Securing the Spectrum: An Intensive Wireless Security Course for Red and Blue Teams

Introduction

My goal with this course is to take you from Wi-Fi hacking enthusiast to a wireless security professional and practitioner. You will know common (and uncommon) vulnerabilities, how to discover them, how to exploit them, how to report them and how to protect against them.
[ Continue reading ... ]

Installing and Configuring Kali Linux [2018 Update]

[RWSPS] -Rootsh3ll Wireless Security and Pentesting Series- ch1pt2

In the previous post i.e Chapter 1: Part 1, we learned

  • Hardware/Software requirements of the series
  • How to install Kali Linux in a VMWare Workstation(Virtual machine), and
  • Setting up and configuring Alfa card (Wireless adapter) in Kali Linux

We will cover the remaining of Chapter 1 in this post.
[ Continue reading ... ]

Evil Twin Attack (A Step by Step Guide)

Rogue Access Point - Kali Linux

“A Fake WiFi access point is a wireless access point that has been installed on a secure network without explicit authorization from a local network administrator, whether added by a well-meaning employee or by a malicious attacker.” – Wikipedia

Fake WiFi access point is often called as:

 

Using this method it is possible to retrieve the WPA/2 passphrase in clear-text within minutes.
[ Continue reading ... ]

Create Linux Live USB (Kali Linux | Windows)

Create MultiBootable USB from Windows

Ever wondered how to create Linux USB installer?

To install Windows |  Linux | Anti-virus Rescue Disks from single USB  stick.

I will cover 3 steps in this tutorial.

  • Benefits
  • Tools Required
  • Create Kali Linux bootable USB

Benefits of Linux Live USB

  • Freedom – Select between multiple OS’s on boot time.

[ Continue reading ... ]

Automated WiFi Cracking

Wifite is a Linux based WiFi cracking tool (comes pre-installed on Kali) coded in Python. It is used to automate the hacking process and aims at minimizing the user inputs by scanning and using Python for automation techniques. Wifite is capable of Hacking WEP, WPA/2 and WPS, but not alone.
[ Continue reading ... ]

Post Exploiting The Network [ch6]

rwsps-post-exploiting-the-network-sniffing-ettercap-nmap-aireplay-ng-logo

So far in the WiFi Security and Pentesting Series we have learned to

  1. Crack WEP Using aircrack-ng suite of tools
  2. Crack the WPA/2 passphrase using Aircrack-NG
  3. Speed Up WPA/2 Cracking with Hashcat
  4. Automate WiFi Cracking

Now considering that we are into a network it is important to learn a few thing that we can do to start our penetration testing within the scope of a network.
[ Continue reading ... ]