Skip to main content

Posts

WORDLIST DICTIONARY

REFERENCE http://www.outpost9.com/files/WordLists.html https://hashes.org/left.php https://hashcat.net/forum/thread-1236.html
Recent posts

WIBR+ WIFI HACK ANDROID

DOWNLOAD THE APP HERE WIBR+ is an advanced application for testing of security of the WPA/WPA2 PSK WiFi networks. This application is NOT FAKE, it really works and it will discover weak password. WIBR+ supports queueing, custom dictionaries, bruteforce generator and advanced monitoring! WIBR+ supports two types of attack Dictionary attack – WIBR+ tries passwords from predefined list one by one. Please don’t be disappointed if the password will not be found, it simply means that it was not in the dictionary. However, if the key is set to “12345678” or “password” it will be detected. WIBR+ supports importing of your own password lists, so you are not limited by pre-installed dictionaries! You can download dictionaries here . Bruteforce attack – you can select alphabet, length of password and the app will try all combinations of characters in the alphabet. Of course this is complete madness because the number of combinations is growing exponentially with password

WIFI WPS WPA TESTER ANDROID

Do you ever wonder if your router is vulnerable to hackers? Then you should definitely download this app, right now! WIFI WPS WPA TESTER is an incredible app that allows you to test the connection to your Access Point, using WPS PIN! These PINs are calculated using many different algorithms, including: Zhao; TrendNet; Dlink; Dlink+1; Belkin (root); FTE-xxx; TrendNet; Asus; AiroconRealtek; EasyBox Arcadyan; Arris, and many more! The most amazing part is that this app has the ability to try over 11000 Pin combinations! There is no other app like this in the market! It is important to understand that this app does not work on devices without root permissions and with Android < 5.0 (Lollipop). Download WIFI WPS WPA TESTER now and make sure your AP is secure!

How to Properly Hack PLDT Wifi: 100% Working in 2019

Pldt Wifi are easy to hack if you know how to properly used the tools available, these tools and apps are need to be download on your smartphones or tablets. PLDT wifi hacker allows you to connect to a PLDT router if you know some tricks, dony worry, it is very simple and easy to follow. How to download this file  New Update for new PLDT WIFI Device: June 29, 2018 Note: 50% change to working on same new device just try if working Example #1  PLDTWIFI52374 x 3 nyo bali 52374 x 3 = 157122 New password is:  PLDTWIFI157122  Example #2  network name: PLDTHOMEDSL57341 57341*3=172023 add mo yun PLDTWIFI password: PLDTWIFI172023  Supported Devices: Note: It's not hacking but it will only view password that has not been change the default password Android Phone ( Exclude Galaxy Young ) NOTE : MANUAL HACKING  If the name of the wifi is PldtMyDSL_XXX or the name of the wifi was included costumer name you may proceed manual hacking (VIA BSS
Crack WPA/WPA2 Wi-Fi Routers with Aircrack-ng and Hashcat Brannon Dorsey Credits: https://medium.com/@brannondorsey/crack-wpa-wpa2-wi-fi-routers-with-aircrack-ng-and-hashcat-a5a5d3ffea46 Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and  Aircrack-ng / Hashcat . This is a brief walk-through tutorial that illustrates how to crack Wi-Fi networks that are secured using weak passwords. It is not exhaustive, but it should be enough information for you to test your own network’s security or break into one nearby. The attack outlined below is entirely passive (listening only, nothing is broadcast from your computer) and it is impossible to detect provided that you don’t actually use the password that you crack. An optional active deauthentication attack can be used to speed up the reconnaissance process and is described at the end of this document. If you are familiar with this process, you can skip the descriptions and jump to a list of the commands used

Hack WPA & WPA2 Wi-Fi Passwords with a Pixie-Dust Attack Using Airgeddon

Credits:https://null-byte.wonderhowto.com/how-to/hack-wpa-wpa2-wi-fi-passwords-with-pixie-dust-attack-using-airgeddon-0183556/ Design flaws in many routers can allow hackers to steal Wi-Fi credentials, even if WPA or WPA2 encryption is used with a strong password. While this tactic used to take up to 8 hours, the newer WPS Pixie-Dust attack can crack networks in seconds. To do this, a modern wireless attack framework called Airgeddon is used to find vulnerable networks, and then Bully is used to crack them. In some cases, an access point's encryption is not the weakest point of the network, so it's good to think outside of the box, or, in this case ... focus on the box. Since the source of the Wi-Fi signal is being broadcast from the router's hardware, the device itself would be a great target to attack instead of the encryption. And one weakness many access points have is a feature called Wi-Fi Protected Setup, which we will learn how to exploit in this guide. If you for