Cracking Wifi Passwords Easier Than You Think

The Wifi device that you have (either yourself or by someone else) are setup with: Decide on naming your device, and also decide on the encryption technology to set up the network(your Internet access). Of course you could decide not to encrypt but in that case you are screwed security wise.  So let’s assume that … Read more

Curious about latest Malware or Viruses?

https://isc.sans.edu/  has a good post on how to do some rudimentary searches… Specifically https://isc.sans.edu/forums/diary/Botnets+spreading+Dridex+still+active/20295/ is the post. The image above is the same image from isc.sans.edu today post, notice how Brad Duncan searched for the Dridex malware with the hash mark, so if there is a suspected malware you are interested in researching that is a great … Read more

Wifi Attacks Succeed Against All:WEP/WPA

When do Wifi attacks Succeed? It depends on your setup   Some basics: First of all, change your default admin password (since default admin passwords are on the Internet so that users can manage their WiFi Access points). New access points may look like this: and the support page shows how to access the WiFi … Read more

VLAN Hopping Defeats Segmentation

When we set up a Network we segment the network. The firewall protects the inside network, and the inside network critical systems are separated from the rest of the devices. Also for compliance reasons one needs to segment networks.   So the hacker wants to see all the computers… (how?) VLAN hopping. http://www.blackhat.com/presentations/bh-usa-02/bh-us-02-convery-switches.pdf This is … Read more