Skip to content

Commit

Permalink
added new content
Browse files Browse the repository at this point in the history
  • Loading branch information
evildevill committed Nov 26, 2024
1 parent a31ae22 commit 14e4aa8
Showing 1 changed file with 12 additions and 1 deletion.
13 changes: 12 additions & 1 deletion public/content/wifi-hacking-course.md
Original file line number Diff line number Diff line change
Expand Up @@ -243,4 +243,15 @@ Once the handshake is obtained, tools like **Hashcat** can be used to crack the
### wifi hacking methodology

- Network Scanning: You discover nearby access point and decide which one to attack.
- Denial of Service Attack: You deauthenticate a device from the network to capture the handshake.
- Denial of Service Attack: You deauthenticate a device from the network to capture the handshake.
- Get the Handshake: Once the device reconnects, you capture the handshake containing the encrypted password.
- Password Cracking: Use tools like Hashcat to crack the password and gain access to the network.
- Network Access: Once you have the password, you can connect to the network and perform further attacks.

So far, the configuration and basic concepts part. You can also see more commands and content here and here

### Change MAC address

In this section we will see what the MAC address is, what it is used for, why to change it and what it has to do with wifi hacking.

Well, the truth is that they are simple questions. The MAC address is a unique identifier that each physical device has, such as your mobile phone or your television, and as I have already said, it allows devices to be identified, so when auditing Wi-Fi networks they can see your MAC address (identifier that sends the packets) and that is why it is good practice to change it with the tool macchanger(installed by default in Kali and Parrot).

0 comments on commit 14e4aa8

Please sign in to comment.