Hacking Hidden WiFi Networks
Author: wifi
| Category:Think hidden SSIDs make your WiFi more secure? Think again. Discover how wireless attackers reveal, spoof, and crack non-broadcasting networks using Python, Scapy, and Hashcat.
Read More
Author: wifi
| Category:Think hidden SSIDs make your WiFi more secure? Think again. Discover how wireless attackers reveal, spoof, and crack non-broadcasting networks using Python, Scapy, and Hashcat.
Author: wifi
| Category:Even the most secure wireless deployments, including EAP-TLS with client certificate validation, can become entry points when endpoints are exploited in less secure environments. Here's how wireless pivots work—and why your mobile devices may be betraying you.
Author: wifi
| Category:Explore how attackers break into enterprise Wi-Fi networks using EAP-TLS misconfigurations. Understand key vulnerabilities and how to protect your organization.
Author: wifi
| Category:From WEP to WPA3, this post dives into how Wi-Fi security has evolved to counter new threats, explaining key protocols and their practical implications.
Author: wifi
| Category:Learn how the Extensible Authentication Protocol (EAP) secures enterprise Wi-Fi through methods like EAP-TLS, PEAP, and TTLS, including how authentication works with certificates, passwords, and biometrics.
Author: wifi
| Category:Explore how 802.11 Wi-Fi Control and Data Frames manage wireless traffic, enhance performance, and reduce interference using ACKs, Block ACK, RTS/CTS, and QoS.
Author: wifi
| Category:Break down the 802.11 MAC frame into its core fields — including frame control, addresses, and FCS — to learn how Wi-Fi packets are transmitted and managed at the MAC layer.
Author: wifi
| Category:Learn about the limitations of Protected Management Frames (PMF) in Wi-Fi security, including gaps that can be exploited through passive listening, evil twin APs, and Wi-Fi jamming.
Author: wifi
| Category:Discover the importance of Protected Management Frames (PMF) in Wi-Fi networks. Learn how PMF secures management frames, preventing tampering and unauthorised injections. Explore the different configuration states of PMF and understand its role in enhancing Wi-Fi security. Stay tuned for our next post on how attackers defeat PMF and how to protect your network against advanced threats.
Author: wifi
| Category:Typically a WiFi network can be configured to not broadcast its SSID. In this episode, we will be attacking a hidden WiFi network. Firstly after activating monitor mode on my...
Author: wifi
| Category:An advanced technique known as ARP Amplification can greatly increase IV generate rates. Using this technique alone is enough to boost IV generation rates up to 1800p/s. I first performed...
Author: wifi
| Category:When attacking a WEP encrypted WiFi network you can come across two different authentication methods, Open and Shared Key Authentication. In the previous example, we attacked a WEP network configured...
Author: wifi
| Category:When hacking a WEP protected WiFi network an attacker may conduct an ARP Request Replay attack against the affected network. There are cases where is not likely to succeed, such...
Author: wifi
| Category:In this video, I demonstrate the simplicity of cracking a PSK password using tools freely available within the aircrack-ng suite of tools. I first put my Alfa AWUS036H USB WiFi...