Installing Kali Linux in VMware Workstation Player (VMware Tools Included)

This tutorial will walk you through installing the latest version of Kali Linux as a Virtual Machine (VM) on VMware Workstation Player 14. I will also show you how to install VMware tools. Straight from the official Kali Linux Web site: Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security ...

Security Researchers Confirm an Additional 7,500 Hacked MikroTik Routers Spying on Network Traffic

MikroTik is a Latvian company which was founded in 1996 to develop routers and wireless ISP systems. The company is predominantly known for its RouterOS software system. With distributors located all around the world, including the United States, MikroTik should sound fairly familiar even though this is primarily a Cisco-dominant networking world. In July, researchers ...

Wireless Networking: Understanding Various Wireless LAN Technologies

Wi-Fi is a type of wireless technology that uses radio waves to provide connectivity to a wired network or the Internet. At home, the office, or a cafe, Wi-Fi is responsible for providing connectivity to our wireless devices. This is a type of technology that many take for granted. This post is intended to help ...

VLAN Configurations, Trunk Links, and 802.1q Encapsulation

A "VLAN" is short for a "Virtual Local Area Network." You can think of them just like an ordinary LAN where each LAN is its own subnet and broadcast domain; however, a VLAN is a virtual LAN. Take a look at the network design below. This is a 10.0.0.0/24 network, which gives us 1 subnet ...

PenTest Edition: Create Evil Twin Using dnsmasq and hostapd

As promised in Creating an Evil Twin or Fake Access Point Using Aircrack-ng and Dnsmasq [Part 2 - the Attack], here is another way we can create an evil twin. In this demonstration, I am going to use hostapd instead of Aircrack-ng. I personally think hostapd is better solely due to the fact that we can ...