11 2019 档案

摘要:MITM - ARP Poisoning Theory Man In The Middle Attacks - ARP Poisoning This is one of the most dangerous and effective attacks that can be used, it is 阅读全文
posted @ 2019-11-27 22:50 晨风_Eric 阅读(149) 评论(0) 推荐(0) 编辑
摘要:Nmap Nmap is a network discovery tool that can be used to gather detailed information about any client or network. We shall have a look at some of its 阅读全文
posted @ 2019-11-25 22:50 晨风_Eric 阅读(107) 评论(0) 推荐(0) 编辑
摘要:Post Connection Attacks Sophisticated attacks that can be used after connecting to the target AP. Gathering Information Now that we are connected to a 阅读全文
posted @ 2019-11-25 22:10 晨风_Eric 阅读(141) 评论(0) 推荐(0) 编辑
摘要:Securing your Network From the Above Attacks. Now that we know how to test the security of all known wireless encryption(WEP/WPA/WPA2), it is relative 阅读全文
posted @ 2019-11-24 18:55 晨风_Eric 阅读(138) 评论(0) 推荐(0) 编辑
摘要:WPA Craking WPA was designed to address the issues in WEP and provide better encryption. The main issue in WEP is the short IV which means that they c 阅读全文
posted @ 2019-11-24 18:18 晨风_Eric 阅读(340) 评论(0) 推荐(0) 编辑
摘要:WEP Cracking Packet Injection What if the AP was idle, or had no clients associated with it? In this case, we have to inject packets into the traffic 阅读全文
posted @ 2019-11-14 23:14 晨风_Eric 阅读(115) 评论(0) 推荐(0) 编辑
摘要:WEP Cracking Basic case Run airdump-ng to log all traffic from the target network. At the same time, we shall use aircrack-ng to try and crack the key 阅读全文
posted @ 2019-11-11 22:59 晨风_Eric 阅读(398) 评论(0) 推荐(0) 编辑
摘要:Gaining Access to encrypted networks Three main encryption types: 1. WEP 2.WPA 3.WPA2 WEP Cracking WEP is old encryption, but it is still used in some 阅读全文
posted @ 2019-11-10 20:49 晨风_Eric 阅读(414) 评论(0) 推荐(0) 编辑
摘要:Creating a fake access point (honeypot) Fake access points can be handy in many scenarios, one example is creating an open AP, this will attract a lot 阅读全文
posted @ 2019-11-10 11:38 晨风_Eric 阅读(236) 评论(0) 推荐(0) 编辑
摘要:Deauthentication Attacks Theory This attack is used to disconnect any device from any network within our range even if the network is protected with a 阅读全文
posted @ 2019-11-09 18:19 晨风_Eric 阅读(118) 评论(0) 推荐(0) 编辑
摘要:Targeted packet sniffing Now all the data will be stored in the file name specified after the -write option. We can analyze this data using Wireshark. 阅读全文
posted @ 2019-11-09 17:55 晨风_Eric 阅读(118) 评论(0) 推荐(0) 编辑
摘要:Change MAC Address using macchanger. Packet Sniffing Basics Airodump-ng airodump-ng is a program part of the aircrack-ng package, it's a packet sniffe 阅读全文
posted @ 2019-11-09 16:38 晨风_Eric 阅读(127) 评论(0) 推荐(0) 编辑
摘要:ALFA AWUS 1900 RTL8814AU https://www.alfa.com.tw/products_detail/2.htm Follow the guide on aircrack-ng/rtl8812au step by step. https://github.com/airc 阅读全文
posted @ 2019-11-05 23:14 晨风_Eric 阅读(130) 评论(0) 推荐(0) 编辑
摘要:Scrapy Architecture Creating a Spider. Spiders are classes that you define that Scrapy uses to scrape(extract) information from a website(s). Running 阅读全文
posted @ 2019-11-04 21:34 晨风_Eric 阅读(277) 评论(0) 推荐(0) 编辑
摘要:Create a new Scrapy project first. Open this project in Visual Studio Code 阅读全文
posted @ 2019-11-03 20:15 晨风_Eric 阅读(131) 评论(0) 推荐(0) 编辑
摘要:Use BeautifulSoup and Python to scrap a website Lib: urllib Parsing HTML Data Web scraping script Run this script successfully Following is the whole 阅读全文
posted @ 2019-11-03 19:57 晨风_Eric 阅读(200) 评论(0) 推荐(0) 编辑
摘要:Install the following software before web scraping. Visual Studio Code Python and Pip Activating a Virtual Environment BeautifulSoup Documents: https: 阅读全文
posted @ 2019-11-03 15:11 晨风_Eric 阅读(120) 评论(0) 推荐(0) 编辑
摘要:What is Web Scraping This is also referred to as web harvesting and web data extraction. This is the process of automatically downloading a web page's 阅读全文
posted @ 2019-11-02 23:57 晨风_Eric 阅读(167) 评论(0) 推荐(0) 编辑
摘要:Pre--Connection-Attacks that can be done before connecting to the network. Gaining Access - How to break Wi-Fi keys(WEP/WPA/WPA2) Post-Connection-Atta 阅读全文
posted @ 2019-11-02 22:19 晨风_Eric 阅读(337) 评论(0) 推荐(0) 编辑

点击右上角即可分享
微信分享提示