How to Run a Bluetooth Honeypot on Kali
Bluepot is a Bluetooth Honeypot created by Andrew Smith
DSTIKE Device: WiFI Duck
4MB Flash ESP-WROOM-02 Atmega32u4 IIC connection between ESP8266 and Atmega32u4 RGB LED DIP Switch for different mode: Arduino Flash Mode: 10101010 ESP8266 Flash Mode: 01011101 Work Mode: 10101101 https://github.com/lspoplove/Deauther-Project
How to Install Wifite 2: Complete Tutorial
Learn how to install Wifite 2 on Raspbian OS or Kali Linux Supported Attacks Required Tools Tool Description Git python Wifite2 supports python2 and python3 iwconfig OS tool to manage wireless connections. Aircrack-ng Pack All tools from Aircrack Suite sudo apt-get install aircrack-ng tshark tshark will be used to sniff all network packets necessary to […]
EAPHammer: Attack WPA2-Enterprise networks
A toolset called EAPHammer can be used to launch focused evil twin attacks against WPA2-Enterprise networks. It is intended for usage in red team…
IEEE 802.11 Acronyms
AES – Advanced Encryption Standard AID – Association Identifier AP – Access Point BS – Base Station BSS – Basic Service Set BSSID – Basic Service Set Identifier CCA – Clear Channel Assessment CCMP – Counter Mode with Cipher Block Chaining Message Authentication Code Protocol CTS – Clear to Send DS Distribution System EAP Extensible […]
Red Team Hardware Toolkit
Offensive Devices Wireless 802.11 Device Chip Frequency Description Framework Buy DStrike Wi-Fi Pineapple Alfa awus036neh Alfa Bluetooth Device Chip Frequency Description Framework Buy Ubertooth AILOVA Ble Sniffer CC2540 2,405-2,485 GHz ZigBee Device Technology Chip Frequency Description Framework Buy ConBee II Zigbee nRF 52840 ZigBee CC2531 2,405-2,485 GHz NRF Device Technology Chip Frequency Description Framework Buy […]
SweynTooth vulnerabilities
SweynTooth critical vulnerabilities were found on Bluetooth Stack from some manufactors
WHID Elite: Open-Source Multi-Purpose Offensive Device
WHID Elite is a GSM-enabled Open-Source Multi-Purpose Offensive Device that allows a threat actor to remotely inject keystrokes, bypass air-gapped systems, conduct mousejacking attacks, do acoustic surveillance, RF replay attacks and much more. In practice, is THE Wet Dream of any Security Consultant out there! Original Product Description WHID Elite Features 2G/GSM Networks remote control […]
Read More “WHID Elite: Open-Source Multi-Purpose Offensive Device”
OWASP IoT Top 10 2018
Weak Guessable, or Hardcoded Passwords Insecure Network Services Insecure Ecosystem Interfaces Lack of Secure Update Mechanism Use of Insecure or Outdated Components Insufficient Privacy Protection Insecure Data Transfer and Storage Lack of Device Management Insecure Default Settings Lack of Physical Hardening https://owasp.org/www-pdf-archive/OWASP-IoT-Top-10-2018-final.pdf