Latest Posts - Page 5

Oct 26

Abusing The Stack

Author: TheXero | Category: exploit-development

Abusing the Stack is a full tutorial, detailing the process of vulnerability discovery to developing custom exploit code to take advantage of a vulnerability. Once you have successfully been through...


Read More
Nov 14

Hacking Hidden WiFi Networks

Author: TheXero | Category: wifi

Typically a WiFi network can be configured to not broadcast its SSID. In this episode, we will be attacking a hidden WiFi network. Firstly after activating monitor mode on my...


Read More
Oct 29

ARP Amplification

Author: TheXero | Category: wifi

An advanced technique known as ARP Amplification can greatly increase IV generate rates. Using this technique alone is enough to boost IV generation rates up to 1800p/s. I first performed...


Read More
Sep 19

Bypassing Shared Key Authentication

Author: TheXero | Category: wifi

When attacking a WEP encrypted WiFi network you can come across two different authentication methods, Open and Shared Key Authentication. In the previous example, we attacked a WEP network configured...


Read More
Sep 10

Hacking WEP Protected Networks

Author: TheXero | Category: wifi

When hacking a WEP protected WiFi network an attacker may conduct an ARP Request Replay attack against the affected network. There are cases where is not likely to succeed, such...


Read More