Wireless Hacking
There are many, many ways to hack wireless (Wi-Fi or 802.11) Internet AP’s. This section will be dedicated to the many ways. Initially, you need to know what type of security the wireless access point uses (WEP, WPS, WPA2-PSK, WPA2-Enterprise) and an aircrack-ng compatible wireless adapter. If you have questions whether your adapter is aircrack-ng compatible, it probably isn’t. Most wireless adapters built into your laptop or mobile device are not compatible. You can purchase an Alfa external USB adapter on Amazon for less than $30. To order one, click on the ad here.
Wi-Fi Hacking: Anatomy of Wi-Fi Frames for Hackers
Welcome back, my aspiring Wi-Fi Hackers! In previous tutorials here at Hackers-Arise, we have demonstrated how to hack Wi-Fi (IEEE 802.11) access points using multiple techniques, including; 1. WPA2 aircrack-ng Attack 2. WPS Reaver Attack 3. Evil Twin Attack 4. PMKID Attack 5. Continuous Denial of Service (DoS) Attack 6.
Wi-Fi Hacking: Creating a Wi-Fi Scanner with Python and Scapy
Welcome back, my aspiring cyber warriors! Although there are numerous tools to hack Wi-Fi (802.11), to create your own tools you will need to understand the Wi-Fi protocol. In a previous tutorial, I explained the various types of frames in Wi-Fi. Now we will use that information to crate our
Wireless Hacking: Getting Started with aircrack-ng
In the first part of my series on Wi-Fi hacking, we discussed the basic terms and technologies associated with Wi-Fi. Now that you have a firm grip on what Wi-Fi is exactly and how it works, we can start diving into more advance topics on how to hack Wi-Fi. In
Wireless Hacking: Cracking the WPA2-PSK with aircrack-ng
When Wi-Fi was first developed in the late 1990s, Wired Equivalent Privacy (WEP) was created to give wireless communications confidentiality. WEP, as it became known, proved terribly flawed and easily cracked. As a replacement, most wireless access points now use Wi-Fi Protected Access 2 with a pre-shared key for wireless
Wireless Hacking: How to Hack a Wi-Fi AP without Cracking Passwords
Welcome back, my tenderfoot hackers! Do you need to get a Wi-Fi password but don’t have the time to crack it? In previous tutorials, I have shown how to crack WEP, WPA2, and WPS, but some people have complained that cracking WPA2 takes too long and that not all access
Wi-Fi (802.11) Hacking: How to Hack the WPS PIN with Reaver
Welcome back, my budding hackers! One of the most popular areas for those starting out in this discipline is hacking Wi-Fi. Wi-Fi has been rife with vulnerabilities and insecurities over the years and nearly everyone wants to take advantage of this. When Wi-Fi was first developed in the late 90’s,
Wi-Fi Hacking: Using wifite for Multiple Attack Strategies against Wi-Fi AP’s
Welcome back, my aspiring cyberwarriors! Often, when doing a pentest, we have multiple Wi-Fi access points to test for security. Rather than testing each one individually with tools such as aircrack-ng, Reaver, pyrit, and hcxdumptool, and others, we can automate that testing with a single tool such as wifite. Wifite
Wi-Fi Hacking, Part 11: The PMKID Attack
Welcome back, my aspiring cyber warriors! As you know, the key to hacking the WPA2-PSK is to capture the PSK (pre-shared key or password) as it passes through the air in the 4-way handshake between the client and the AP (you must be in monitor mode to do so). This
Wireless Hacking, Part 10: Creating an Evil Twin Wi-Fi AP to Eavesdrop on the Target’s Traffic
Welcome back, my aspiring cyber warriors! There are a multitude of strategies and techniques for hacking wireless networks. You can see a list of the tutorials in the Wireless Hacking section here on Hackers-Arise. Here, we will look at one more technique for hacking Wi-Fi for spying on the target’s
Wi-Fi (802.11) Hacking Strategies
Many beginners come here looking to hack Wi-Fi, but have no idea where or how to start. Not every hack will work under every circumstance, so choosing the right strategy is more likely to lead to success and less wasted hours and frustration. Here, I will lay out the strategies
Evading Wireless Authentication with ICMPTX
In previous Wi-Fi hacking tutorials, I have shown you ways to create an Evil Twin, to DoS a wireless AP, and to crack WEP and WPA2 passwords, but in this tutorial, I will show you something a little bit different. In many restaurants, hotels, airports, airplanes, and cafes, they have
Wireless Hacking with WifiPhisher
In previous tutorials, I have shown how to crack WEP, WPA2, and WPS, but some people have complained that cracking WPA2 takes too long and that not all access points have WPS enabled (even though quite a few do). To help out in these situations, I present to you an almost
Wi-Fi Hacking, Part 17: Wi-Fi Hacking with Bettercap
Welcome back my aspiring cyberwarriors! In this series on Wi-Fi (802.11) hacking, we have examined a multitude of approaches to Wi-Fi hacking including; Wireless Hacking Strategies Getting Started with aircrack-ng Hacking WPA2-PSK Continuous DoSing of a Wireless AP Hacking WPS with Reaver Hacking WPA2-PSK without Password Cracking Evading Wi-Fi Authentication
Wi-Fi Hacking: Inside DragonFly, the WPA3’s Next-Gen Wireless Authentication Protocol
Welcome back, aspiring cyberwarriors! On June 25, 2018, the Wi-Fi Alliance officially introduced WPA3, a new era for wireless security. While WPA2 has dominated the landscape for over a decade, the world has changed, threats have evolved, and so has the need for more robust authentication. At the core of
Wi-Fi Hacking: The Nearest Neighbor Attack, Attacking Your Neighbor Through the Backdoor
Welcome back, my aspiring cyberwarriors! Since the beginning of the introduction of Wi-Fi in the 1990’s, Wi-Fi attacks have been limited geographically. In other words, you can attack Wi-Fi and those connected to it, if you are in the range of the Wi-Fi signal or about 100 meters. Now, we
Wi-Fi Hacking: Attacking Air-Gapped Systems via Wi-Fi Emissions
Welcome Back, my aspiring cyberwarriors! One of the tried and true rules of cybersecurity is that if you air-gap your systems and network then you are safe. That was largely true until now! Most famously, Iran had air-gapped their nuclear facilities at Natanz and yet Stuxnet was still able to
Wi-Fi Hacking: Dragonblood Attacks against WPA3
Welcome back, aspiring cyberwarriors! In a previous article, we examined the core of WPA3 – the Simultaneous Authentication of Equals (SAE) handshake, also known as Dragonfly. This mechanism replaced WPA2’s vulnerable Pre-Shared Key (PSK) authentication and enhanced overall security. However, within a year of deployment, security researchers identified a comprehensive
Can Hackers “See” Inside Your Home Using Wi-Fi to Track Your Location and Movement?
Welcome back, my aspiring cyberwarriors! The quick answer is “Yes!”. It might seem like science fiction, but now we have the capability to “see” through walls and track the location and movement of targets. This is thanks to new technological developments in both artificial intelligence and SDR. Remember, Wi-Fi is
Python Basics for Hackers: Building a Wi-Fi Scanner Capable of Locating the Position of Local AP’s
Hackers Arise Wi-Fi Radar Welcome back, aspiring cyberwarriors! One of our advanced student who goes by the handle Mike211 has developed a Wi-Fi scanning script that we want to share with all of you. What makes this script different and special is it’s ability to locate the Wi-Fi access points
Learn more in the course: