❌

Reading view

Hunt for Weak Spots in Your Wireless Network with Airodump-ng from the Aircrack-ng Suite

In this blog, I’m going to walk you through how to get started with airodump-ng and some of the techniques that you can use to home in on access points of interest.

The post Hunt for Weak Spots in Your Wireless Network with Airodump-ng from the Aircrack-ng Suite appeared first on Black Hills Information Security, Inc..

  •  

Wi-Fi Forge: Practice Wi-Fi Security Without HardwareΒ 

In the world of cybersecurity, it’s important to understand what attack surfaces exist. The best way to understand something is by first doing it. Whether you’re an aspiring penetration tester, […]

The post Wi-Fi Forge: Practice Wi-Fi Security Without HardwareΒ  appeared first on Black Hills Information Security, Inc..

  •  

Ghost in the Wireless: An introduction to Airspace Analysis with KismetΒ 

This is the first installment in a series of blogs relating to practical analysis of wireless communications: what they are, how they work, and how they can be attacked. In […]

The post Ghost in the Wireless: An introduction to Airspace Analysis with KismetΒ  appeared first on Black Hills Information Security, Inc..

  •  

WifiForge – WiFi Exploitation for the Classroom

by William Oldert // BHIS Intern BHIS had a problem. Β  We needed an environment for students to learn WiFi hacking safely. Our original solution used interconnected physical network gear […]

The post WifiForge – WiFi Exploitation for the Classroom appeared first on Black Hills Information Security, Inc..

  •  

How to Install and Perform Wi-Fi Attacks with WifiphisherΒ 

tl;dr: Install Wifiphisher on Kali and run a basic attack.Β  This crappy little copy/paste-able operation resulted in a functional Wifiphisher virtual environment on Kali (as of January 22, 2024).Β Β  Two […]

The post How to Install and Perform Wi-Fi Attacks with WifiphisherΒ  appeared first on Black Hills Information Security, Inc..

  •  

Introducing LoRa (Long Range) Wireless Technology – Part 1

Ray Felch // This write-up is the first of a multi-part series, providing an introduction to LoRa wireless technology and the LoRaWAN, low-power wide-area network (LPWAN). Interestingly, I came across […]

The post Introducing LoRa (Long Range) Wireless Technology – Part 1 appeared first on Black Hills Information Security, Inc..

  •  

Understanding Zigbee and Wireless Mesh Networking

Ray Felch // Preface: Recently, I acquired a few home automation devices, so that I might research Zigbee and get a better understanding of how this very popular wireless technology […]

The post Understanding Zigbee and Wireless Mesh Networking appeared first on Black Hills Information Security, Inc..

  •  

Webcast: Building a Small and Flexible Wireless Exfiltration Box with SDR

Paul Clark// Do you want to know how we learned Software Defined Radio? We learned it from Paul.Β  We also learned by getting our hands dirty with projects. For this […]

The post Webcast: Building a Small and Flexible Wireless Exfiltration Box with SDR appeared first on Black Hills Information Security, Inc..

  •  

Wireless Hack Packages Update

Jordan Drysdale// With Wild West Hackin’ Fest 2018 coming up (!!!), here’s a preview of some things you might see in the wireless labs. First, s0lst1c3’s eaphammer. @relkci and I […]

The post Wireless Hack Packages Update appeared first on Black Hills Information Security, Inc..

  •  

Hashcat 4.10 Cheat Sheet v 1.2018.1

Kent Ickler // It seemed like we were always cross-referencing the Hashcat Wiki or help file when working with Hashcat. We needed things like specific flags, hash examples, or command […]

The post Hashcat 4.10 Cheat Sheet v 1.2018.1 appeared first on Black Hills Information Security, Inc..

  •  

WEBCAST: Stop Sucking at Wireless

Jordan Drysdale & Kent Ickler// Jordan and Kent are back with more blue team madness! The shameless duo continue their efforts to wrangle decades old attacks against wireless networks. The […]

The post WEBCAST: Stop Sucking at Wireless appeared first on Black Hills Information Security, Inc..

  •  

How to: From WarDriving to SSIDs on Google Maps with Latitude/Longitude

Jordan Drysdale // Step 1: Build your capture rig RPi3, Kali,Β Battery Packs,Β 2 x supported wifi card of your choosing (I used theΒ Alfa BlackΒ for this run). My finished product: Solar Battery […]

The post How to: From WarDriving to SSIDs on Google Maps with Latitude/Longitude appeared first on Black Hills Information Security, Inc..

  •  

WEBCAST: Attack-n-Crack Wi-Fi

Jordan Drysdale & Kent Ickler // Jordan and Kent demonstrate why there is only ONE correct way to configure your wireless networks. They also talk about the use of a […]

The post WEBCAST: Attack-n-Crack Wi-Fi appeared first on Black Hills Information Security, Inc..

  •  

The Wi-Fi Travel Kit v2 – Parts List Backtrack

Jordan Drysdale // The Wi-Fi travel kit part oneΒ was popular enough that, back by demand, here are the specific parts, part numbers and links. Pretty much everything on the list […]

The post The Wi-Fi Travel Kit v2 – Parts List Backtrack appeared first on Black Hills Information Security, Inc..

  •  

The Wi-Fi Travel Kits

Jordan Drysdale // Sally and I recently ventured to an on-site wireless engagement with a veryΒ security-matureΒ customer. Long story short, the level of protection that WPA2 Enterprise with certificate validation provides […]

The post The Wi-Fi Travel Kits appeared first on Black Hills Information Security, Inc..

  •  

Weaponizing Princess Toys: Crafting Wi-Fi Attack Kits

Jordan Drysdale // … Alternate Title:Β β€œWhy I Love BHIS” So, I was gifted this cute little princessy-toy thing recently. My first thought was that my daughters will love this thing. […]

The post Weaponizing Princess Toys: Crafting Wi-Fi Attack Kits appeared first on Black Hills Information Security, Inc..

  •  
❌