wifi-security Understand MAC Header Format in Detail This post will go over the MAC header format for the 802.11 standard and its components in depth.
wifi-security Introduction to Wireless Networking In this post, you will learn about the need for wireless networks and the organisations behind the market penetration of this technology, as well as why this field fascinates me.
wifi-security Pivoting Over Challenge Based Enterprise WiFi Network You will discover how to connect to the organization's access point using PEAP-MSCHAPv2 authentication and relay the response to the authenticator challenge This will allow you to read the private emails on a LAN-hosted POP3 server.
wifi-security Break into the WiFi Network and Interact with Services In this post, I'll go over how to crack the key of a WEP-encrypted WiFi network and pivot into it to interact with vulnerable services running on it.
networking Writing Connect Back TCP Shell in C# Connect back shell allows attackers to bypass the firewall by making the client connect to the malicious server. Learn how to implement such a server in CSharp language to perform C&C
linux Exploiting Linux Capabilities – Part 5 Learn the basics of networking and how to perform privileged tasks when you have special network capabilities: cap_net_raw, cap_net_bind_service and cap_net_admin