In this video we are disclosing multiple 0-day vulnerabilities in wavlink and jetstream routers discovered by James Clee and Roni Carta. Use the time stamps below to skip through the different topics we discussed. Resources: Cyber news article about …
If you’re anything like me, you’re paranoid about network intrusion. In all event, we just need something to monitor our systems and warn us of potential attacks. This can be done through a package known as Snort. Snort is a …
What is Wireshark ? How to use it ? Well this video will introduce you to this amazing tool and walk you through its basics. Installation – Linux: To Install Wireshark on Linux apt-get update sudo apt-get install wireshark Installation …
Nmap or the Network Mapper is a great tool to discover hosts, open ports and running services. This information is very important at the information gathering stage to get a clear understanding of your target and can greatly improve the …
This video shows how to manually create an evil twin network to steal WiFi password / key of a target network. The same method can be used to start a normal fake AP / honeypot for other uses. Resources: Commands. …
As you might know, untrusted Wifi networks can be extremely dangerous if you happen to be connected to them. In this article I am going to show you how to create a simple yet dangerous access point. We will …