-
Gain passwords with Evil Twin attacks
Evil twin attacks sound exactly like what they are. The attack works by creating a fake WiFi with the same name as the target. The attack works on both open and encrypted networks (it works better if you know the password). Disclaimer: I’m not responsible for what you do with this information. Tools Airgeddon — Only…
-
WiFi Jamming Attacks Explained
WiFi is amazing, it makes connections to the internet simple and wireless. It’s become essential to many of us thanks to its convenience. However, this also makes wifi a great target for hackers. In this article, we will be going over a few ways hackers can kick or prevent devices from connecting to WiFi. Deauthentication…
-
Speed Up WPA Handshake Cracking With Keyspace Attacks
WPA handshakes are great but they’re useless if you can’t get a password from them. Most people use dictionary attacks or brute force for short passwords. A keyspace attack is similar to both. By analyzing known default passwords we can reverse engineer the password generation process, making it easier to guess the password. For example,…
-
How to Get WiFi Passwords with WPS Attacks
WPS was introduced in 2006 as a simpler way to connect to WiFi. It stands for WiFi Protected Setup though it is far from protected. These days WPS is obsolete but older routers may still have it enabled. Tools Reaver — Popular tool used in most WPS Attacks Pixiewps — Tool to exploit the pixiedust Attack Equipment…
-
WiFi Vulnerabilities and Attack Methods Explained
WiFi was created in 1997 by the 802.11 committee. Since then, it has grown to be an essential part of our lives. It is a convenient and easy gateway to the internet but as with most tech, it comes with vulnerabilities. This article will roughly go over most of the known vulnerabilities and attacks. Listening The greatest…