Search the Community

Showing results for tags 'wifi'.

The search index is currently processing. Current results may not be complete.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 28 results

  1. dEEpEst

    Big List of Wifi Tools

    Bɪɢ ʟɪsᴛ ᴏғ Wɪғɪ ᴛᴏᴏʟs ᴡɪғɪ ᴀʀsᴇɴᴀʟ ɪs ᴀ ᴘᴀᴄᴋ ᴏғ ᴠᴀʀɪᴏᴜs ᴜsᴇғᴜʟʟ/ᴜsᴇʟᴇss ᴛᴏᴏʟs ғᴏʀ 802.11 ʜᴀᴄᴋɪɴɢ [Hidden Content]
  2. 0x1

    Sparrow Wifi

    Sparrow Wifi - Graphical WiFi Analyzer for Linux Next-Gen GUI-based WiFi And Bluetooth Analyzer For Linux Sparrow-wifi has been built from the ground up to be the next generation 2.4 GHz and 5 GHz Wifi spectral awareness tool. At its most basic it provides a more comprehensive GUI-based replacement for tools like inSSIDer and linssid that runs specifically on linux. In its most comprehensive use cases, sparrow-wifi integrates wifi, software-defined radio (hackrf), advanced bluetooth tools (traditional and Ubertooth), traditional GPS (via gpsd), and drone/rover GPS via mavlink in one solution. [NOTE: Check the Raspberry Pi section for updates. A setup script is now included to get the project running on Raspbian Stretch.] Written entirely in Python3, Sparrow-wifi has been designed for the following scenarios: Basic wifi SSID identification Wifi source hunt - Switch from normal to hunt mode to get multiple samples per second and use the telemetry windows to track a wifi source 2.4 GHz and 5 GHz spectrum view - Overlay spectrums from Ubertooth (2.4 GHz) or HackRF (2.4 GHz and 5 GHz) in real time on top of the wifi spectrum (invaluable in poor connectivity troubleshooting when overlapping wifi doesn't seem to be the cause) Bluetooth identification - LE advertisement listening with standard bluetooth, full promiscuous mode in LE and classic bluetooth with Ubertooth Bluetooth source hunt - Track LE advertisement sources or iBeacons with the telemetry window iBeacon advertisement - Advertise your own iBeacons Remote operations - An agent is included that provides all of the GUI functionality via a remote agent the GUI can talk to. Drone/Rover operations - The agent can be run on systems such as a Raspberry Pi and flown on a drone (its made several flights on a Solo 3DR), or attached to a rover in either GUI-controlled or autonomous scan/record modes. The remote agent is JSON-based so it can be integrated with other applications Import/Export - Ability to import and export to/from CSV and JSON for easy integration and revisiualization. You can also just run 'iw dev scan' and save it to a file and import that as well. Produce Google maps when GPS coordinates are available for both discovered SSID's / bluetooth devices or to plot the wifi telemetry over time. Running sparrow-wifi sudo ./ More info && Download: [hide][Hidden Content]]
  3. dEEpEst

    How to Hack Wifi

    [Hidden Content]
  4. In this course, I have talked about the underlying concepts of what happens when we type in a password from a phone or a PC and click on "Connect to WiFi". Starting from How passwords are stored and as days went by, how passwords are not directly shared over the Wires or Wireless, instead how Authentication is done by using Hashes, and just for Authentications, How using a hash could be risk worthy and the way to bypass that and how all of those vectors round up to the building blocks of a WPA2 Personal transaction. Then I have described how exactly the popular WPA2 Password Cracking works by using the AirCrack package. In short, This tutorial is a "Behind the Scenes" of a Wireless Crack Attempt. [hide] [Hidden Content] [/Hide[
  5. HOW TO HACK WIFI ( Even WPA2 ) *This Guide Will Show You How To Hack Wifi Including All Securities Even WPA2 With Tools. [Hidden Content]
  6. Hashcatch deauthenticates clients connected to all nearby WiFi networks and try to capture the handshakes. It can be used in any Linux device including Raspberry Pi and Nethunter devices so that you can capture handshakes while walking your dog Written by @SivaneshAshok Features to be added PMKID attack Pixiedust attack for WPS enabled networks More location features Automatically check handshakes with a rainbow table [HIDE] [Hidden Content] [Hidden Content]]
  7. WiFiBroot - A WiFi Pentest Cracking Tool For WPA/WPA2 WiFiBroot is built to provide clients all-in-one facility for cracking WiFi (WPA/WPA2) networks. It heavily depends on scapy, a well-featured packet manipulation library in Python. It currently provides four independent working modes to deal with the target networks. Two of them are online cracking methods while the other runs in offline mode. The offline mode is provided to crack saved hashes from the first two modes. One is for deauthentication attack on wireless network and can also b e used as a jamming handler. It can be run on a variety of linux platforms and atleast requires WN727N from tp-link to properly operate. [Hidden Content]
  8. Multiple Bugs in Canon DSLR Camera Let Hackers Infect with Ransomware Over a Rouge WiFi Access Point * Researchers discovered multiple critical vulnerabilities in Picture Transfer Protocol (PTP) that allows attackers to infect the Canon DSLR camera with ransomware to encrypt the pictures and demand the ransom. * An attacker who is very close with the victim’s WiFi or already hijacked computers with the USB access could propagate them to infect the cameras with deadly malware and ransomware.
  9. WiFiBroot - A WiFi Pentest Cracking Tool For WPA/WPA2 (Handshake, PMKID, Cracking, EAPOL, Deauthentication) WiFiBroot is built to provide clients all-in-one facility for cracking WiFi (WPA/WPA2) networks. It heavily depends on scapy, a well-featured packet manipulation library in Python. Almost every process within is dependent somehow on scapy layers and other functions except for operating the wireless interface on a different channel. That will be done via native linux command iwconfig for which you maybe need sudo privileges. It currently provides four independent working modes to deal with the target networks. Two of them are online cracking methods while the other runs in offline mode. The offline mode is provided to crack saved hashes from the first two modes. One is for deauthentication attack on wireless network and can also b e used as a jamming handler. It can be run on a variety of linux platforms and atleast requires WN727N from tp-link to properly operate. [HIDE][Hidden Content]]
  10. StrongCore

