All Posts

  • WiFi Jamming Attacks Explained

    WiFi is amazing, it makes connections to the internet simple and wireless. It’s become essential to many of us thanks to its convenience. However, this also makes wifi a great target for hackers. In this article, we will be going over a few ways hackers can kick or prevent devices from connecting to WiFi. Deauthentication…


  • Speed Up WPA Handshake Cracking With Keyspace Attacks

    WPA handshakes are great but they’re useless if you can’t get a password from them. Most people use dictionary attacks or brute force for short passwords. A keyspace attack is similar to both. By analyzing known default passwords we can reverse engineer the password generation process, making it easier to guess the password. For example,…


  • How to Get WiFi Passwords with WPS Attacks

    How to Get WiFi Passwords with WPS Attacks

    WPS was introduced in 2006 as a simpler way to connect to WiFi. It stands for WiFi Protected Setup though it is far from protected. These days WPS is obsolete but older routers may still have it enabled. Tools Reaver — Popular tool used in most WPS Attacks Pixiewps — Tool to exploit the pixiedust Attack Equipment…


  • WiFi Vulnerabilities and Attack Methods Explained

    WiFi was created in 1997 by the 802.11 committee. Since then, it has grown to be an essential part of our lives. It is a convenient and easy gateway to the internet but as with most tech, it comes with vulnerabilities. This article will roughly go over most of the known vulnerabilities and attacks. Listening The greatest…


  • Where To Start in Learning Cybersecurity

    Cybersecurity is a complicated and vast field with many different pathways. This makes it difficult for beginners or those interested in figuring out where to start. You can find many articles on the same topic as this one but here is my version of it. What Device To Use I assume that you’re reading this…