How to Steal Wi-Fi Passwords with an Evil Twin Attack April 17, 2018Wi-Fi networks can be set up by smart IT people, but that doesn't mean the users of the network are similarly tech-savvy. We'll demonstrate how an evil twin attack can...
How to Create Custom Wordlists for Password Cracking with the Mentalist April 17, 2018Beginners learning brute-forcing attacks against WPA handshakes are often let down by the limitations of default wordlists like RockYou based on stolen passwords. The science of brute-forcing goes beyond using...
Hack WPA & WPA2 Wi-Fi passwords with a Pixie-Dust attack using Airgeddon March 18, 2018If you're squaring up against a WPA or WPA2 network with a strong password, you may feel like you're at the end of your options if you can't brute-force or...
Hack Hotel, Airplane & Coffee Shop Hotspots for Free Wi-Fi with MAC Spoofing March 18, 2018Ever been stuck behind a login portal after connecting to supposedly "open" Wi-Fi? This can happen on airplanes, in hotels or airports, or even at coffee shops that force you...
How to Use Kismet to Find & Monitor Nearby Wi-Fi Devices February 28, 2018Kismet can detect any nearby devices that use Wi-Fi, whether they are connected or not. This ability lets us scan the nearby area for both APs and client devices, and...
Shut Down Phishing with U2F Security Keys & Google's Advanced Protection Program February 28, 2018Phishing is the most common attack most internet users face, but important users like business executives, journalists, activists, and government workers face additional risks. Sophisticated, targeted phishing and whaling attacks...