Author: technicalhat

How can we be MAN-IN-MIDDLE using MITMF

How can we be MAN-IN-MIDDLE using MITMF

The man-in-the middle attack intercepts a communication between two systems. For example, in an HTTP transaction the target is the TCP connection between client and server. Using different techniques, the attacker splits the original TCP connection into 2 new connections, one between the client and the attacker and the other between the attacker and the … Continue reading How can we be MAN-IN-MIDDLE using MITMF

Hack Any Wifi(WPA/WPA2) Passwords with Kali Linux

Hack Any Wifi(WPA/WPA2) Passwords with Kali Linux

a Before starting the attack lets have a small introduction about WPA/WPA2 . What is WPA/WPA2 Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had … Continue reading Hack Any Wifi(WPA/WPA2) Passwords with Kali Linux

Introduction to Cyber Security & Ethical Hacking.

Introduction to Cyber Security & Ethical Hacking.

Cyber Security Cyber Security is a framework which includes mainly Citizens , Corporate, Houses and Govt Agencies. All these fields are using applications as well as equipments driven by chip based systems. And please keep in mind that any thing that is having chip based technology can be hacked. The goal of the Cyber Security … Continue reading Introduction to Cyber Security & Ethical Hacking.

Setup your own Pen-Testing Lab

Setup your own Pen-Testing Lab

Pen-testing Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit. Pen-testing lab  It is a safe virtual network environment designed to be attacked and penetrated as a means of learning and sharpening your pen testing skills without harming … Continue reading Setup your own Pen-Testing Lab