1 2

Learn about the new and serious Wifiphisher tool hack wifi WiFi (WPA/WPA2) quite easily!

Today no one has used the wireless network in their daily lives, the use of this type of communication has become more popular and widely used especially to provide the technique of easy access and link as many devices and cover long distances. Of course this widespread Wi-Fi hackers and saliva flowing there lasting techniques and methods of this type of network penetration. the last of these tools is the tool Wifiphisher.






This new tool launched by George Chatzisofroniou Greek security researcher under the name Wifiphisher. A tool for hacking wireless networks, which uses a clever scam new way beyond traditional stereotypes known. the most beautiful tool combines several techniques in the area of penetration as well as many weaknesses in the protocols used on networks.

How Wifiphisher works and why it is dangerous?
The most common way to hack the WiFi networks for a long time is mainly the alaatmadh dictionary which includes hundreds of thousands of random words and tested for access to the password of the router or router. This is known as "brute force" attack and takes time.


The new method of the Wifiphisher are quite different, smarter. Can summarize in the following:
The tool clone your access point Access Point, and the point of the new fake victim will be "Wicked kaltwam", while at the same time implement denial-of-service attack alauda DoS on the router to disable the original point of contact, making the victim believe that the problems of authentication and access to the original, so the tool make you smart and deceptive fake contact point will be very similar to the original (and also will send you a fake page tool to ask for password) and of course the user will be reassured and would not feel Thus any difference will enter voluntarily; the latter sent for a striker. also that tool a "Deauthentication" to disconnect all devices attached to your original point, forcing them to call a false point.

Once you get the original password, this point contact counterfeit or "evil twin" can continue to act as a mediator (between access point and other users), meaning you will be connected to the Internet as if you were connected to the original point of contact!. Yes, this may lead to steal passwords and other information that passes on the network, this is a very, very serious


Sure Wifiphisher can be regarded as a smart combination of social engineering (the most common method of penetration), with a simple application that combines many techniques and methods.
This utility requires Cali Linux and 2 network cards, one capable of injection. You can download and try it, and you can access all information through this link.

Comments
0 Comments
  • New images for Microsoft's new browser
    New images for Microsoft's new browser "Spartan"

    Still Microsoft's new browser "Spartan" raises a lot of interest in technical circles especially it is…

  • New project to turn smartphones into desktop computers
    New project to turn smartphones into desktop computers

    There is no doubt that Smartphones have become joined widespread owing to advanced features that are…

  • North Korea suffered a violent revenge!
    North Korea suffered a violent revenge!

    It appears that piracy of the Japanese company Sony by pirates group Guardians of peace to North Korea…

  • 8 Reasons Why Firefox is better than Google Chrome
    8 Reasons Why Firefox is better than Google Chrome

    Firefox is one of the most widely used programs surf the Internet all day .oroana how the browser has…

  • Apple to launch iPhone screen smaller
    Apple to launch iPhone screen smaller

    It is known that smart phones with large displays has become a popular trend in the world of smart…

  • Galaxy S6 will be two copies
    Galaxy S6 will be two copies

    It is clear that the disclosure of a South Korean company Samsung's new Galaxy S6 will be very soon, the…

  • Children respond to their mothers more
    Children respond to their mothers more

    M In the first year of life, children are exposed to more words by their mothers, making…

  • 31 pictures that summarize very well what it is like to be dad! The 27 is unfortunately frequent...
    31 pictures that summarize very well what it is like to be dad! The 27 is unfortunately frequent...

  • Skype launches beta version of Skype Translator
    Skype launches beta version of Skype Translator

    Skype revealed of the American company Microsoft to users who have registered during the month of…

  • Extraordinary 3D computer Microsoft
    Extraordinary 3D computer Microsoft

    Over the last 6 months, rumours and reports different from Microsoft is busy working on a new virtual…

  • What falls faster: Bowling ball or feather?
    What falls faster: Bowling ball or feather?

    Interesting experience finally gives the answer to this intriguing question In early modern…

  • In Iceland, electrical pylons are transformed into sculptures by 45 m tall! Impressive...
    In Iceland, electrical pylons are transformed into sculptures by 45 m tall! Impressive...

    Located in the extreme north-west of Europe, the…

  • Microsoft launches
    Microsoft launches "Sylvie" the largest in the world

    The self-images or "Alselva" one of fashions most prevalent among all classes the digital world,…

  • Learn about the software used by the NSA in order to control all the computers in the world!
    Learn about the software used by the NSA in order to control all the computers in the world!

    It seems that the US National Security Agency scandals "NSA" are still ongoing after the secrets that…

Welcome to Bets kyO blog

Writer

Welcome to the Best kyO is a blog for bloggers

Search in blog

Subscribe to receive all new

Get updates on the blogging moment by moment subscribe now