    Comcast Internet Wifi

    [Hidden Content]
  11. StrongCore

    Xfinity Wifi 1x

    [Hidden Content]
  12. Netgear WiFi router versions JWNR2010v5 and R6080 suffer from authentication bypass vulnerabilities. View the full article
  13. What will be on the course: Understanding the secure configuration of the wireless router Arsenal necessary "Ethical WiFi hacker" Collecting a password from open sources Router security audit Hacking WEP encryption Hacking WPA encryption DoS attacks on access point Creating your own dictionaries for brutfors Online decryption services Evil Twin attacks on TD Much more! [HIDE][Hidden Content]]
  14. Telus Actiontec T2200H with firmware T2200H-31.128L.08 suffers from a credential disclosure vulnerability. An HTTP interface used by wireless extenders to pull the modem's wifi settings uses DHCP client-provided option values to restrict access to this API. By forging DHCP packets, one can access this interface without any authentication and obtain details such as SSID name, encryption type, and WPA/WEP keys. This can be leveraged if an attacker is on the same Layer 2 network as the modem. View the full article
  15. Introduction Airgeddon is a multi-use bash script for WiFi network security auditing on Linux systems. This multi-purpose WiFi hacking tool has very rich features which supports multiple methods for WiFi hacking including multiple WPS hacking modes, all-in-one WEP attack, handshake file capturing, Evil Twin attacks, Pixie Dust attacks, and so much more (see features below). Features: Monitor-managed: interface mode switcher. Multiple configurable options, multilang support, auto update, HTTP proxy auto detection for updates, and so much more. WPA/WPA2 personal networks Handshake file capturing. Cleaning and optimizing Handshake captured files Evil Twin attacks [Rogue AP]: Integrated sniffing, sslstrip2, BeEF with Hostapd + DHCP + DoS + Ettercap + Sslstrip + BeEF; WiFi password capturing through captive portal with DNS blackhole; optional MAC spoofing. WPS cracking: WPS scanning, Pixie Dust attacks, Brute-force PIN attacks [Bully, Reaver], WPS PINs attacks. WEP All-in-One attack: combining different techniques: Chop-Chop, Caffe Latte, ARP Replay, Hirte, Fragmentation, Fake association, etc. DoS over wireless networks using different methods [DOS Pursuit Mode]. Comptaibility: Many Linux distros, iptables/nftables. [HIDE][Hidden Content]]
  16. itsMe

