Facts About the WPA/WPA2 Flaw: The KRACK Attack
I'd like to highlight some things about the KRACK attack. Regarding The Straits Times article "Security Flaw Prompts Fears on Wi-Fi...
I'd like to highlight some things about the KRACK attack. Regarding The Straits Times article "Security Flaw Prompts Fears on Wi-Fi...
Whilst this is not strictly a cybersecurity-related snippet, it might still be an interesting curiosity for someone working on that field...
Quick Tips Network name hiding and MAC address filtering are for safety, not for security. Never use WEP as your wireless encryption...
A couple of months back, I walked past a friend who was working furiously on her laptop. It was her red BackTrack wallpaper that caught...
The WPA/WPA2 security protocol can be used to prevent hackers and other unauthorised people from accessing wireless networks or even...
Here is the review of the WiFi pineapple. Because there are simply too many awesome avenues to explore on the WiFi Pineapple I will touch...
John the Ripper (JTR) is an extraordinary tool that is useful for cracking passwords. First, we must understand that using a word list is...
A Minnesota hacker prosecutors described as a “depraved criminal” was handed an 18-year prison term for unleashing a vendetta of...
I thought why not shed some light on the tools that I have been using to play with the Wi-Fi networks around me. Hopefully, we can get...
Ever wondered how your devices like your laptop get the list of wireless networks available? First, you have to understand that at any...
One of the common misconceptions that people tend to have is that higher gain is better. This results in people blindly buying the...
Wi-Fi (Wireless Fidelity) came about in 1999 and has gained popularity to over 700 million people and over 750,000 hotspots all around...
In cryptography, it is a bad practice to use the same encryption key to encrypt every single packets/data. If Eve the eavesdropper has a...