- Details
- Written by NX
- Category: Articles
- Hits: 1094
Yeah...I know. It's pointless to post this, as there shouldn't be any WEP networks in use out there. But for the completeness, let's go through it anyway.
If you have read the article Basic WPA cracking and the article Manual Wlan config, let's go into legacy mode for a minute and look at WEP.
What's the point you ask, weeeeell, in these C-days, I'm bored, needed something to do. So without further delay, let's get to it :)
- Details
- Written by NX
- Category: Articles
- Hits: 936
In the article Basic WPA cracking, we learned to crack a basic WPA network. But how do we actually use it ?
Most networks will have enabled DHCP, and in that case, it's simple, but what if it haven't got DHCP ?
That is the topic in this little tutorial, so let's go have some more fun with Wifi..
- Details
- Written by NX
- Category: Articles
- Hits: 897
So, time for another article in our little theme series, and the topic for today is....wait for it...PHISHING :)
I thought it would be a great time to talk a bit about what is is, and how it actually works, the mechanisms behind it all.
And no, this is not an introduction to phishing server setup, or payload creation. It's seen from the other side :)
- Details
- Written by NX
- Category: Articles
- Hits: 1170
Hey there :) Well, time to have a little fun with WPA2-PSK cracking, using the Aircrack-NG suite of tools. here I'm using a Kali host, but you can use anything you like. But, not Windows, it's usually not good for anything cracking related :)
- Details
- Written by NX
- Category: Articles
- Hits: 1100
As i promised you in article one, we'll have a look at a typical phishing email, and go through it, why it isn't so scary as it seems.
If you haven't read the first one, you can find it here C-Days - Phishing explained