Header Banner
Null Byte Logo
Null Byte
Cyber Weapons LabForumMetasploit BasicsFacebook HacksPassword CrackingTop Wi-Fi AdaptersWi-Fi HackingLinux BasicsMr. Robot Hacks Hack Like a Pro Forensics Recon Social Engineering Networking Basics Antivirus Evasion Spy Tactics MitM Advice from a Hacker
nullbyte.png

Wi-Fi Hacking

Monk working on a laptop in a library.
Jun 7, 2019

Identifying vulnerable devices and services on a target router can be difficult without leaving logs and other traces of an active attacker on the network. However, there is a way to covertly decrypt ...

Lego figurines depicting a stormtrooper and Darth Vader in a playful scene.
Jun 1, 2019

The latest Star Wars movie, Solo: A Star Wars Story, has grossed almost $350 million worldwide during its first month in theaters. This is a good opportunity to discuss how hackers can use media hype ...

Evil Limiter software interface screenshot
May 24, 2019

If you find yourself with a roommate hogging limited data bandwidth with video games or discover a neighbor has invited themselves into your Wi-Fi network, you can easily take back control of your int ...

"How to Spy on Network Relationships with Airgraph-Ng" cover image
Mar 23, 2019

What if you could easily visualize which access point every Wi-Fi device nearby is connected to in a matter of seconds? While programs like Airodump-ng can intercept this wireless information, making ...

Small electronic circuit board held in hand.
Mar 11, 2019

If you want to get started sniffing Wi-Fi networks, you usually need to start with a wireless network adapter. But thanks to a Wi-Fi sniffing library written in Arduino and the ultra-cheap ESP8266 chi ...

"How to Automate Wi-Fi Hacking with Wifite2" cover image
Mar 5, 2019

There are many ways to attack a Wi-Fi network. The type of encryption, manufacturer settings, and the number of clients connected all dictate how easy a target is to attack and what method would work ...

Data spreadsheet with yellow highlighted rows and code output on a computer screen.
Feb 4, 2019

Due to weaknesses in the way Wi-Fi works, it's extremely easy to disrupt most Wi-Fi networks using tools that forge deauthentication packets. The ease with which these common tools can jam networks is ...

Birthday card for mom in a store.
Jan 6, 2019

With an ordinary birthday card, we can introduce a physical device which contains malicious files into someone's home and deceive them into inserting the device into a computer. In my last series, we ...

Wi-Fi enabled circuit board with a glowing LED.
Oct 18, 2018

The most common Wi-Fi jamming attacks leverage deauthentication and disassociation packets to attack networks. This allows a low-cost ESP8266-based device programmed in Arduino to detect and classify ...

LED connected to a microcontroller on a breadboard.
Oct 18, 2018

Hackers and makers are often grouped under the same label. While hackers draw on computer science skills to write programs and find bugs, makers use electrical engineering to create hardware prototype ...