Wifiphisher is a security tool that mounts fast automated phishing attacks against WiFi networks in order to obtain secret passphrases and other credentials. It is a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way for obtaining credentials from captive portals and third party login pages or WPA/WPA2 secret passphrases.

Wifiphisher works on Kali Linux and is licensed under the MIT license.

Of particular concern are newer Android gadgets, specifically those running Android 3.1 "Honeycomb" or later. That version of the Google OS introduced a feature called Preferred Network Offload (PNO), which has a habit of broadcasting the names of the last 15 Wi-Fi networks a device has joined, even when the screen is off.

The idea is to conserve battery by allowing a phone to connect to known Wi-Fi networks even while in sleep mode, since Wi-Fi uses less power than the mobile data radio. The problem, the EFF says, is that your wireless network history can give a worryingly accurate and thorough picture of your movements.

Now, when a traveler arrives at a Japanese airport, they can present their passport and register for a Wi-Fi card that offers free Wi-Fi coverage via 45,000 hot spots in the eastern Japan area including Tokyo, Hakone, Mt. Fuji, Yokohama, Nagano, Nikko, Kusatsu, Tohoku, Hokkaido and Fukushima.

The Asahi Soft Drinks company installs and stocks thousands of vending machines across Japan. It has decided that in future new vending machines will come pre-installed with the kit necessary to act as a Wi-Fi hotspot. In so doing, anyone within 50 meters of a machine will be able to connect for free and surf the web. The only limit seems to be an auto cut-off after 30 minutes, but you can just re-connect if you need to.

A Bash script aimed at making the Wireless Hacking process a lot easier.

Tokyo's utter lack of WiFi hotspots is a constant thorn in the side of wired warriors, but here's a list of spots you can actually find some signal to mooch.

Mobile phone giant NTT Docomo and Tokyo taxi service Tokyo Musen have teamed up to provide that rarest of things in Tokyo -- free Wi-Fi.

Some 820 Tokyo taxis have been installed with the technology on a trial basis until the end of March 2011 and 100 of the taxis also have PSP Go devices on board so that users can play games while going for a ride.

The trial aims to find out what the demand is for Wi-Fi while on the go, and could see the service expand after March.

Almost every evening, between 8:30 and 10:00, my Wi-Fi just dies. This, in itself, could be explained by a crappy Wi-Fi source or some hardware failure, except that I know both of my neighbors are experiencing the same loss of signal at the same time. While the Wi-Fi is down, the LAN is OK, and anything plugged into Cat5 can access the Internet just fine. One possibility comes to mind — perhaps some other neighbor arrives home and turns on their router from 8:30 to 10:00? And something in their signal is hosing our Wi-Fi? I have tried looking around for software to help identify the source of interference, but either the programs are ridiculously expensive for a home user, or else my card (Intel Link 1000 BGN) isn't supported. (Netstumbler is an example of the latter.) Any suggestions on how I can track this down?

Germany's top criminal court ruled Wednesday that Internet users need to secure their private wireless connections by password to prevent unauthorized people from using their Web access to illegally download data.

Internet users can be fined up to euro100 ($126) if a third party takes advantage of their unprotected WLAN connection to illegally download music or other files, the Karlsruhe-based court said in its verdict.

Welcome to backtrack-linux.org, the highest rated and acclaimed Linux security distribution to date. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack your primary operating system, booting from a LiveDVD, or using your favorite thumbdrive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.

1–10 (19)   Next >   Last >|