Hackers, pentesters, cybersecurity specialists, and other tech-savvy individuals can hack Wi-Fi passwords fairly easily, and tools like Besside-ng help them do it.
Besside-ng is the hidden gem of the Aircrack-ng suite of Wi-Fi hacking tools. To use it, one just needs to run it with a wireless network adapter capable of packet injection. By doing so, Besside-ng can harvest WPA handshakes from any network with an active user. It can also help crack WEP passwords. It requires no special dependencies and can be run via SSH, making it easy to deploy remotely. In this episode of Cyber Weapons Lab, see how it works.
WebDAV lets users collaborate on web projects remotely, and it can also be used to transfer files. But it also is a huge security risk if it has been configured improperly. Pentesters, hackers, cybersecurity specialists, and others can exploit it, eventually getting a shell on the server. In this episode of Cyber Weapons Lab, we'll show you how it could be done using Metasploit to scan for WebDAV, DAVTest to test file execution policies, and Cadaver to upload a reverse shell and compromise the server.
To learn more, check out the article by drd_ on Null Byte: nulb.app/x4r43
Pentesting is the process of simulating an attack on a network and is used to find vulnerabilities that could be exploited by a malicious actor. The main goal of a pentest, or penetration test, is to identify security holes and weaknesses so that the organization being tested can fix any potential issues. In a professional penetration test, there are six phases you should know. On this episode of Cyber Weapons Lab, we are going to take a look at those six steps.
If you find yourself on a Wi-Fi or Ethernet connection, it might be confusing to know how to figure out what else is on the network. Nmap is a powerful tool for exploring and learning about devices around you on a network. On this episode of Cyber Weapons Lab, we'll explore the various uses of Nmap, and show you some of the most useful scans for a beginner.
OpenBSD implements security in its development in a way that no other operating system on the planet does. On this episode of Cyber Weapons Lab, we're using VirtualBox to install the OS within a host to create a full-featured test environment.
To learn more, check out the article written by Takhion on Null Byte's site: nulb.app/z484t
The official Null Byte channel on Vimeo for video content! We focus on creating videos for aspiring ethical hackers, computer scientists, and the infosec community.
The official Null Byte channel on Vimeo for video content! We focus on creating videos for aspiring ethical hackers, computer scientists, and the infosec community.