Jump to content
LeVeL23HackTools
  • Sign Up

Search the Community

Showing results for tags 'wifi'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 18 results

  1. WiFiBroot - A WiFi Pentest Cracking Tool For WPA/WPA2 WiFiBroot is built to provide clients all-in-one facility for cracking WiFi (WPA/WPA2) networks. It heavily depends on scapy, a well-featured packet manipulation library in Python. It currently provides four independent working modes to deal with the target networks. Two of them are online cracking methods while the other runs in offline mode. The offline mode is provided to crack saved hashes from the first two modes. One is for deauthentication attack on wireless network and can also b e used as a jamming handler. It can be run on a variety of linux platforms and atleast requires WN727N from tp-link to properly operate. [Hidden Content]
  2. Multiple Bugs in Canon DSLR Camera Let Hackers Infect with Ransomware Over a Rouge WiFi Access Point * Researchers discovered multiple critical vulnerabilities in Picture Transfer Protocol (PTP) that allows attackers to infect the Canon DSLR camera with ransomware to encrypt the pictures and demand the ransom. * An attacker who is very close with the victim’s WiFi or already hijacked computers with the USB access could propagate them to infect the cameras with deadly malware and ransomware.
  3. WiFiBroot - A WiFi Pentest Cracking Tool For WPA/WPA2 (Handshake, PMKID, Cracking, EAPOL, Deauthentication) WiFiBroot is built to provide clients all-in-one facility for cracking WiFi (WPA/WPA2) networks. It heavily depends on scapy, a well-featured packet manipulation library in Python. Almost every process within is dependent somehow on scapy layers and other functions except for operating the wireless interface on a different channel. That will be done via native linux command iwconfig for which you maybe need sudo privileges. It currently provides four independent working modes to deal with the target networks. Two of them are online cracking methods while the other runs in offline mode. The offline mode is provided to crack saved hashes from the first two modes. One is for deauthentication attack on wireless network and can also b e used as a jamming handler. It can be run on a variety of linux platforms and atleast requires WN727N from tp-link to properly operate. [HIDE][Hidden Content]]
  4. StrongCore

    Comcast Internet Wifi

    [Hidden Content]
  5. StrongCore

    Xfinity Wifi 1x

    [Hidden Content]
  6. Netgear WiFi router versions JWNR2010v5 and R6080 suffer from authentication bypass vulnerabilities. View the full article
  7. What will be on the course: Understanding the secure configuration of the wireless router Arsenal necessary "Ethical WiFi hacker" Collecting a password from open sources Router security audit Hacking WEP encryption Hacking WPA encryption DoS attacks on access point Creating your own dictionaries for brutfors Online decryption services Evil Twin attacks on TD Much more! [HIDE][Hidden Content]]
  8. Telus Actiontec T2200H with firmware T2200H-31.128L.08 suffers from a credential disclosure vulnerability. An HTTP interface used by wireless extenders to pull the modem's wifi settings uses DHCP client-provided option values to restrict access to this API. By forging DHCP packets, one can access this interface without any authentication and obtain details such as SSID name, encryption type, and WPA/WEP keys. This can be leveraged if an attacker is on the same Layer 2 network as the modem. View the full article
  9. Introduction Airgeddon is a multi-use bash script for WiFi network security auditing on Linux systems. This multi-purpose WiFi hacking tool has very rich features which supports multiple methods for WiFi hacking including multiple WPS hacking modes, all-in-one WEP attack, handshake file capturing, Evil Twin attacks, Pixie Dust attacks, and so much more (see features below). Features: Monitor-managed: interface mode switcher. Multiple configurable options, multilang support, auto update, HTTP proxy auto detection for updates, and so much more. WPA/WPA2 personal networks Handshake file capturing. Cleaning and optimizing Handshake captured files Evil Twin attacks [Rogue AP]: Integrated sniffing, sslstrip2, BeEF with Hostapd + DHCP + DoS + Ettercap + Sslstrip + BeEF; WiFi password capturing through captive portal with DNS blackhole; optional MAC spoofing. WPS cracking: WPS scanning, Pixie Dust attacks, Brute-force PIN attacks [Bully, Reaver], WPS PINs attacks. WEP All-in-One attack: combining different techniques: Chop-Chop, Caffe Latte, ARP Replay, Hirte, Fragmentation, Fake association, etc. DoS over wireless networks using different methods [DOS Pursuit Mode]. Comptaibility: Many Linux distros, iptables/nftables. [HIDE][Hidden Content]]
  10. itsMe

