rootsh3ll Labs
Penetration Testing Professional Course [Labs + Solutions]

rootsh3ll Labs is an online, gamified cybersecurity platform that helps professionals acquire and improve their penetration testing skills by providing real-world vulnerable environment within browser.

Our goal with rootsh3ll Labs Pentesting Professional program is to take you from an absolute beginner to a vulnerability assessment and penetration testing expert, by practice and performance.
Continue Reading

Captive Portal:
The Definitive Guide

Captive Portal Definitive Guide

This is the most comprehensive guide to Captive Portal on the planet.

The best part?

I’m going to show you how you can build your own Captive Portal Software for Hacking, Business Security, and Growth.

In short: if you want to leverage WiFi Captive Portals for improving your Business, you’ll love this guide.
Continue Reading

Evil Twin Attack:
The Definitive Guide

In this article, I’ll show you how an attacker performs an Evil twin Attack to retrieve cleartext WPA2 passphrase on automation using a fake Access Point.

I am using a sample web page for the demonstration.

An attacker can turn this webpage into basically any web app to steal information.
Continue Reading

The Ultimate Fake Access Point [Walkthrough]

Assuming that you are capable of setting up a fake access point and setup Apache configuration accordingly to fool victim(s) I am beginning this walk-through.

In this scenario, we are using one alfa wireless adapter and an Ethernet connection (under VM) for optional Internet accessibility.
Continue Reading

How to Hack WiFi with Rogue Access Point

rogue access point rootsh3ll

It is often pain in the butt to setup a working Rogue Access Point with (isc!) DHCP server.

Most users either don’t know how to hack WiFi or find a hard time configuring the required setup.

Many find it difficult to perform flexible tasks with the rogue access points using airbase-ng but end up getting frustrated.
Continue Reading

Installing and Configuring Kali Linux [2018 Update]

[RWSPS] -Rootsh3ll Wireless Security and Pentesting Series- ch1pt2

In the previous post i.e Chapter 1: Part 1, we learned

  • Hardware/Software requirements of the series
  • How to install Kali Linux in a VMWare Workstation(Virtual machine), and
  • Setting up and configuring Alfa card (Wireless adapter) in Kali Linux

We will cover the remaining of Chapter 1 in this post.
Continue Reading