π° Doxing π°
Doxing is an effective cyber-weapon that can be used against an anonymous online target who's miles away.
Doxing is an effective cyber-weapon that can be used against an anonymous online target who's miles away.
Media is too big
VIEW IN TELEGRAM
π° Wifi Jamming & DoS π°
Part 1
Part 1
Media is too big
VIEW IN TELEGRAM
π° Wifi Jamming & DoS π°
Part 2
Part 2
π° How the SSL strip attack works π°
In order to βstripβ the SSL, an attacker intervenes in the redirection of the HTTP to the secure HTTPS protocol and intercepts a request from the user to the server. The attacker will then continue to establish an HTTPS connection between himself and the server, and an unsecured HTTP connection with the user, acting as a βbridgeβ between them.
In order to βstripβ the SSL, an attacker intervenes in the redirection of the HTTP to the secure HTTPS protocol and intercepts a request from the user to the server. The attacker will then continue to establish an HTTPS connection between himself and the server, and an unsecured HTTP connection with the user, acting as a βbridgeβ between them.
π° Evil twin method!π°
Clone wireless access points
What's an Evil Twin AP?
The evil twin AP is an access point that looks and acts just like a legitimate AP and entices the end-user to connect to our access point. Our aircrack-ng suite has a tool, airbase-ng, that can be used to convert our wireless adapter into an access point. This is a powerful client-side hack that will enable us to see all of the traffic from the client and conduct a man-in-the middle attack.
Clone wireless access points
What's an Evil Twin AP?
The evil twin AP is an access point that looks and acts just like a legitimate AP and entices the end-user to connect to our access point. Our aircrack-ng suite has a tool, airbase-ng, that can be used to convert our wireless adapter into an access point. This is a powerful client-side hack that will enable us to see all of the traffic from the client and conduct a man-in-the middle attack.
This media is not supported in your browser
VIEW IN TELEGRAM
π° Ewil Twin Method π°
Part 2
Part 2
π° Router Vulnerability π°
Five out of six name brand routers, such as Linksys, NETGEAR and D-Link, contain known open-source vulnerabilities.
Five out of six name brand routers, such as Linksys, NETGEAR and D-Link, contain known open-source vulnerabilities.
Media is too big
VIEW IN TELEGRAM
π° Router Vulnerability π°
Part 1
Part 1
Media is too big
VIEW IN TELEGRAM
π° Router Vulnerability π°
Part 2
Part 2
Media is too big
VIEW IN TELEGRAM
π° Router Vulnerability π°
Part 3
Part 3