Daily Archives: February 25, 2014

Breaking Wireless WPA2

You’ll need Backtrack with metasploit airmon-ng airodump-ng aireplay-ng aircrack Verify your wireless is up, airmon-ng start wlan0 airodump-ng mon0 Find a BSSID MAC address to become a toe (target of evaluation) Stop the program Gather the MAC address and Channel … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Breaking Wireless WPA2

Drone Hacking with SkyJack

Samy Kamkar (creator of the Samy worm) has an awesome video on his program, Skyjack: Autonomous Drone Hacking. Here is Samy’s page on how to perform a skyjack attack. He lists the entire inventory with Amazon links to hardware so … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on Drone Hacking with SkyJack

Pass the Hash on Windows 8.1

On this website are instructions on how to pass the hash on Windows 8.1. Microsoft claimed that they patched the Pass the Hash exploit in October of 2013. Of course this is a proof of concept and some of the … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Pass the Hash on Windows 8.1