Archive | Wireless Hacking




Linset – Evil Twin Attack Bash Script

Linset is an Evil Twin Attack Bash script with everything built in (multi-lingual web page, DHCP, DNS server with redirect fake AP etc) so it has a bunch of dependencies, and it’s in Spanish. But other than that, it’s pretty cool. It’s also a recursive acronym – Linset Is Not a Social Enginering Tool. There […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Wireless Hacking | Add a Comment

Infernal Twin – Automatic Wifi Hacking Tool

Infernal Twin is an automatic wifi hacking tool, basically a Python suite created to aid penetration testers during wireless assessments, it automates many of the common attacks – which can get complicated and hard to manage when executed manually. The author noticed a gap in the market with there being many tools to automate web […]

Tags: , , , , , , , , , ,

Posted in: Hacking Tools, Wireless Hacking | Add a Comment

FruityWifi – Wireless Network Auditing Tool

FruityWifi is an open source wireless network auditing tool, it allows the user to deploy advanced attacks by directly using the web interface or by sending messages to it. Initially the application was created to be used with the Raspberry-Pi, but it can be installed on any Debian based system. Tested in Debian, Kali Linux, […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Wireless Hacking | Add a Comment

EvilAP Defender – Detect Evil Twin Attacks

EvilAP_Defender is an application that helps wireless network administrators to discover and prevent Evil Access Points (AP) from attacking wireless users. The application can be run in regular intervals to protect your wireless network and detect Evil Twin attacks. By configuring the tool you can get notifications sent to your email whenever an evil access […]

Tags: , , , , , , , , , ,

Posted in: Countermeasures, Wireless Hacking | Add a Comment

iSniff-GPS – Passive Wifi Sniffing Tool With Location Data

iSniff GPS is a passive wifi sniffing tool which sniffs for SSID probes, ARPs and MDNS (Bonjour) packets broadcast by nearby iPhones, iPads and other wireless devices. The aim is to collect data which can be used to identify each device and determine previous geographical locations, based solely on information each device discloses about previously […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Privacy, Wireless Hacking | Add a Comment

Dutch Court Rules Wi-Fi Hacking Legal In Holland

Interesting case and a very interesting interpretation of the laws of Holland which lead to this decision which means the Dutch can hack in Wireless routers legally. We published a story about the ethics of jacking open Wi-Fi connections way back in 2006, when a supposed ethics expert said it was ok: Jacking Wifi is […]

Tags: , , , , , , , , , ,

Posted in: Legal Issues, Wireless Hacking | Add a Comment

Half Of Home Wi-Fi Networks In The UK Vulnerable to Hacking/WiFi-Jacking

Once again WiFi security is in the news, this time a new report in the UK shows that almost half of UK home WiFi networks could be compromised within 5 seconds. While that sounds a little dramatic it wouldn’t surprise me if a lot still have no WEP key at all. And even if they […]

Tags: , , , , , , ,

Posted in: Network Hacking, Privacy, Wireless Hacking | Add a Comment

wifite – Mass Wifi WEP/WPA Key Cracking Tool

wifite is created to to attack multiple WEP and WPA encrypted networks at the same time. This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision. Features sorts targets by power (in dB); cracks closest access points first all WPA handshakes are backed up (to […]

Tags: , , , , , , , , , , , , , , , , , , , , ,

Posted in: Hacking Tools, Password Cracking, Wireless Hacking | Add a Comment

GSM Hacking Coming To The Masses Script Kiddy Style

Well it looks like what happened to WEP all those years ago is going to happen to GSM now. The methods have been known, the theory is established but the breaking point is when freely available tools are published that makes it possible for anyone to perform the attacks even without really understanding what is […]

Tags: , , , , , , , , , , , , , , , ,

Posted in: Hardware Hacking, Privacy, Wireless Hacking | Add a Comment

WPA2 Vulnerability Discovered – “Hole 196” – A Flaw In GTK (Group Temporal Key)

Well as it tends to be, when something is scrutinized for long enough and with enough depth flaws will be uncovered. This time the victim is WPA2 – the strongest protection for your Wi-fi network which is standardized. WEP fell long ago and there’s a myriad of WEP Cracking tools available. In 2008 it was […]

Tags: , , , , , , , , , , , , , , , , , , ,

Posted in: Cryptography, Exploits/Vulnerabilities, Wireless Hacking | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·