1 2

Learn about the new and serious Wifiphisher tool hack wifi WiFi (WPA/WPA2) quite easily!

Today no one has used the wireless network in their daily lives, the use of this type of communication has become more popular and widely used especially to provide the technique of easy access and link as many devices and cover long distances. Of course this widespread Wi-Fi hackers and saliva flowing there lasting techniques and methods of this type of network penetration. the last of these tools is the tool Wifiphisher.






This new tool launched by George Chatzisofroniou Greek security researcher under the name Wifiphisher. A tool for hacking wireless networks, which uses a clever scam new way beyond traditional stereotypes known. the most beautiful tool combines several techniques in the area of penetration as well as many weaknesses in the protocols used on networks.

How Wifiphisher works and why it is dangerous?
The most common way to hack the WiFi networks for a long time is mainly the alaatmadh dictionary which includes hundreds of thousands of random words and tested for access to the password of the router or router. This is known as "brute force" attack and takes time.


The new method of the Wifiphisher are quite different, smarter. Can summarize in the following:
The tool clone your access point Access Point, and the point of the new fake victim will be "Wicked kaltwam", while at the same time implement denial-of-service attack alauda DoS on the router to disable the original point of contact, making the victim believe that the problems of authentication and access to the original, so the tool make you smart and deceptive fake contact point will be very similar to the original (and also will send you a fake page tool to ask for password) and of course the user will be reassured and would not feel Thus any difference will enter voluntarily; the latter sent for a striker. also that tool a "Deauthentication" to disconnect all devices attached to your original point, forcing them to call a false point.

Once you get the original password, this point contact counterfeit or "evil twin" can continue to act as a mediator (between access point and other users), meaning you will be connected to the Internet as if you were connected to the original point of contact!. Yes, this may lead to steal passwords and other information that passes on the network, this is a very, very serious


Sure Wifiphisher can be regarded as a smart combination of social engineering (the most common method of penetration), with a simple application that combines many techniques and methods.
This utility requires Cali Linux and 2 network cards, one capable of injection. You can download and try it, and you can access all information through this link.

Comments
0 Comments
  • Google launches its first online store selling all their products online
    Google launches its first online store selling all their products online

    Google launches a new website is an online store selling all electronic products from the market and…

  • Arcadia secret new Microsoft Project
    Arcadia secret new Microsoft Project

    It seems that the company is working on a secret project, according to the new media, the new project…

  • Disclosure of the date of submission of the LG phone curved LG G Flex 2
    Disclosure of the date of submission of the LG phone curved LG G Flex 2

    There is no doubt that the Consumer Electronics Show 2015 exhibition and is known for short as "CES"…

  • YouTube will be integrated into its new over the coming weeks
    YouTube will be integrated into its new over the coming weeks

    It seems that Google is working hard and continuously to develop its platform for video, and in this…

  • Anstgharam adds new ads and broaden engagement pictures
    Anstgharam adds new ads and broaden engagement pictures

    "Anstgharam" announced in her blog the official just days from…

  • Samsung Unveils launch date smart phones with the folding screens
    Samsung Unveils launch date smart phones with the folding screens

    It seems that the South Korean company Samsung has become too close to the launch of smart phones with…

  • Google Launches
    Google Launches "Contributor" alternative service for advertising on the Internet sites

    It is known that advertising on the Internet is the main source of income for all Internet sites…

  • The first competitor to the legend Michael Jackson
    The first competitor to the legend Michael Jackson

    Reputation started dancing "Marquese Scott" broadcast on social networking sites, where the dancer and the…

  • Sell Apple computer 1 from the collection of the late Steve record
    Sell Apple computer 1 from the collection of the late Steve record

    Although some electronic equipment may be outdated, it remains of great value and is exactly where the…

  • 8 things in Galaxy S6
    8 things in Galaxy S6 "copied" from iPhone

    Announcement of the Samsung Galaxy s 6 was on Sunday (3/1) as expected. It seems that the company listened…

  • Learn about the new operating system Android developed by Google
    Learn about the new operating system Android developed by Google

    Google seems to want to keep up with the dynamic that now resides in the digital world and the new…

  • IF YOU CAN SPEAK ANOTHER LANGUAGE. THERE ARE REAL OPPORTUNITIES ONLINE.
    IF YOU CAN SPEAK ANOTHER LANGUAGE. THERE ARE REAL OPPORTUNITIES ONLINE.

    Frank Baum once said that knowledge was the best and safest treasure to acquire. I learned that…

  • Google fears loss of
    Google fears loss of "stars" YouTube

    No doubt the fact that YouTube's platform for Google is the first and most important for content…

  • Microsoft Acquires Aorato to secure cloud storage service
    Microsoft Acquires Aorato to secure cloud storage service

    Microsoft announced the acquisition of the company "Aorato" competent in providing information…

Welcome to Bets kyO blog

Writer

Welcome to the Best kyO is a blog for bloggers

Search in blog

Subscribe to receive all new

Get updates on the blogging moment by moment subscribe now