    WiFi Hacker

    Shell Script For Attacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2) [Hidden Content]
  11. ## AtEar AtEar is a scalable and efficient system, and also the first web-based wireless vulnerability assessment solution. This Wireless Vulnerability Analysis/Management Solution, AtEar, can be utilized both by businesses and in the home. For business use, AtEar utilizes fingerprint devices for access to the network and to analyze the current wireless network conditions. The automatic penetration testing function makes it possible to analyze wireless vulnerability conveniently and meticulously. AtEar for home networks inspects network security conditions and monitors for any unregistered devices. Intro In short, AtEar is a wireless pentest system. AtEar provides a web-based user interface. AtEar is easy and fast to use. Is your company’s wireless network secure? AtEar helps keep your wireless network safe from hackers and intruders. Operation Video Operation Video Link AtEar Features Wireless Scanning(Ad-Hoc, Station, Access Point, Soft-Acess Point) Wireless Chart(Channel, Encryption, Type) Wireless Pentesting(WEP, WPA1, WPA2) Network Information Getting(IP, Connected Host Info) Fake AP Google Phishing Sites Facebook Phishing Sites Twitter Phishing Sites WIDS(Wireless intrusion detection system) Disassocation Flood Deauth Flood WESSID-NG Attack Koreck Chopchop attack Fragmentation PGRA Attack MDK MICHEAL SHUTDOWN Exploitation TKIP Attack Attack By TKIPUN-NG Authentication DOS Attack Assocation Flood High Amount of Assocation Sent Suspect Rouge AP Detected Beacon Flood These features will be released this month. Network Pentesting FTP Brute Force SSH Brute Force Telnet Brute Force SMTP Brute Force POP Brute Force IMAP Brute Force LDAP Brute Force SMB Brute Force rlogin Brute Force MSSQL Brute Force MYSQL Brute Force PGSQL Brute Force VNC Brute Force SNMP Brute Force [Hidden Content]
  12. Hack Wifi using WifiSlax 4.11 by using Linset The other WiFi cracking softwares normally work well on WEB or WPA security. WifiSlax is different since it can attack WPA2 by some different methods. In this post, I will introduce Linset, which will make all clients be disconnected to the targeted WiFi network first, then motivate them to connect to a protected fake WiFi Network in exactly the same name. The software will record the Entered password by clients. It takes minutes or even hours to get the result. However, the Wifi Hacker tools are free to download, and the method is simple to do in the following steps. Just be patient and you will get it done. By using an Bootable USB, we can boot WifiSlax on both Mac or Windows PC. At for Mac, after press the Power button, just keep holding the Option key to go to the Boot menu. In this instruction, we did on a Windows Laptop. Step 1: Turn Off the Laptop, plug the USB into, then boot into the USB. From the wifiSlax screen, select the third line to go to English Menus. Step 2: Then select the first Line to start running wifiSlax OS Step 3: Select Wifislax With KDE Desktop Step 4: Wait for seconds to go to Wifislax Dektop Step 5: There are ways to crack WiFi Networks using this software. In the range of this writing, I will do with Linset: Start -> WifiSlax -> Wpa -> Linset -> Enter. Step 6: This step, WiFi Cards will be shown up. Enter the order number of the Cards (in the case you have more than one WiFi cards). I entered 1. Step 7: Enter 1 to get the available WiFi networks list. The list of WiFi networks around you will appear, press Ctrl+ C to stop scanning more. Step 8: Choose the targeted WiFi by Enter the order number. I wanted to hack the WiFi named “lte”, so I enter 14. Step 9: Choose Hostapd by entering 1. Step 10: Enter 1 to choose Estricte. In this step, choosing 4 will go back WiFi list, and choosing 5 will end the program. Step 12: The airodump-ng will appear to catch WPA Handshake. If in this step, WPA Handshake can not be realized, go back to step 10 and chose number 2. Step 13: Enter 1 to choose Si Step 14: Enter 1 to choose Interface web moutra Step 15: Choose the language by enter the corresponding number, then take a sleep to see the result soon. Step 16: Linset now will make the Laptops or Smart phones which is connecting to the targeted WiFi network, then generate a fake WiFi Network to ask them to join. Step 17: The client will see the two WiFi Network in the same name. They tend to enter the password to attempt connect to both real WiFi Network and the Fake one. Linset will automatically catch the Password information Entered by the client. The WiFi Password is hacked successfully
  13. Jiofi 4 (JMR 1140) with firmware version Amtel_JMR1140_R12.07 suffers from a WiFi password disclosure cross site request forgery vulnerability. View the full article
  14. Open source network observation, positioning, and display client from the world's largest queryable database of wireless networks. Can be used for site-survey, security analysis, and competition with your friends. Collect networks for personal research or upload to [Hidden Content]. WiGLE has been collecting and mapping network data since 2001, and currently has over 350m networks. WiGLE is *not* a list of networks you can use. Uses GPS to estimate locations of observed networks. Observations logged to local database to track your networks found. Upload and compete on the global WiGLE.net leaderboard. Real-time map of networks found, with overlays from entire WiGLE dataset. Free, open source, no ads (pull requestes welcome at [Hidden Content] ). Export to CSV files on SD card (comma separated values). Export to KML files on SD card (to import into Google Maps/Earth). Bluetooth GPS support through mock locations. Audio and Text-to-Speech alerting and "Mute" option to shut off all sound/speech. [HIDE][Hidden Content]]
  15. Heatmiser Wifi Thermostat version 1.7 suffers from a cross site request forgery vulnerability. View the full article
  16. Level23HackTool

