Wifiphisher is a security tool that mounts fast automated phishing attacks against WiFi networks in order to obtain secret passphrases and other credentials. It is a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way for obtaining credentials from captive portals and third party login pages or WPA/WPA2 secret passphrases.

Wifiphisher works on Kali Linux and is licensed under the MIT license.

The Asahi Soft Drinks company installs and stocks thousands of vending machines across Japan. It has decided that in future new vending machines will come pre-installed with the kit necessary to act as a Wi-Fi hotspot. In so doing, anyone within 50 meters of a machine will be able to connect for free and surf the web. The only limit seems to be an auto cut-off after 30 minutes, but you can just re-connect if you need to.

Serval enables mobile communications no matter what your circumstance: mobile communications in the face of disaster, in the face of poverty, in the face of isolation, in the face of civil unrest, or in the face of network black-spots. In short, Serval provides resilient mobile communications for all people, anywhere in the universe.

Serval technology bridges the digital divide. We have proved that it is possible, using open source technology to create a mobile communications platform that benefits everyone, for all time, and changes the nature of telecommunications forever.

A Bash script aimed at making the Wireless Hacking process a lot easier.

Almost every evening, between 8:30 and 10:00, my Wi-Fi just dies. This, in itself, could be explained by a crappy Wi-Fi source or some hardware failure, except that I know both of my neighbors are experiencing the same loss of signal at the same time. While the Wi-Fi is down, the LAN is OK, and anything plugged into Cat5 can access the Internet just fine. One possibility comes to mind — perhaps some other neighbor arrives home and turns on their router from 8:30 to 10:00? And something in their signal is hosing our Wi-Fi? I have tried looking around for software to help identify the source of interference, but either the programs are ridiculously expensive for a home user, or else my card (Intel Link 1000 BGN) isn't supported. (Netstumbler is an example of the latter.) Any suggestions on how I can track this down?

Welcome to backtrack-linux.org, the highest rated and acclaimed Linux security distribution to date. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack your primary operating system, booting from a LiveDVD, or using your favorite thumbdrive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.

The hack is not a complete break; it only results in the ability to read and falsify particular short data packets, but cannot retrieve a WPA encryption key. Still, the rapid development of WPA hacks suggests that those paranoid about security ensure that their WiFi networks are using WPA2 with AES encryption rather than WPA with TKIP.

Installing DD-WRT on a router in most cases is almost as simple as installing a program onto your computer. Installing programs on a router, known as firmware, are achieved by a method called flashing. This article helps you determine which installation process is for you on your supported router, as well as giving router suggestions and information about flashing each one.

Courts in recent years have been raising the evidentiary bar law enforcement agents must meet in order to obtain historical cell phone records that reveal information about a target's location. But documents obtained by civil liberties groups under a Freedom of Information Act request suggest that "triggerfish" technology can be used to pinpoint cell phones without involving cell phone providers at all.

This Baracoda CompactFlash card eliminates proprietary cables and allows mobile users to connect to mobile computing devices wirelessly and effortlessly.

1–10 (17)   Next >   Last >|