How to crack WPA2
Wi-Fi Protected Access 2 (WPA2) is one of the most widespread security standards for wireless networks. It has been replaced by more recent WPA3, but as of 2021 WPA2 is still more spread. This post explains briefly what is WPA2,…
Wi-Fi Protected Access 2 (WPA2) is one of the most widespread security standards for wireless networks. It has been replaced by more recent WPA3, but as of 2021 WPA2 is still more spread. This post explains briefly what is WPA2,…
Do you thing an outsider is using your network? How to see which Devices are connected to a Network Method 1: Check it from router For this method, you need to have access to the router, and know its credentials.…
What is a Wi-Fi Range Extender? A Wi-Fi range extender, also know as a Wi-Fi Booster or Wi-Fi repeater, is a device with two Wi-Fi radios that connects to a network while it rebroadcast what it receives. What is a…
IPv6 was developed to substitute IPv4, as it was expected to run out of addresses. IPv6 Characteristics IPv6 is more business-oriented, not defense-oriented like IPv4. It increases the number of nodes. IPv6 supports quality of services natively. IPv6 has a…
This post summarizes some Virtual Private Network (VPN) services that are available for free. List of free VPN services List of free VPN services: Linux Fu VPN VPN Gate Tor HideMyAss hide.me Whoer.net Free Web Proxy SwitchVPN VyprVPN Linux Fu…
Self-signed certificates are widely used for testing purposes. In self-signed certificates, user creates a pair of public and private keys using a certificate creation tool and signs the document with the public key. The receiver requests the sender for the…
This post explains how can we identify the model of a wireless router using Linux. Step by step 1. Set your wireless adapter in monitor mode Check this post about how to put a wireless adapter in monitor mode in…
Wireless network interface controllers (WNIC’s) can operate in different modes: Managed mode: the only packets that are received in the computer are the one directed to it. Promiscuous mode: it is a listening mode that exists for both wired and…
First of all, you need to know your IP and the network range where it belongs to. It is important to perform scanning that you understand the meaning of IPv4 addresses. You can check this post explaining about it. Open…
This post explains briefly the network protocol IPv4 and summarizes the main aspects of it. IPv4 Characteristics IPv4 is based on best effort. It does not guarantee delivery. The datagrams are not delivered in order. It is resilient, and uses…