Run airodump-ng In this step, we will run airodump-ng to see all the devices that are connected to a particular network and collect more information about it. Once we have a network to the target, it’s useful to run airodump-ng on that network only, instead of running it on all the networks around us. Currently,Continue reading “Run airodump-ng”
Category Archives: Uncategorized
About airodump-ng
About airodump-ng airdump-ng is used to list all the network around us and display useful information about them. It is a packet sniffer, so it is basically designed to capture all the packets around us while we are in Monitor mode. We can run it against all of the networks around us and collect usefulContinue reading “About airodump-ng”
Wireless interface in Monitor Mode
Wireless interface in Monitor Mode This step is used to put your wireless card into Monitor mode. In Monitor mode, your card can listen to every packets that’s around us. By default, the mode of wireless devices is set to “Managed” that means our wireless device will only capture packets that have our device’s MACContinue reading “Wireless interface in Monitor Mode”
Pre-connection Attack
Pre-connection Attack Pre-connection attack is the first part of the network penetration testing. To perform this attack, we will look at the fundamentals like how to show all the networks around us, how to find the details of all the connected devices to a particular network. Once we know about the network and connected devicesContinue reading “Pre-connection Attack”
Basic of Network
Basic of Network A network is a group of two or more devices that are connected to each other to share the data or share the resource. A network contains a number of different computer system that is connected by a physical or wireless connection like server or router. This router has direct access toContinue reading “Basic of Network”
Network Penetration Testing
Network Penetration Testing Network penetration testing is the first penetration testing that we are going to cover in this section. Most of the systems and computers are connected to a network. If a device is connected to the internet, that means the device is connected to the network because the internet is a really bigContinue reading “Network Penetration Testing”
Environmental Setup
Environmental Setup To perform ethical hacking, we have to download the Kali Linux Operating System and we can download Kali Linux OS inside the Virtual box. Here are the basic steps to download the virtual box and Kali Linux. Step 1: Download Virtual Box In step1, we download the Virtual box because the virtual boxContinue reading “Environmental Setup”
Types of Hackers
Types of Hackers Hackers can be classified into three different categories: Black Hat Hacker White Hat Hacker Grey Hat Hacker Black Hat Hacker Black-hat Hackers are also known as an Unethical Hacker or a Security Cracker. These people hack the system illegally to steal money or to achieve their own illegal goals. They find banks orContinue reading “Types of Hackers”
Ethical hacking
Ethical hacking Ethical hacking is also known as White hat Hacking or Penetration Testing. Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system or data. Ethical hacking is used to improve the security of the systems and networks by fixing the vulnerability found while testing. Ethical hackers improve the security postureContinue reading “Ethical hacking”
Introduce Yourself (Example Post)
This is an example post, originally published as part of Blogging University. Enroll in one of our ten programs, and start your blog right. You’re going to publish a post today. Don’t worry about how your blog looks. Don’t worry if you haven’t given it a name yet, or you’re feeling overwhelmed. Just click theContinue reading “Introduce Yourself (Example Post)”