Disclaimer: What you do with this information is up to you. You are fully responsible for what you do with this info, and how you use it. HackMethod is not responsible for your actions. Please do not hack Wifi points that you are not allowed to. NOTE: I do advise having a USB WiFi adapter, and an extra point would be to get a great one like the ALFA AWUS036NHR or AWUS051NH. Although any card would do as long as it supports monitor mode and packet injection.
Many of the questions I see in r/howtohack or any computer security forum often are flooded with questions from beginners wondering how to get started in hacking. I hate to be the bearer of bad news but its going to be a lot of work. Lets discuss some of the major reasons why learning hacking is so difficult and along the way we can dissect how to overcome these obstacles. (more…)
OverviewToday we're going to go over the principals of wireless hacking, an example of a WPA2 hacking and then we will wrap it up with a few troubleshooting tips. Disclaimer: Before we begin let me preface this. Intrusion into anyone's network without express permission by the network owner is illegal. I highly recommend you practice these techniques on your own wireless network. I take NO responsibility in what you do with this knowledge. (more…)
If you have been following along with our Hacker Methodology series you'll remember that conducting a hack on a target is a logical process. So far we have completed recon of our target machine in our hack lab. Our next step in hacker methodology is the exploitation phase. This is the phase where we gain access to the target machine. We will go deeper into metasploit, its commands and its features a bit later, this is a brief overview combined with an example to get you thinking about some of the things that you can do. (more…)
OverviewMany beginners don't understand that hacking or penetration testing follows a very logical process and when broken down can really clarify tasks and goals. During this write-up I will use a fake company as an example and use very general examples of how each step is completed. Our target will be a fake company called SillyVictim and all we know is that they have a webpage and they have an internal company network. Our goal is infiltrate this company and obtain admin privileges. I'll be using my metasploitable and Kali VM's from my previous lesson as examples on how to apply this methodology. (more…)
Often times on the /r/howtohack subreddit you'll find a post that's similar to "I want to be a hacker, how do I start?". My problem with a question like this is its so open ended. Its not precise enough, its not focused. One of the most popular "How to be a hacker" posts defines the term as "most having to do with technical adeptness and a delight in solving problems and overcoming limits". Most people who have this innate problem solving personality would have already scoured the internet but the sheer level of information out there today is mind boggling. Where do you even start? That's what I did, I searched until my eyes bled, Googling my way through trash tutorial after another and marveling in how much information there was. For me, the problem was there was too much of it and I had no idea where to begin. I bounced from project to project which gave me no real results. I found my way through formal education and job experience and I hope to relay some of that structure here with the Roadmap. (more…)