1 2

Learn about the new and serious Wifiphisher tool hack wifi WiFi (WPA/WPA2) quite easily!

Today no one has used the wireless network in their daily lives, the use of this type of communication has become more popular and widely used especially to provide the technique of easy access and link as many devices and cover long distances. Of course this widespread Wi-Fi hackers and saliva flowing there lasting techniques and methods of this type of network penetration. the last of these tools is the tool Wifiphisher.






This new tool launched by George Chatzisofroniou Greek security researcher under the name Wifiphisher. A tool for hacking wireless networks, which uses a clever scam new way beyond traditional stereotypes known. the most beautiful tool combines several techniques in the area of penetration as well as many weaknesses in the protocols used on networks.

How Wifiphisher works and why it is dangerous?
The most common way to hack the WiFi networks for a long time is mainly the alaatmadh dictionary which includes hundreds of thousands of random words and tested for access to the password of the router or router. This is known as "brute force" attack and takes time.


The new method of the Wifiphisher are quite different, smarter. Can summarize in the following:
The tool clone your access point Access Point, and the point of the new fake victim will be "Wicked kaltwam", while at the same time implement denial-of-service attack alauda DoS on the router to disable the original point of contact, making the victim believe that the problems of authentication and access to the original, so the tool make you smart and deceptive fake contact point will be very similar to the original (and also will send you a fake page tool to ask for password) and of course the user will be reassured and would not feel Thus any difference will enter voluntarily; the latter sent for a striker. also that tool a "Deauthentication" to disconnect all devices attached to your original point, forcing them to call a false point.

Once you get the original password, this point contact counterfeit or "evil twin" can continue to act as a mediator (between access point and other users), meaning you will be connected to the Internet as if you were connected to the original point of contact!. Yes, this may lead to steal passwords and other information that passes on the network, this is a very, very serious


Sure Wifiphisher can be regarded as a smart combination of social engineering (the most common method of penetration), with a simple application that combines many techniques and methods.
This utility requires Cali Linux and 2 network cards, one capable of injection. You can download and try it, and you can access all information through this link.

Comments
0 Comments

Welcome to Bets kyO blog

Writer

Welcome to the Best kyO is a blog for bloggers

Search in blog

Subscribe to receive all new

Get updates on the blogging moment by moment subscribe now