WPA2 Cracking Using HashCat [ch5pt2]
Last updated Feb. 7, 2019
If you remember in the previous part, we learned Speeding up WPA2 Cracking Using Pre-generated PMKs. Which certainly uses CPU as the primary part for the calculations of the PMKs. It surely gives us speed for WPA2 cracking as while using PMKs for cracking we are not performing actual calculations in real-time.
Continue Reading
Crack WPA2-PSK Using Pre generated PMKs [ch5pt1]
Last updated Mar. 8, 2018
If you are following the series from the very beginning you must be familiar with the Handshake we captured and used it with a Wordlist to crack the WPA2-PSK. As there is a tremendous possibility for WPA2 passphrases as they can be AlphaNumeric including special characters that too with 8-63 characters long.
Continue Reading
Cracking WPS with Reaver [ch3pt5]
Last updated Feb. 3, 2018
[YB]This article is an excerpt from my WiFi Penetration testing and Security eBook for aspiring WiFi hackers and Wireless security enthusiasts. Click here to learn more[/YB]
In previous chapters we covered:
- Introduction to Aircrack-ng Suite of tools
- Introduction to Wireshark
- WEP cracking using Aircrack-ng
- WPA/WPA2 Personal cracking using Aircrack-ng
Today we will learn WPS cracking using reaver.
Continue Reading
WEP Cracking Using Aircrack-ng [ch3pt3]
Last updated Feb. 3, 2018
WEP (Wired Equivalent Privacy) is the weakest and an outdated encryption mechanism used by the routers(access points) to encrypt data packets passing through the router itself.
As we studied here, WEP uses 64-bit and 128-bit encryption as a standard, but security researchers discovered many flaws in the encryption mechanism of WEP , like static key generation, fast re-keying method.
Continue Reading
Cracking the Wireless Network Security: Aircrack-ng – [ch3pt1]
Last updated Feb. 3, 2018
Introduction to Aircrack-ng Suite of Tools
Hello friends,
This is the First part of Chapter 3 from the “Rootsh3ll WiFi Security and Pentesting Series”. In case you missed the series you can start following here.
Continue Reading
Understanding Basics of WiFi Networks – [ch2]
Last updated Feb. 3, 2018
Hello everyone,
This is the second chapter of the Rootsh3ll Wireless Security and Pentesting Series. In the previous chapter we covered :
- Installing Kali Linux in VMWare
- Setting up the Wireless card
- Configuring the wireless card
- Installing Kali Linux on a PC
- Removing Kali Linux
Moving on to the second chapter of the series, we will go through the basics of Wi-Fi networks.
Continue Reading