Information gathering is used to collect data to make use of and benefit from resources. The practice of footprinting (also known as reconnaissance) is being used to obtain information about computer systems and the entities to which they connect.
Category: Cyber Attack
Denial of Service / Distributed Denial of Service Attacks
Denial of Service (DOS) is used to prevent user's from accessing a website or online services. It overloads the network causing resource with high traffic. This is done using a single device. Distributed Denial of Service (DDoS) is the same as DOS but instead of using a single device, it uses multiple devices. This is more difficult to defend than DOS.
WiFi WEP/WPA/WPA-2 Encryption Cracking
I will teach you on how to crack WEP/WPA-PSK/WPA-2 Encryption by utilizing Wifiphisher. This is a program that is used to gain access to private WiFi networks by creating a Rouge Access Point.
WiFi WPA-PSK Encryption Cracking
I will teach you on how to crack WPA-PSK Encryption by utilizing aircrack-ng on your Windows Operating System.
WiFi WEP Encryption Cracking
I will teach you on how to crack WEP Encryption by utilizing aircrack-ng on your Linux System.
Detect Hidden SSID
I will teach you on how to unmask hidden SSID by utilizing airmon-ng on your Linux System.
