data, we only need to find ONE weak link in the network. It makes little sense to beat our heads against heavily fortified systems like the file and database server when we … Continue reading

Tutorial: MDK3 – Network Traffic Disruption

Today, we are going to go over some options with the tool MDK3, however it has to be said that the use of these options can wreak havoc on wireless networks and should be used with caution ! And of … Continue reading

How To Hack: Creating an iOS7 Application Pentesting Environment

Now that you have your shiny new Evasion7 jailbreak running it’s time to set up the environment for application testing! Getting in Since mobile substrate is not working yet we will focus on getting our idevice up and running as … Continue reading

Wireless Security: Everything you ever needed to know about Wifi Hacking

The following is a very thorough and concise overview of Wifi Security. I think it will be very important for my fellow Security Hacker / Pen Testers to have this knowledge stored away somewhere in the back of their head. … Continue reading

Hacking Wifi: Cracking WEP with Kali Linux

Today, we commonly find wireless networks around us. Most wireless networks are encrypted using WEP or WPA encryption methods. I was recently looking around my site and realized that I had not ever posted a how-to on easily cracking WEP. … Continue reading

(How to) Kali Linux: Hack Encrypted Wifi Passwords with Reaver and Airmon-ng WPA – WPA2 – WPS

Hack Wifi Passwords and Encryption

Here we will go through how I tested Kali Linux with Reaver and Airmon-ng to hack into my WPA2 encrypted work network. In order to use Reaver, you need to get your wireless card’s interface name, the BSSID of the … Continue reading