- How to Join the Infosec Community
- [ Hacker Night School ] :: Excellent, well-written hacking lessons: HackingTutorials.org
- Finding and Using Browser-saved Passwords: Another video from Starry Sky
- Hacking for a digital marketer
- [ Hacker Night School ] :: [ Hiding Your Ass ] :: [ Using a VPN ]
- [ Hacker Night School ] :: [ Hiding Your Ass ] :: [ Using a Proxy Server ]
- [ Hacker Night School ] Being Anonymous: VPNs
- [ Hacker Night School ] :: TOR Browser Search Engines
- [ Bug Bounty ] :: Hack Facebook for Fun and Profit!
- [ Hacker Night School ] :: Learn Python in 43 Minutes (if you’re a really fast learner)
- [ Hacker Night School ] :: Hacking Practice: the Command Injection ISO
- [ Hacker Night School ] :: Got a foothold on a Windows target? Now enable Remote Desktop.
- [ Hacker Night School ] :: [ Using Git ]
- [ Hacker Night School ] :: Tsuki CTF Pwns Access on HackTheBox
- [ Hacker Night School ] :: Exploiting sudo: Altering your PATH
- [ Hacker Night School ] :: WEP Cracking Basics in Kali
- [ Hacker Night School ] :: CSRF
- [ Hacker Night School ] :: A Memory Forensics with Volatility Writeup
- [ Hacker Night School ] :: Adding the Kali Tools to Ubuntu
- [ Hacker Night School ] :: Kali Linux Metapackages (All Tools or Subsets)
- [ Hacker Night School ] :: Commando VM: a Windows Hacking “Distro”
- [ Hacker Night School ] :: VulnHub Walk-Throughs: This is how you learn to pwn
- [ Hacker Night School ] :: Metasploitable 3: A Hackable Windows VM
- [ Hacker Night School ] :: Command VM: a Windows Red-Team VM from FireEye
- [ Hacker Night School ] :: WebGoat, An OWASP Hacking Practice Website
- School for Hackers :: Python for Malware Analysis
- [ Hacker Night School ] :: Encoding and Decoding: Base64, ASCII, etc.
- [ Hacker Night School ] :: Using the Greenbone Vulnerability Scanner
- The KNOB Attack: Does this exploit from 2018 still work?
- [ Hacker Night School ] :: The Holy Unblocker
- [ Hacker Night School ] :: the POODLE attack, featuring TLS Downgrade
- [ Hacker Night School ] :: The Illustrated TLS Connection
Wifi Cracking: Start With the Basics: WEP
WEP is so old and weak you’ll hardly ever find it in use, though there are always the few who haven’t paid attention. WEP cracking is a great way to get familiar with the aircrack-ng suite (https://www.aircrack-ng.org/), its commands and processes.
Where to Learn
Start with the horse’s mouth:
https://www.aircrack-ng.org/doku.php?id=getting_started
Here’s a nice command-by-command example:
https://www.wirelesshack.org/step-by-step-kali-linux-and-wireless-hacking-basics-wep-hacking-part-3.html
And a video that accompanies it (circa 2013):
https://www.youtube.com/watch?v=RydsjNhUjdg
Null-Byte has a newer (2017) article with excellent examples:
https://null-byte.wonderhowto.com/how-to/hack-wi-fi-getting-started-with-aircrack-ng-suite-wi-fi-hacking-tools-0147893/
Where to Test Your Wifi Hacking Skills
Find a Wireless Access Point (WAP), preferably the oldest you can find.
Assignments
- Set up your WAP using WEP encryption. Don’t go crazy turning on the firewall or anything else; just concentrate on this one skill.
- Crack into that sucker, all from the command line, using the examples above.
- Kali is constantly changing. Does your version have a GUI tool for WEP cracking? Find it and try it.