    Hack wifi network

    [Hidden Content]
  17. NETGEAR WiFi Router R6120 suffers from a credential disclosure vulnerability. View the full article
  18. If you are tired of queuing at security checkpoints at airports, stations or museums you are in luck. A team of researchers has found the definitive method to snoop on your bags without even having to touch you. It is cheap, accurate and works on wifi. The method is so good that it has already been awarded the first prize at the recent IEEE Conference on Telecommunications and Network Security held this year in Beijing. In fact it is so simple that it is hard to believe that it has not occurred to anyone before. The signal of WiFi networks bounces off objects of a certain density, but crosses the finest and lightest cleanly. Researchers have discovered that the waves of WiFi networks penetrate perfectly in bags, suitcases and backpacks. Analyzing the way they bounce off the objects inside these containers, the authors of the study have been able to determine if the backpack has metal objects or liquids. The tests have been made with 15 different objects in six different types of bags, suitcases and backpacks. In plastic bags, the accuracy with which suspicious objects are detected as electronic or explosive devices is 99%. Metal objects are identified by 98%, and liquids by 95%. This effectiveness is reduced to 90% in suitcases or if the object is wrapped in several layers of materials that hinder the passage of waves. All in all, it remains a more than applicable precision in a real environment. The authors of the study explain that their technique does not completely replace safety records, but minimizes them because it allows them to direct people carrying suspicious objects to the safety line and let the rest pass with the assurance that they do not carry anything dangerous . The technique only involves installing three additional WiFi antennas and works on any existing network. It is cheap and can detect explosives, weapons, bulky metal objects and even acids or drugs. The next step is to adjust the system to determine the exact shape of the object and the amount of liquid.
×

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.