tbhaxor
  • About Me
  • Series
  • Support Me

cryptography

A collection of 4 posts
Wi-Fi Legacy Security Mechanisms
wifi-security

Wi-Fi Legacy Security Mechanisms

In this post, you will learn about legacy wireless network security methods that are now considered obsolete but are still in use in some places.
Dec 12, 2022 9 min read
Decrypt WEP Traffic using Bruteforce with Insufficient IVs
wifi-security

Decrypt WEP Traffic using Bruteforce with Insufficient IVs

In this tutorial, you will learn how to crack the WEP key using only one data packet and a wordlist, and then use the wireshark tool to decode the data packet.
Sep 14, 2022 4 min read
Encrypted TCP Command and Control
csharp

Encrypted TCP Command and Control

Learn how to perform command and control under the radar using the encrypted tunnel in such a way the keys are exchanged dynamically over the network leaving no trace on the system. and also bypassing the windows defender and other anti-malware or NIPS/NIDS services like Snort.
Oct 3, 2021 7 min read
Cracking Passwords using Hashcat
cryptography

Cracking Passwords using Hashcat

In the infosec, password cracking is considered as the easiest part given that the encrypted password exists in the wordlist and you are patient enough to wait. Learn basics of the hashcat password cracking tool and how to prevent from being the target of password attack
Sep 15, 2021 4 min read
Page 1 of 1
tbhaxor © 2023
Powered by Ghost