Hack, Hacking & Hackers – In the Realm of the Hackers

Hack, Hacking & Hackers [The Full Documentary Movie] Make a Full Time Income With Surveys: Book your next hotel/flight for the lowest . A great collection of documentaries from around the world. Subscribe to stay up-to-date with new uploads! SUBSCRIBE . A great collection of documentaries from around the world. Subscribe to stay up-to-date with […]

Training for Security Personnel and Why Intelligence Matters to You

FOR578 – Cyber Threat Intelligence has now been running as a course at SANS for a little over two years. In that time a lot has evolved including the field itself being extended through the SANS FOR578 authors and students. A major update has now taken place in the course to codify next skill sets […]

Introduction to Voice Over IP

Voice Over IP This class discusses the basic components and requirements for a business or enterprise Voice Over IP telephone system. Topics Covered VoIP Servers VoIP Clients Gateways Protocols Codecs Network Latency QOS Unified Communications Class Notes VoIP Servers VoIP Servers route calls like a traditional PBX There are proprietary and Open Source versions of […]

WEP – How to crack WEP without clients

WEP How to crack WEP without clients   Before starting explaining how to crack WEP without clients, I assume you have a network card from this list, and the injections drivers installed (Kali is fully patched) if you have doubts check our tutorial – How to install Packet Injection Drivers on Linux! After the drivers […]

Airmon-ng – Interface monitor mode

Airmon-ng – Interface monitor mode   Interface monitor mode Interface monitor mode To start smelling the frequencies we need a wifi card compatible with monitor mode, this means it theoretically the monitor interface is passive – just receive packets! But with some drivers like mac80211 we can also transmit packets – Packet Injection! Wonderland More […]

PixieWPS

Pixiewps is a tool written in C used to bruteforce offline the WPS pin exploiting the low or non-existing entropy of some Access Points, the so-called “pixie dust attack” discovered by Dominique Bongard in summer 2014. It is meant for educational purposes only. As opposed to the traditional online bruteforce attack, implemented in tools like […]

Wifite – Automated Wireless Attacks

Wifite – Automated Wireless Attacks Wifite was designed for use with pentesting distributions of Linux, such as Kali Linux, Pentoo, BackBox; any Linux distributions with wireless drivers patched for injection. The script appears to also operate with Ubuntu 11/10, Debian 6, and Fedora 16. Wifite must be run as root. This is required by the […]

Reaver – Brute Force WPS

Reaver – Brute Force WPS Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases. Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations. On average Reaver will […]