On your assigned course start date, you’ll be provided access to download all your course materials, including the 3.5-hour Offensive Security WiFu course video series in HTML/Flash format and the 380-page WiFu lab guide. A subreddit dedicated to hacking and hacking culture. What we are about: quality and constructive discussion about hacking and hacking culture. We are not here to teach you the basics. Please visit for posting beginner links and tutorials. Hacking related politics welcome. Penalties: Bans are handed out at moderator discretion. You can be permanently banned even on your first offense if we deem it acceptable, so read the rules: • WE ARE NOT YOUR PERSONAL ARMY • Questions and discussion prompts should be geared towards intermediate to advanced hackers. • Requesting help/instructions on how to hack anything will be met with ridicule and a ban. Also, nobody cares if you got hacked. Sorry, have a better password. ![]() • Aiding those who are looking for help to hack anything will be banned. • Sharing Private data is forbidden (no IP dumping). • Spam is strictly forbidden and will result in a ban. (Spam as in links that violate the spam guidelines ) • Off-topic posts will be treated as spam. • Jail-breaking and rooting of phones and posts that aren't directly related to mobile security should be directed to other subreddits such as. • Off-topic or surly responses will be removed (a cryptographic hash!= potato hashes). Offensive Security Wifu• Want to learn 'How to hack'?, Please head on to as questions about 'how to hack' anything aren't allowed here. IRC Note: if no one answers immediately, stick around and someone will read it. Recommended Subreddits: • • • • • • • • •. Offensive Security Wifi V.3.0 DownloadThe Background After passing the, I enrolled for the course. This course is talking about how to attack a wireless rotuer no matter it is set to WEP, WPA or WPA2. The Hardware You are required to have at least one wireless device to act as victim (laptop with wireless card or smartphone, such as Android or iPhone) and a computer which is installed with BackTrack 5 R1 as an attacker. The attacker machine is recommended to have a USB adaptor (the USB adaptors that recommended on the official site). If you do not have wireless device as victim, you may consider to buy a wireless USB dongle for your desktop. Furthermore, you are also required to have a wireless router or access point that equipped with WEP and WPA/WPA2 features (the models are recommeded on the official site). Beware that not all the wireless dongles or wireless cards can be injected and in monitor mode. In addition, some wireless routers behaved unexpectedly when doing the attacks. For example, my dd-wrt flashed TP-LINK TL-WR1043ND do not perform some of the attacks, such as Korek Chopchop attack. However, not all access points can perform Korek Chopchop attack indeed.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2018
Categories |