The Wandering Soul
The_Car_Hackers_Handbook_A_Guide_for_the_Penetration_Tester_PDF.pdf
a glimpse from the book
๐ฅ6
Mira
a nightmare
when i see this kind of things it reminds how i started my journey. here goes the story:
It was back then when i was 12 years old that my parents gave me a huawei smartphone. I didn't know what it is capable of and spent most of my day playing games. It was summer, and most of uni students were back home. Then i got the chance of spending a time with software engineering student at BDU. I wanted some apps from his phone, and sent what i thought at that time 'weird app' called "Github" accidentally. I heck knew nothing abt github nevertheless i created an account. It was back then and there was a limited access to Internet so that i needed to go to teachers' staff and local cafes. Unfortunately, it gets crowded everytime. I just said i gotta get what i came for, and that was the first time I did my first ever DoS attack. I used to filter their MAC address which uses high traffic and block them instantly. My first day in highschool i changed the networking scheme of the school and got almost suspended. I thought it was cool, and little did I know i was being very wrong.
TAKEAWAY: With every great power comes great responsibility. Think about your actions, because they have consequences. Just because you're capable of causing problem doesn't mean you gotta do it without proper authorization (new cyber-security professionals keep this in mind ๐)
#advices #thought
@Mi_Ra_Ch
It was back then when i was 12 years old that my parents gave me a huawei smartphone. I didn't know what it is capable of and spent most of my day playing games. It was summer, and most of uni students were back home. Then i got the chance of spending a time with software engineering student at BDU. I wanted some apps from his phone, and sent what i thought at that time 'weird app' called "Github" accidentally. I heck knew nothing abt github nevertheless i created an account. It was back then and there was a limited access to Internet so that i needed to go to teachers' staff and local cafes. Unfortunately, it gets crowded everytime. I just said i gotta get what i came for, and that was the first time I did my first ever DoS attack. I used to filter their MAC address which uses high traffic and block them instantly. My first day in highschool i changed the networking scheme of the school and got almost suspended. I thought it was cool, and little did I know i was being very wrong.
TAKEAWAY: With every great power comes great responsibility. Think about your actions, because they have consequences. Just because you're capable of causing problem doesn't mean you gotta do it without proper authorization (new cyber-security professionals keep this in mind ๐)
#advices #thought
@Mi_Ra_Ch
โก10๐2
Forwarded from Ge'ez Techยฎ แแแ แดแญ
#Tip
One of Beginners Problem is, they think we hack by tools, Nooooo way!
you hack if u understand the system and make ur brain do stuffs, rather than waiting bloodhound or Zap scan results.
The tools are just to make things quick and to check the thing in ur mind แฅแจแฎแ .
So next time u hack, try to understand the system(like the developer), undertand the functionality of all buttons ,link, redirections, popups, endpoints....
Then u can craft ur attacks with ur amazing tools๐
HAPPY HACKINGโค๏ธ
#geeztech @geeztechgroup
One of Beginners Problem is, they think we hack by tools, Nooooo way!
you hack if u understand the system and make ur brain do stuffs, rather than waiting bloodhound or Zap scan results.
The tools are just to make things quick and to check the thing in ur mind แฅแจแฎแ .
So next time u hack, try to understand the system(like the developer), undertand the functionality of all buttons ,link, redirections, popups, endpoints....
Then u can craft ur attacks with ur amazing tools๐
HAPPY HACKINGโค๏ธ
#geeztech @geeztechgroup
๐ฅ6
found this wandering through my older posts from different channels. Good books for data analytics
#dataAnalytics #dataScience #books
@Mi_Ra_Ch
#dataAnalytics #dataScience #books
@Mi_Ra_Ch
Bug Bounty Hunting for Web Security.pdf
8.9 MB
for someone who was listening to yesterday's codenight vc, this might be a great Book for BBP
#books
@Mi_Ra_Ch
#books
@Mi_Ra_Ch
โก9๐2
for now let us see the powerful tools when it comes to wireless attacks - Aerodump, Airplay, and Aircrack.
