Category: Cybersecurity

  • Gain passwords with Evil Twin attacks

    Evil twin attacks sound exactly like what they are. The attack works by creating a fake WiFi with the same name as the target. The attack works on both open and encrypted networks (it works better if you know the password). Disclaimer: I’m not responsible for what you do with this information. Tools Airgeddon — Only…

  • WiFi Jamming Attacks Explained

    WiFi is amazing, it makes connections to the internet simple and wireless. It’s become essential to many of us thanks to its convenience. However, this also makes wifi a great target for hackers. In this article, we will be going over a few ways hackers can kick or prevent devices from connecting to WiFi. Deauthentication…

  • Speed Up WPA Handshake Cracking With Keyspace Attacks

    WPA handshakes are great but they’re useless if you can’t get a password from them. Most people use dictionary attacks or brute force for short passwords. A keyspace attack is similar to both. By analyzing known default passwords we can reverse engineer the password generation process, making it easier to guess the password. For example,…