Wi-Fi Snippets
- Authentication Cracking: 4-Way Handshake Crack
- Authentication Cracking: EAP Relay Attack
- Authentication Cracking: Overview
- Authentication Cracking: PMKID
- Authentication Cracking: WPS
- Client Attacks: Captive Portal
- Client Attacks: DNS & ARP Poisoning
- Client Attacks: JS Injection
- Client Attacks: NetNTLM Hash Stealing
- EAP-PEAP Handshake
- Wi-Fi Handshaking (Enterprise Networks)
- Hacker Devices: Wi-Fi Pineapple
- Hacker Devices: Wi-Fi Coconut
- Hacker Devices: Wi-Fi USB Rubber Ducky
- Hacker Devices: O.MG Charging Cable
- Wi-Fi Handshaking (PSK Personal Networks)
- Known Beacons
- Rogue AP/Evil Twin Overview
- KARMA/MANA
- Captive Portal
- Wi-Fi Monitoring Overview
- WiGLE Database
- Defining the Wireless Security Problem
- Wi-Fi Handshaking
- Denial of Service (DoS)
Excerpt From wi-fi vulnerabilities part 1 Webinar
This Short Video, Presented by CTO, Dr. Brett Walkenhorst, Wiill Explain Captive Portal.
Dr. Brett Walkenhorst, CTO, explains an evil twin attack in the video below and how attackers trick clients into disclosing personal information. Under the pretense of regular maintenance or authentication, the attacker sets up a fake access point and requests that clients re-enter their personal information. Learn more in the video below.
Captive Portal — Bastille — Bastille