Post Exploiting The Network [ch6]

by Hardeep Singh Last updated Feb. 3, 2018

rwsps-post-exploiting-the-network-sniffing-ettercap-nmap-aireplay-ng-logo

So far in the WiFi Security and Pentesting Series we have learned to

  1. Crack WEP Using aircrack-ng suite of tools
  2. Crack the WPA/2 passphrase using Aircrack-NG
  3. Speed Up WPA/2 Cracking with Hashcat
  4. Automate WiFi Cracking

Now considering that we are into a network it is important to learn a few thing that we can do to start our penetration testing within the scope of a network.
Continue Reading

WPA2 Cracking Using HashCat [ch5pt2]

by Hardeep Singh Last updated Feb. 7, 2019

rwsps-gpu-accelerate-cracking-wpa2-passwords-with-hashcat-cloud-ch5pt2

If you remember in the previous part, we learned Speeding up WPA2 Cracking Using Pre-generated PMKs. Which certainly uses CPU as the primary part for the calculations of the PMKs. It surely gives us speed for WPA2 cracking as while using PMKs for cracking we are not performing actual calculations in real-time.
Continue Reading

Crack WPA2-PSK Using Pre generated PMKs [ch5pt1]

by Hardeep Singh Last updated Mar. 8, 2018

rootsh3ll-speed-up-wpa-psk-cracking-with-pregenerated-pmk-cowpatty-pyrit-rwsps

If you are following the series from the very beginning you must be familiar with the Handshake we captured and used it with a Wordlist to crack the WPA2-PSK. As there is a tremendous possibility for WPA2 passphrases as they can be AlphaNumeric including special characters that too with 8-63 characters long.
Continue Reading

Cracking WPS with Reaver [ch3pt5]

by Hardeep Singh Last updated Feb. 3, 2018

WPS-cracking-with-reaver-rootsh3ll[YB]This article is an excerpt from my WiFi Penetration testing and Security eBook for aspiring WiFi hackers and Wireless security enthusiasts. Click here to learn more[/YB]

In previous chapters we covered:

Today we will learn WPS cracking using reaver.
Continue Reading

Cracking WPA2-PSK with Aircrack-ng [ch3pt4]

by Hardeep Singh Last updated Mar. 8, 2018

WPA2-Cracking-Aircrack-ng-rootsh3ll-ch3pt4

[YB]This article is an excerpt from my WiFi Penetration testing and Security eBook in which I talk about hacking WiFi enabled devices with rogue access points, war driving, custom captive portals and splash page, multiple access points from a single NIC and much more.
Continue Reading

WEP Cracking Using Aircrack-ng [ch3pt3]

by Hardeep Singh Last updated Feb. 3, 2018

rwsps-wep-cracking-aircrack-ng-rootsh3ll

WEP (Wired Equivalent Privacy) is the weakest and an outdated encryption mechanism used by the routers(access points) to encrypt data packets passing through the router itself.

As we studied here, WEP uses 64-bit and 128-bit encryption as a standard, but security researchers discovered many flaws in the encryption mechanism of WEP , like static key generation, fast re-keying method.
Continue Reading