Category: Hacking

Spear Phishing Attacks on Open Wi-Fi: See How It’s Done [Tutorial]
Would you like to know how easy it is for your information to be stolen over Open Wi-Fi? Joe Smith (very original name) and his friends are socializing at their local coffee shop when they remember that their friend's birthday is this weekend. Their friend's name is Sarah, and Sarah LOVES hibachi. So, Joe uses ...

Stealing Your Personal Information on a Wireless Hot Spot is Painfully Easy [Demonstration]
Wi-Fi Hot Spots:Just how easy is it for a hacker to steal your personal information over an open Wi-Fi network? The answer is that it's painfully simple. Nowadays, we have https, which uses SSL/TLS encryption to encrypt our traffic between our device and the Web server hosting our favorite Web sites. But, not all Web ...

All Wi-Fi Networks are Currently Vulnerable to Attack
Security researchers have discovered a new attack that exploits our Wi-Fi networks, both at home and in enterprise environments. Most of our home networks are using one of the IEEE 802.11 wireless network protocols, such as 802.11b, 802.11g, 802.11n, or perhaps, 802.11ac. Our home Wi-Fi networks can likely support several 802.11 protocols; however, it is ...

PenTest Edition: Performing a Man-in-the-Middle Attack on Your Wireless Network Using Cain & Abel and Wireshark Without Monitor Mode
IntroductionA man-in-the-middle attack occurs when an attacker sits in the middle of the communication between two victim devices, secretly relaying information back and forth on their behalf, similar to a proxy. It can be thought of as active eavesdropping. The attacker cannot only see the communication traveling to-and-from the victim devices, but can also inject ...