Introduction to Voice Over IP

Introduction to Voice Over IP

Voice Over IP This class discusses the basic components and requirements for a business or enterprise Voice Over IP telephone system. Topics Covered VoIP Servers VoIP Clients Gateways Protocols Codecs Network Latency QOS Unified Communications Class Notes VoIP Servers VoIP...

Continue Reading

WEP – How to crack WEP without clients

WEP How to crack WEP without clients   Before starting explaining how to crack WEP without clients, I assume you have a network card from this list, and the injections drivers installed (Kali is fully patched) if you have doubts...

Continue Reading

Airmon-ng – Interface monitor mode

Airmon-ng – Interface monitor mode   Interface monitor mode Interface monitor mode To start smelling the frequencies we need a wifi card compatible with monitor mode, this means it theoretically the monitor interface is passive – just receive packets! But...

Continue Reading

PixieWPS

Pixiewps is a tool written in C used to bruteforce offline the WPS pin exploiting the low or non-existing entropy of some Access Points, the so-called “pixie dust attack” discovered by Dominique Bongard in summer 2014. It is meant for...

Continue Reading

Wifite – Automated Wireless Attacks

Wifite – Automated Wireless Attacks Wifite was designed for use with pentesting distributions of Linux, such as Kali Linux, Pentoo, BackBox; any Linux distributions with wireless drivers patched for injection. The script appears to also operate with Ubuntu 11/10, Debian...

Continue Reading

Reaver – Brute Force WPS

Reaver – Brute Force WPS Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases. Reaver has been designed to be a robust and practical attack against WPS, and has been...

Continue Reading