Category: Tutorials

Learn how to do something step-by-step.

PenTest Edition: Wireshark

Wireshark is a GUI, cross-platform, open-source protocol and packet analyzer available for Microsoft Windows, Linux, Mac OS, BSD, Solaris, and some other Unix-like operating systems. As a packet analyzer, Wireshark's functionality includes network troubleshooting, packet capture analysis, real-time network traffic observation, examining security problems, protocol implementation debugging, and reconnaissance. If you're already familiar with tcpdump or ...

PenTest Edition: Wi-Fi Testing with Wifite

Wifite is another wireless auditing tool that comes prepackaged in Kali Linux. This is perhaps the easiest tool so far, seeing as it automates the entire process, making it much easier for penetration testers to quickly test the security of wireless networks. You may be wondering if it's okay to display the SSIDs and BSSIDs ...

PenTest Edition: Kismet Wireless

Kismet is a type of passive 802.11 (wireless) data-link layer packet sniffer and network detector. As long as you possess a network adapter that supports Monitor mode, you can sniff and identify 802.11a/b/g/n networks. Kismet is available for Linux, FreeBSD, NetBSD, OpenBSD, and Mac OS X. Although you can download and install it on a Windows ...

PenTest Edition: Cracking WEP, WPS, WPA, and WPA2 Wi-Fi Networks with the “Fern Wi-Fi Cracker” Tool

Here's a fun assessment you can perform on your home network. I'm running Kali Linux 2018.1 in a virtual machine using VMware Workstation Player. My wireless network adapter is an Alfa AWUS036NHA with a 9dBi omni-directional antenna. Penetration testers may use the Fern Wi-Fi cracker as a security auditing tool to test the security of ...

PenTest Edition: Active Reconnaissance and Port Scanning Using Nmap

Nmap, or "Network Mapper," is a network discovery, analysis, and auditing tool utilized by both network defenders and network attackers. As an exceedingly flexible tool with dozens of methods for mapping out networks, Nmap has become a critically acclaimed and well-supported cyber tool. Using Nmap, we can perform network sweeps to discover available hosts on ...