I know when I use someone’s or my employer’s wifi they can have access to the history of the sites I’ve visited. Does that include the sites I visited while I was at home on my own network, or only the ones accesed through their network?
I am currently building a WiFi hacking tool, I am stuck at a part where I will deauth all clients on an AP while maintaining my fake AP turned on
I am using aireplay-ng to deauth
aireplay-ng --deauth 0 -c '$ device' -a '$ bssid' '$ suc
And to create the fake AP
nmcli connection add type wifi ifname '*' con-name $ ssid autoconnect yes ssid $ ssid; nmcli connection modify $ ssid 802-11-wireless.mode ap 802-11-wireless.band bg ipv4.method shared; nmcli connection up $ ssid;
I am not going to specify the model of router, because I’m looking for universal solution, presuming that I am inside Local Network.
1) Obvious way to do that would be by sending Syslog, most TP-Link routers has page where you can hourly email to external email address. And all syslogs in routers are definitely consist those Mac addresses. Problem with this method – that most ISP block port 25 for outbound connections – so you can’t use any external SMTP servers (only internal SMTP servers which are absent in most guest networks)
2) Less attractive way is bringing your laptop and asking wifi password. I call it less attractive because it requires physical presence with a laptop inside Local Network (being connected as a guest to WiFi router)
3) Another way is using Android apps which scan mac addresses which also requires physical presense
4) And of course using Dynamic DNS to connect to router. But most ISP’s are put the routers behind NAT and multiple vLANs so that you couldn’t access that even from within internal ISP network.
5) Also if you exclude your ability to use OpenWRT or other custom firmware – because it is time-consuming and too much physical presence requiring process.
6) But it could be useful to include some $ 10 devices which could collect that info by always being inside the wifi network (is there such devices accessible in Chinese electronics markets?)
Am I missing some obvious ways to spy on mac addresses on someone’s wifi network?
I ask this question, because I want to understand all ways someone might use to leak mac addresses of those devices from internal network with cheapest wifi routers.
First of all thank you for reading this.
- I have Kali Linux VirtualBox 64-Bit (
version: 2019.4) as a virtual computer.
- I’m running it on Oracle Box(
- My usb adapter is :
I am trying to connect my virtual computer to internet with my usb wifi adapter.
- Is it possible to connect my virtual computer with this usb wifi adapter?
- If i can connect my usb wifi adapter to my virtual computer, will i be able to do attacks such as wifi cracking or MITMF attacks?
- Can this wifi adapter limit my hacking conditions?
If there is a solution to setup this usb wifi adapter to my virtual computer I would be very pleased if you can tell me how to do it. I am new to Kali linux.
What WiFi hacking method connects to router, disconnects all devices connected there, and connect to Fake Made up wifi, and once connected get the information from the connected device (get password)
What hacking tool is most likely to be used? Based on the question above.
I’m currently rebuilding my network infrastructure and am planning to make my NAS available trough an OpenVPN server running on my router for “outside” use (no port forwarding: NAS in private LAN, available trough the VPN).
Now I was wondering about a certain scenario: let’s say, I have mapped some of the NAS’s drives as network drives via SMB/CIFS in Windows on my laptop (using the local IP address of the NAS in the LAN) or have a proprietary software of the NAS’s manufacturer trying to connect to a certain service on a dedicated port.
If I were to take this notebook to an unsecured, public wifi- would this expose the local LAN IP’s and/or ports in the CIFS request or the connection request coming from the proprietary software until I’m connected to my VPN (i.e. in the very moment, I’m connecting to the wifi until the VPN tunnel is up)? Does this depend on the way such a request is implemented in the software?
The title says it all, I needed to send my ID to some website so that they could verify my identity. But I took the picture with my phone, then sent it to myself via Messenger on iOS. I sent the picture to myself on Messenger so that I could download it on my PC and then censor my personal information. Right after I’ve downloaded the image, I realized that I am using the WiFi at work instead of using my own 4G hotspot. The image I sent contains a clear copy of my ID, so does the image that I downloaded. Is there any chances that they can intercept the traffic and obtain a clear copy of my ID?
This morning I discovered that the WPA-Personal passphrase of my residential ISP–provided wireless router had been truncated to the first 3 characters. Everything else in its configuration appeared to be in working order, and upon reentering the complete passphrase all clients were able to automatically reassociate.
What would cause that to happen? Is it likely to be just a bug in the router, or might it be a symptom of more nefarious activity? I’m not sure if I should just go on with my day or treat the device as compromised.
I am using a public WIFI network before work how do i keep my devices secure on this network? I am looking to prevent a attacker using a packet sniffer to grab my data and i am looking to prevent malware from infecting my devices.
Everytime I connect to my wifi-network with my Windows 10 1909 I get a notification about the network not being secure. The network does use WPA2 Personal though, which I don’t think is insecure. Is there another reason why this notification pops up? And could this have somethig to do with internet cable maintenance in my area?