Latest Posts - Page 5

Jan 27

FTP Fuzzer

Author: TheXero | Category: tools

This FTP fuzzer has been used to fuzz and discover a number of previously undisclosed bugs with FTP server software and other plain-text protocols. The project is hosted on GitHub...


Read More
Oct 26

Abusing The Stack

Author: TheXero | Category: exploit-development

Abusing the Stack is a full tutorial, detailing the process of vulnerability discovery to developing custom exploit code to take advantage of a vulnerability. Once you have successfully been through...


Read More
Nov 14

Hacking Hidden WiFi Networks

Author: TheXero | Category: wifi

Typically a WiFi network can be configured to not broadcast its SSID. In this episode, we will be attacking a hidden WiFi network. Firstly after activating monitor mode on my...


Read More
Oct 29

ARP Amplification

Author: TheXero | Category: wifi

An advanced technique known as ARP Amplification can greatly increase IV generate rates. Using this technique alone is enough to boost IV generation rates up to 1800p/s. I first performed...


Read More
Sep 19

Bypassing Shared Key Authentication

Author: TheXero | Category: wifi

When attacking a WEP encrypted WiFi network you can come across two different authentication methods, Open and Shared Key Authentication. In the previous example, we attacked a WEP network configured...


Read More