create-custom-wordlist-crunch

How to create custom wordlist

In penetration testing the worst part is authentication failure. Cracking a hash or a dictionary attack to an authentication form is time consuming. It depends on the strength of the password. An eight character password can have the possible combination of 6,634,204,312,890,625 including special char . Bruteforcing all the possible Read more…

reaver-wps-hack-wifi

How to hack WPS protected wifi router

Reaver-wps targets the external registrar functionality mandated by the WiFi Protected Setup specification. Access points will provide authenticated registrars with their current wireless configuration (including the WPA PSK), and also accept a new configuration from the registrar. In order to authenticate as a registrar, the registrar must prove its knowledge Read more…