Ayanconnectedrhythms.hashnode.dev·Sep 25, 2024Wi-Fi or Mobile Data: Which is Safer?In today's connected world, staying online is essential. Whether we're browsing social media, working remotely, or streaming entertainment, we rely heavily on internet access. Two primary options dominate this space: Wi-Fi and mobile data. While both...DiscussComputer Science
Agustin Fuentesknz.openeye.world·Apr 20, 2024Hacking WPA & WPA2 Wi-FiDisclaimer: The content provided in this blog is intended for educational purposes only. The information shared here is meant to contribute to the understanding of cybersecurity and ethical hacking in a responsible and legal manner. Introduction Wi-...Discuss·36 readsBloghacking
BlackTechXblog-blacktechx.hashnode.dev·Jan 22, 2024DeautherX Serial InterfaceTable of contents Usage(DeautherX Web Tools). Usage (Arduino) Command Reference Escaping Spaces Combine Serial Commands SPIFFS Here we will look at getting access to the DeautherX Serial Interface and some valuable tips and tricks. Usage (Dea...Discuss·1 like·46 readsesp8266 Deauther
BlackTechXblog-blacktechx.hashnode.dev·Jan 22, 2024DeautherX Serial CommandsHELP helpPrints out list with all commands. SCAN scan [<all/aps/stations/wifi>] [-t <time>] [-c <continue-time>] [-ch <channel>]Starts scan with given parameters.Modes (optional, default = all): all (-a) aps (-ap) stations (-st) wifi (-w) Mode m...Discuss·1 likeblacktechx011
BlackTechXblog-blacktechx.hashnode.dev·Jan 13, 2024Esp8266 Wifi Probe Request SnifferWhen a Wi-Fi device is switched on, it starts spewing out probe requests to try and find a familiar access point. These probe requests contain the device’s MAC address and the SSID of the hotspot it’s looking for, which can potentially be used to ide...Discuss·2 likes·161 readsprobe rquests
BlackTechXblog-blacktechx.hashnode.dev·Jan 12, 2024WiFi Deauthentication Frame ExplainedTable of contents What is a Deauthentication Frame? Structure of a Deauthentication Frame Reason codes Disassociation vs. Deauthentication How deauthentication frames can be exploited The structure and functionality of deauthentication frames ...Discuss·1 like·196 readsdeauthentication
Pratik MforThe Tech Deckthetechdeck.hashnode.dev·Nov 27, 2023How to Use Aircrack-Ng in Kali LinuxAircrack-ng is one of the most popular wireless security auditing tools included in Kali Linux. It allows you to assess Wi-Fi network security by cracking WEP and WPA/WPA2 PSK authentication passwords. In this beginner's guide, we will walk through t...Discuss·1 like·6.1K readsLinuxaircrack
juniper dewcaramel-juni.hashnode.dev·Jul 9, 2023Pass USB WiFi adapter into Proxmox VMThe GUI way of adding a USB device to a Proxmox VM didn't work for me when using a USB network adapter (the device id was not showing up when trying to add to the VM via the GUI), so here is a simple manual workaround. Plug in your desired USB devic...Discuss·103 readsproxmox
Derek Onwudiwetecheffect.hashnode.dev·Jul 1, 2023The WiFi Password SharingIn a Chugia corporate office, there was an employee named Sharlyne. Sharlyne was a kind-hearted and well-intentioned individual who always sought to help others. One day, Sharlyne's childhood friend, Mark, paid her a surprise visit. Mark, who was tra...Discusswifi
Derek Onwudiwetecheffect.hashnode.dev·Jun 15, 2023The Unsecured ConnectionAt Alanta Metropolis, there lived a young and ambitious professional named Alex. Alex was a talented computer programmer who worked for a renowned tech company. He was always on the go, constantly in pursuit of new opportunities and challenges. One s...Discusswifi