Aerodump is used for packet capturing and monitoring wireless networks. It scans for nearby networks, collects information about them (such as BSSID, channel, encryption type), and captures packets for further analysis. Imagine Aerodump as a special tool that helps you gather information from the air. It's like having a magical net that captures all the signals floating around in the air, like radio waves or Wi-Fi signals. With Aerodump, you can see (not directly through eyes lmao ๐คฃ) what's happening in the air and collect data without disturbing anything.
Airplay. think of Airplay as a way to send messages or signals through the air. it is used for deauthentication attacks, which force clients to disconnect from a network. deauthenticating a client means you can capture the WPA handshake when they reconnect (imagine deauthenticating peeps who are scrolling TikTok ๐).
Aircrack is a password cracking tool that uses brute force or dictionary attacks to crack WPA/WPA2 passwords. It takes the captured handshake and tries different passwords from a wordlist until it finds the correct one. Aircrack is like a secret decoder that helps you unlock hidden codes or passwords. It's like having a super smart friend who can figure out tricky puzzles for you (remember those kids who cross-check your dumpiest questions ๐)
Aerodump is used for packet capturing and monitoring wireless networks. It scans for nearby networks, collects information about them (such as BSSID, channel, encryption type), and captures packets for further analysis. Imagine Aerodump as a special tool that helps you gather information from the air. It's like having a magical net that captures all the signals floating around in the air, like radio waves or Wi-Fi signals. With Aerodump, you can see (not directly through eyes lmao ๐คฃ) what's happening in the air and collect data without disturbing anything.
Airplay. think of Airplay as a way to send messages or signals through the air. it is used for deauthentication attacks, which force clients to disconnect from a network. deauthenticating a client means you can capture the WPA handshake when they reconnect (imagine deauthenticating peeps who are scrolling TikTok ๐).
Aircrack is a password cracking tool that uses brute force or dictionary attacks to crack WPA/WPA2 passwords. It takes the captured handshake and tries different passwords from a wordlist until it finds the correct one. Aircrack is like a secret decoder that helps you unlock hidden codes or passwords. It's like having a super smart friend who can figure out tricky puzzles for you (remember those kids who cross-check your dumpiest questions ๐)
practical usage of the tools
first you gonna need a computer with a wifi adapter that supports packet injection, and the following tools installed: Aircrack-ng suite (which includes Aerodump and Airplay), Wireshark (optional for packet analysis), and a wordlist for password cracking. then put your WiFi adapter into monitor mode
wait for a client to reconnect to the network, and Aerodump will capture the WPA handshake.
finally use Aircrack to crack the captured handshake using a wordlist. Run:
#aircrack #aerodump #airplay #pentest #wirelessAttacks #kali
@Mi_Ra_Ch
first you gonna need a computer with a wifi adapter that supports packet injection, and the following tools installed: Aircrack-ng suite (which includes Aerodump and Airplay), Wireshark (optional for packet analysis), and a wordlist for password cracking. then put your WiFi adapter into monitor mode
airmon-ng start wlan0then use Aerodump to capture WiFi traffic and identify the target network. Run:
aerodump-ng mon0here Airplay to deauthenticate a client from the target network to capture the handshake. Run:
airplay-ng -0 2 -a [BSSID] -c [Client MAC] mon0
wait for a client to reconnect to the network, and Aerodump will capture the WPA handshake.
finally use Aircrack to crack the captured handshake using a wordlist. Run:
aircrack-ng -w [wordlist] -b [BSSID] [capture file]If you will be successful, Aircrack will display the password. If not, you gotta try a different wordlist or capture more handshakes.
#aircrack #aerodump #airplay #pentest #wirelessAttacks #kali
@Mi_Ra_Ch
๐ฅ3๐1