How to Steal Wifi Passwords - No Cracking
Hacker Handle
by
5y ago
Obtaining someone's password can be achieved through two types of attacks: brute-force or social engineering. When it comes to wifi passwords, the former involves capturing a WPA handshake then using it to crack the passphrase with a hash list (click here to read my post about this). Brute-forcing a password is time consuming and requires decent processing power, but most importantly it isn't always successful. If the true password is not contained initially in your list, then the attack will surely fail.  To overcome these problems, penetration testers have elaborated a different approach rel ..read more
Visit website
Raspberry Pi Setup: Lab vs Headless
Hacker Handle
by
5y ago
We already know that the Raspberry Pi is an ideally versatile platform for pentesting. In my previous posts, I wrote about several attacks performed with Kali Linux running on a Pi 3, but I didn't mention the different setups possible: the lab setup or the headless one. Thus, I will go over the main purposes of each configuration while mentioning their pros and cons. The lab setup This is the config you have probably used while installing Kali Linux on the Pi. Here, you are interacting with the Pi directly and not through an intermediate device (more on that later): this is why you need to u ..read more
Visit website
New project on the way
Hacker Handle
by
5y ago
I'd like to announce the beginning of a new project. Spoiler alert: it's called the Pentest Handbook... Yes, you guessed it, I am working on a book containing the most useful Kali Linux commands and scripts for all pentesting needs. I want to point out that the Pentest Handbook is neither a guide, nor a book. It doesn't explain any concept in depth. The Pentest Handbook will be a simple log book for frequently used commands. The Handbook should take a while to complete, as I will be enriching it very often. I am planning on releasing a paper version and an e-book one, but nothing's sure for n ..read more
Visit website
Using Vim, the utlimate text editor
Hacker Handle
by
5y ago
A text editor is where a script coder or hacker spends most of his time. Choosing one that we master and feel comfortable with is therefore a crucial factor affecting productivity and speed. A common mistake is made by new hackers: they find a text editor with a GUI and jump towards it because it's simple and similar to standard editors. This is a bad practice because they'll find only later that the capabilities of such editors are limited. It is recommended to start with a more advanced text editor since day one, even if this requires more effort, time and dedication to master. Today we'll t ..read more
Visit website
How to capture a WPA handshake
Hacker Handle
by
5y ago
There are different methods for getting unauthorized access to a Wifi network. I will try to cover several ones, but in this post I will focus on capturing a WPA handshake for a subsequent dictionary or bruteforce attack. RequirementsBefore getting started make sure you have the following:Raspberry Pi 3 running Kali Linux (tutorial here)Monitor-mode and Packet-injection capable wifi adapterPCDecent internet connectionWe'll be using the wifi adapter with the Raspberry Pi, controlling them with a PC via VNC (tutorial here).What is a WPA handshake?In simple words, a WPA handshake is used to authe ..read more
Visit website
Getting started in scripting
Hacker Handle
by
5y ago
Perhaps the most important skill a hacker should master is programming. This is what makes the true difference between "hackers" and "script kiddies". A skiddie lacks the knowledge to write his own script: he rather uses programs made by others to attack his target. In contrast, a worthy hacker builds his own program from scratch in order to exploit a certain vulnerability. Does that mean that a hacker never uses material written by others? Not really. As most of the exploits (scripts that exploit a flaw) written by/for the Linux community are open-source, hackers often reverse-engineer these ..read more
Visit website
How to access your Pi remotely via VNC
Hacker Handle
by
5y ago
In my previous post I talked about setting up a headless Raspberry Pi configuration -- the real purpose of using a Pi as a pentesting tool. The first step in making our Pi portable is the installation and activation of a VNC (Virtual Network Computing) connection. I will be glad to answer any questions you might have after reading this guide. RequirementsAs always, verify that you have the necessary material:Raspberry Pi 3 running Kali Linux (tutorial here)Power adapterHDMI cableTV or monitorDecent internet connectionInstalling the VNC server on the PiThere are many VNC softwares but we'l ..read more
Visit website
Tutorial: installing Kali Linux on a Raspberry Pi 3
Hacker Handle
by
5y ago
The much-awaited tutorial. Here, you will learn step by step how to download and install the Kali Limux OS on a Raspberry Pi 3. Let's get started. First, make sure that you have everything necessary by checking this list: Raspberry Pi 3 Model B or B+A computerA microSD cardAn HDMI cableA micro USB power adapterA USB keyboardA monitorA stable and decent Internet connectionNote regarding the post: you can click on any image to enlarge it. I- Downloading Kali Linux Head to www.kali.org, go to Downloads and click on Kali ARM Images as follows: Then scroll down until you find the Raspberry Founda ..read more
Visit website
Unboxing the Raspberry Pi 3
Hacker Handle
by
5y ago
I have finally received my Raspberry Pi 3 Model B. Before talking about my intentions and potential uses with the Pi, let's open it and see what comes in the box:That was quick. No, there's nothing else than the Pi itself in the box. No cables, no adapter, no case, nothing. Straight to the point. Now into more interesting matters. Why did I want a Raspberry Pi? How can it help me in my work? I'll explain. A few months ago my friend had a project for which he needed to build a smart home model. To represent the smartphone-controlled lighting system, he used an Arduino circuit which let him turn ..read more
Visit website
Choosing the right hardware
Hacker Handle
by
5y ago
You want to get yourself started in ethical (or unethical) hacking, but don’t know what equipment to choose. This is understandable, considering the large choice of devices and accessories available on the market. Let’s try and help you out on that one. First, you need a computer. You simply can’t get far without one. Usually, a laptop is more adequate than a desktop, especially if you work on the move. What about the requirements in terms of specifications? You’ll want to choose a medium-sized PC, like a 13-inch model, offering the best power-to-battery life ratio and, of course, an affordabl ..read more
Visit website

Follow Hacker Handle on FeedSpot

Continue with Google
Continue with Apple
OR