Sistema de blogs Diarium
Universidad de Salamanca
Pablo Gallardo's Blog
My professional web log about IT, Cybersecurity & Project Management
 
Tag Archives | wireless

How to get Info from default Settings of a wireless Device

When a wireless device has default settings from manufacturer, some info can be inferred from it. From a security point of view this is a weakness, because malicious users can leverage this data to identify quicker the possible vulnerabilities linked to that device. Settings from wireless device that can provide info about itself: Organizational Unit […]

Comments { 0 }

How to crack WPA2

Wi-Fi Protected Access 2 (WPA2) is one of the most widespread security standards for wireless networks. It has been replaced by more recent WPA3, but as of 2021 WPA2 is still more spread. This post explains briefly what is WPA2, its vulnerabilities, how to strengthen a WPA2 network and how to crack it. What is […]

Comments { 0 }

Difference between Wi-Fi Range Extender and Mesh Network

What is a Wi-Fi Range Extender? A Wi-Fi range extender, also know as a Wi-Fi Booster or Wi-Fi repeater, is a device with two Wi-Fi radios that connects to a network while it rebroadcast what it receives. What is a Wi-Fi Mesh Network? A Wi-Fi mesh network, also know as mesh Wi-Fi system, is a […]

Comments { 0 }

How to identify the Model of a wireless Router in Linux

This post explains how can we identify the model of a wireless router using Linux.   Step by step 1. Set your wireless adapter in monitor mode Check this post about how to put a wireless adapter in monitor mode in Linux. This step includes identifying the ID of the wireless you are going to […]

Comments { 0 }

How to set your Wireless Adapter to Monitor Mode in Linux

Wireless network interface controllers (WNIC’s) can operate in different modes: Managed mode: the only packets that are received in the computer are the one directed to it. Promiscuous mode: it is a listening mode that exists for both wired and wireless adapters. Monitor mode: a listening mode that only exists for wireless adapters. When we […]

Comments { 0 }

List of Wi-Fi Cracking Tools

For computer: Elcomsoft Wireless Security Auditor https://www.elcomsoft.com WepAttack (http://wepattack.sourceforge.net Wesside-ng (https://www.aircrack-ng.org coWPAtty (http://www.willhackforsushi.com Reaver Pro (https://code.google.com WepCrackGui (https://sourceforge.net WEPCrack (http://wepcrack.sourceforge.net WepDecrypt (http://wepdecrypt.sourceforge.net Portable Penetrator (https://www.secpoint.com) KisMAC (http://trac.kismac-ng.org) One of the most popular is Elcomsoft Wireless Security Auditor. For Desktop: WIBR – WIFI BRUTEFORCE HACK https://auradesign.cz WIFI WPS WPA TESTER (https://play.google.com iWep PRO (https://play.google.com AndroDumpper (WPS […]

Comments { 0 }

Type of Wi-Fi Connections

Encryptions: RC4 AES Security protocols: Temporal Key Integration Protocol (TKIP) Cipher-block Chaining Message authentication Protocol (CCMP) Algorithms for Wi-Fi networks: WEP WPA WPA2 Types of security protocols Some Wi-Fi Security (WPA and WPA2) support different types of security protocols. They are described below. Temporal Key Integration Protocol (TKIP) DEPRECATED It is an older encryption protocol […]

Comments { 0 }
Política de privacidad
Studii Salmantini. Campus de excelencia internacional