Wireless Hacking Tutorial

Overview

Today we’re going to go over the principals of wireless hacking, an example of a WPA2 hacking and then we will wrap it up with a few troubleshooting tips.

Disclaimer: Before we begin let me preface this. Intrusion into anyone’s network without express permission by the network owner is illegal. I highly recommend you practice these techniques on your own wireless network. I take NO responsibility in what you do with this knowledge.

(more…)

OvertheWire – Bandit 24

Recap of Last Lesson: Variable creation, shell scripts and a little on hash functions

Bandit Level 24

Objective

Find the password to the next level

Intel Given

  • A program is running automatically at regular intervals from cron, the time-based job scheduler. Look in /etc/cron.d/ for the configuration and see what command is being executed.

    NOTE: This level requires you to create your own first shell-script. This is a very big step and you should be proud of yourself when you beat this level!

    NOTE 2: Keep in mind that your shell script is removed once executed, so you may want to keep a copy around…

(more…)

metasploit

Hack with Metasploit – Exploitation

If you have been following along with our Hacker Methodology series you’ll remember that conducting a hack on a target is a logical process. So far we have completed recon of our target machine in our hack lab. Our next step in hacker methodology is the exploitation phase. This is the phase where we gain access to the target machine.

We will go deeper into metasploit, its commands and its features a bit later, this is a brief overview combined with an example to get you thinking about some of the things that you can do.

(more…)

T-Shirt Design Contest starts 15 Jan! You have a chance to win a Raspberry Pi 3B and $50 NoStarch Press ebook voucher! Visit https://contest.hackmethod.com for all details. Dismiss