top of page

Facts About the WPA/WPA2 Flaw: The KRACK Attack

I'd like to highlight some things about the KRACK attack. Regarding The Straits Times article "Security Flaw Prompts Fears on Wi-Fi...

Staying Connected to a Broken Wi-Fi AP (Mac OS X)

Whilst this is not strictly a cybersecurity-related snippet, it might still be an interesting curiosity for someone working on that field...

3 Wireless Security Myths

Quick Tips Network name hiding and MAC address filtering are for safety, not for security. Never use WEP as your wireless encryption...

Hacking Made Too Easy

A couple of months back, I walked past a friend who was working furiously on her laptop. It was her red BackTrack wallpaper that caught...

WPA — Password is its Weakest Link

The WPA/WPA2 security protocol can be used to prevent hackers and other unauthorised people from accessing wireless networks or even...

WiFi Pineapple — First Impression

Here is the review of the WiFi pineapple. Because there are simply too many awesome avenues to explore on the WiFi Pineapple I will touch...

JTR WPA Wordlist

John the Ripper (JTR) is an extraordinary tool that is useful for cracking passwords. First, we must understand that using a word list is...

802.11 Network Security – Tools of the Trade

I thought why not shed some light on the tools that I have been using to play with the Wi-Fi networks around me. Hopefully, we can get...

Wireless Channel Hopping

Ever wondered how your devices like your laptop get the list of wireless networks available? First, you have to understand that at any...

Antennas, Gain & Security

One of the common misconceptions that people tend to have is that higher gain is better. This results in people blindly buying the...

Introduction to Wi-Fi

Wi-Fi (Wireless Fidelity) came about in 1999 and has gained popularity to over 700 million people and over 750,000 hotspots all around...

WEP (In)Security

In cryptography, it is a bad practice to use the same encryption key to encrypt every single packets/data. If Eve the eavesdropper has a...

BLOG: Blog2
bottom of page