    WiFi Hacker

    Shell Script For Attacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2) [Hidden Content]
  17. ## AtEar AtEar is a scalable and efficient system, and also the first web-based wireless vulnerability assessment solution. This Wireless Vulnerability Analysis/Management Solution, AtEar, can be utilized both by businesses and in the home. For business use, AtEar utilizes fingerprint devices for access to the network and to analyze the current wireless network conditions. The automatic penetration testing function makes it possible to analyze wireless vulnerability conveniently and meticulously. AtEar for home networks inspects network security conditions and monitors for any unregistered devices. Intro In short, AtEar is a wireless pentest system. AtEar provides a web-based user interface. AtEar is easy and fast to use. Is your company’s wireless network secure? AtEar helps keep your wireless network safe from hackers and intruders. Operation Video Operation Video Link AtEar Features Wireless Scanning(Ad-Hoc, Station, Access Point, Soft-Acess Point) Wireless Chart(Channel, Encryption, Type) Wireless Pentesting(WEP, WPA1, WPA2) Network Information Getting(IP, Connected Host Info) Fake AP Google Phishing Sites Facebook Phishing Sites Twitter Phishing Sites WIDS(Wireless intrusion detection system) Disassocation Flood Deauth Flood WESSID-NG Attack Koreck Chopchop attack Fragmentation PGRA Attack MDK MICHEAL SHUTDOWN Exploitation TKIP Attack Attack By TKIPUN-NG Authentication DOS Attack Assocation Flood High Amount of Assocation Sent Suspect Rouge AP Detected Beacon Flood These features will be released this month. Network Pentesting FTP Brute Force SSH Brute Force Telnet Brute Force SMTP Brute Force POP Brute Force IMAP Brute Force LDAP Brute Force SMB Brute Force rlogin Brute Force MSSQL Brute Force MYSQL Brute Force PGSQL Brute Force VNC Brute Force SNMP Brute Force [Hidden Content]
  18. Hack Wifi using WifiSlax 4.11 by using Linset The other WiFi cracking softwares normally work well on WEB or WPA security. WifiSlax is different since it can attack WPA2 by some different methods. In this post, I will introduce Linset, which will make all clients be disconnected to the targeted WiFi network first, then motivate them to connect to a protected fake WiFi Network in exactly the same name. The software will record the Entered password by clients. It takes minutes or even hours to get the result. However, the Wifi Hacker tools are free to download, and the method is simple to do in the following steps. Just be patient and you will get it done. By using an Bootable USB, we can boot WifiSlax on both Mac or Windows PC. At for Mac, after press the Power button, just keep holding the Option key to go to the Boot menu. In this instruction, we did on a Windows Laptop. Step 1: Turn Off the Laptop, plug the USB into, then boot into the USB. From the wifiSlax screen, select the third line to go to English Menus. Step 2: Then select the first Line to start running wifiSlax OS Step 3: Select Wifislax With KDE Desktop Step 4: Wait for seconds to go to Wifislax Dektop Step 5: There are ways to crack WiFi Networks using this software. In the range of this writing, I will do with Linset: Start -> WifiSlax -> Wpa -> Linset -> Enter. Step 6: This step, WiFi Cards will be shown up. Enter the order number of the Cards (in the case you have more than one WiFi cards). I entered 1. Step 7: Enter 1 to get the available WiFi networks list. The list of WiFi networks around you will appear, press Ctrl+ C to stop scanning more. Step 8: Choose the targeted WiFi by Enter the order number. I wanted to hack the WiFi named “lte”, so I enter 14. Step 9: Choose Hostapd by entering 1. Step 10: Enter 1 to choose Estricte. In this step, choosing 4 will go back WiFi list, and choosing 5 will end the program. Step 12: The airodump-ng will appear to catch WPA Handshake. If in this step, WPA Handshake can not be realized, go back to step 10 and chose number 2. Step 13: Enter 1 to choose Si Step 14: Enter 1 to choose Interface web moutra Step 15: Choose the language by enter the corresponding number, then take a sleep to see the result soon. Step 16: Linset now will make the Laptops or Smart phones which is connecting to the targeted WiFi network, then generate a fake WiFi Network to ask them to join. Step 17: The client will see the two WiFi Network in the same name. They tend to enter the password to attempt connect to both real WiFi Network and the Fake one. Linset will automatically catch the Password information Entered by the client. The WiFi Password is hacked successfully
  19. Jiofi 4 (JMR 1140) with firmware version Amtel_JMR1140_R12.07 suffers from a WiFi password disclosure cross site request forgery vulnerability. View the full article
  20. Open source network observation, positioning, and display client from the world's largest queryable database of wireless networks. Can be used for site-survey, security analysis, and competition with your friends. Collect networks for personal research or upload to [Hidden Content]. WiGLE has been collecting and mapping network data since 2001, and currently has over 350m networks. WiGLE is *not* a list of networks you can use. Uses GPS to estimate locations of observed networks. Observations logged to local database to track your networks found. Upload and compete on the global leaderboard. Real-time map of networks found, with overlays from entire WiGLE dataset. Free, open source, no ads (pull requestes welcome at [Hidden Content] ). Export to CSV files on SD card (comma separated values). Export to KML files on SD card (to import into Google Maps/Earth). Bluetooth GPS support through mock locations. Audio and Text-to-Speech alerting and "Mute" option to shut off all sound/speech. [HIDE][Hidden Content]]
  21. Heatmiser Wifi Thermostat version 1.7 suffers from a cross site request forgery vulnerability. View the full article
  22. Level23HackTool

    Hack wifi network

    [Hidden Content]