-
THREADS
In computer science, a thread of execution is the smallest sequence of programmed instructions that can be managed independently by a scheduler, which is typically a part of the operating system.The implementation of threads and processes differs between operating systems, but in most cases a thread is a component of...
-
WPA ENTERPRISE CRACKING (Part-4)
In our earlier writeups I have discussed how to gain access on WPA/WPA2 networks so all WPA/WPA2 networks use PSK(pre shared key) authetication there is only one key which is used to authenticate users and router manages authetication so in this post we are going discusse on WPA ENTERPRISE which...
-
MAC CHANGER USING PYTHON
Let’s first discuss on MAC Address in brief , so MAC stands for Media Access Control which is : Unique Permanent Physical and Assigned By Manufacturer ######So why we need to change our MAC Adress ? The answer is very simple : Increase Anonmity Impersonate other device ByPass Filters You...
-
CAPTIVE PORTALS (Part-3)
This is part-3 on wifi-cracking and in this writeup we will be discussing on CAPTIVE PORTALS networks. Lets move directly to the CAPTIVE PORTALS this are usually the open wifi networks, widely used in hotels, airports, coffeeshops etc.They allow users to access the internet after logging in using web interface....
-
WPA/WPA2 CRACKING (PART-2)
This is part-2 on wifi-cracking and in this writeup we will be discussing on WPA/WPA2 networks. NOTE: always check your wireless adapter mode is set to managed before connecting to network because you can’t connect to network in monitor mode its only used for packet capture purpose and you can...
-
WIFI CRACKING (Part-1)
In this writeup we are going to learn how to gain access on networks and bypass their security features , we will be covering following types of networks: Target Hidden networks Bypass MAC filtering Methods to gain access on Captive portals WEP, WPA, WPA2 Fake Access Points WPA Enterprise these...