Posts

Showing posts from August, 2020

Build Your Own Independent Phone Network: Part 2

Image
In the first part of this project , we completed all the prerequisites needed to build an offline independent phone network. We are now ready to finalize, launch, and use the network, which I will demonstrate in this post. Note that this post is best viewed on a PC as the code snippets are too large for smartphone displays.

Pixie-Dust Wifi Attack: Theory & Practice

Image
In the series of wifi hacking, I have already covered WPA handshake capture and social engineering . In this post I present to you yet another attack using a novel approach for gaining access to a network: it is based on the WPS protocol and is known as the Pixie-Dust attack. You will find a step-by-step guide after a short explanation of the theory behind the security flaw hereby discussed.