WifiInfoView: WiFi Scanner for Windows OS
WifiInfoView scans the wireless networks in your area and displays extensive information about them, including: Network Name (SSID), MAC Address, PHY Type (802.11g or...
EvilAP Defender: Protect Wireless Network from Evil Access Points!
EvilAP_Defender is an application that helps wireless network administrator to discover and prevent Evil Access Points (AP) from attacking wireless users.
The application can be...
WiFi Penetration Testing Tools
WiFi or wireless penetration testing is
an important aspect of any security audit project, organizations are
facing serious threats from their insecure WiFi network. A
compromised wifi...
Darkhotel Attackers Target CEOs
Hackers
have developed a scheme to steal sensitive information from top
executives by penetrating the Wi-Fi networks of luxury hotels,
security researchers said Monday.
Dubbed
the "Darkhotel APT,"...
Hack an Isolated Computer – No Internet Connection Required
A proof-of-concept
idea, which allows a person to send and receive data from a machine
that has been kept completely isolated from the internet has been
developed...
Hacking WPS – SILICA Wireless Assessments
Understanding the vulnerabilities of your WiFi network can be challenging as users can easily create networks
on demand, or even perhaps unintentionally. But as recent...
Moscrack Cracking WPA Keys
P { margin-bottom: 0.08in; }
Moscrack
is a perl application designed to facilitate cracking WPA keys in
parallel on a group of computers. This is accomplished by...
Wireless Network Monitor & Analyzer
CommView
for WiFi is a powerful wireless network monitor and analyzer for 802.11 a/b/g/n/ac networks. Loaded
with many user-friendly features, CommView for WiFi combines performance and
flexibility with an ease of...
wifite Automated Wireless Auditor
P { margin-bottom: 0.08in; }TT.cjk { font-family: "Droid Sans",monospace; }TT.ctl { font-family: "FreeSans",monospace; }A:link { }
Wireless networking has proved its
advantages over wired network,...
FruityWifi Wireless Network Auditing Tool
H1 { margin-bottom: 0.08in; }H1.western { font-family: "Liberation Serif",serif; }H1.cjk { font-family: "Droid Sans"; }H1.ctl { font-family: "FreeSans"; }P { margin-bottom: 0.08in; }
Wireless (a...
How to Choose a Suitable Wi-Fi VPN
Setting
Up the Connection:
The
first thing one should consider while selecting a VPN connection is
the ease level of its set up. The VPN providers give...
Most Read
What Makes ICS/OT Infrastructure Vulnerable?
Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...
Everything You Must Know About IT/OT Convergence
What is an Operational Technology (OT)?
Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...
Understand the OT Security and Its Importance
This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...
What is Deepfake, and how does it Affect Cybersecurity?
Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...