Cracking Password Hashes

Passwords are used daily by most people. They protect our valuable information from unauthorized access. Passwords are used on client computing devices, Online services, Wi-Fi, and much more. The purpose of this blog post is to demonstrate how weak passwords hashes can be cracked utilizing various methods and to raise awareness of the risks of…

Hacking Wi-Fi: Obtaining a Two-Way Handshake from WPA2 Networks

  One of the methods of obtaining access to a network is by penetrating into the Wireless Access Point. WPA2 has a vulnerability where an attacker can obtain the two-way handshake between a client and an access point (AP). In this tutorial, I will demonstrate how to obtain a 3-way handshake from an AP and…