Hello guys, i just started to learn somethings on wireless security and i like to just mess with my router. I succeded to crack and get the wps of my repeater with a pixie dust attack. Got the wpa and everything is good, but i was wondering is it possible to connect of the actual router connected to the extender? Obv i know bssid etc
Forum Thread: Help with Wi-Fi Extender
- Hot
- Active
-
Forum Thread: Hack Instagram Account Using BruteForce 192 Replies
23 hrs ago -
Forum Thread: How Do I Access Different Directories Within Android via Meterpreter 5 Replies
2 days ago -
Forum Thread: Best Programming Language? 8 Replies
5 days ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 4 Replies
6 days ago -
Forum Thread: Fix Meterpreter Problem 2 Replies
6 days ago -
Forum Thread: What Are Some Good Budget Laptops for Pentestin 11 Replies
1 wk ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 31 Replies
1 wk ago -
Forum Thread: Need Help with FatRat Over WAN 1 Replies
1 wk ago -
Forum Thread: Kali Linux Boot Error 8 Replies
1 wk ago -
Forum Thread: I Want to Hack in to My Friends System Through his wifi router i am controlling 8 Replies
1 wk ago -
Forum Thread: Kali linux command error. Kindly help 3 Replies
1 wk ago -
Forum Thread: How to Create a Python Remote Keylogger for Facebook 27 Replies
1 wk ago -
Forum Thread: Kali Linux Handshake Porblem 2 Replies
2 wks ago -
Forum Thread: Port Forwarding Problem in Metasploit Can't Establish Connection (WAN) 3 Replies
2 wks ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 7 Replies
2 wks ago -
Forum Thread: GMail Brute Force Dictionary Attack Script 31 Replies
3 wks ago -
Forum Thread: Msfvenom Android Exploitation Outside LAN? 12 Replies
3 wks ago -
Forum Thread: How to decrypt .CAP file of handshake during WiFi attack 2 Replies
3 wks ago -
Forum Thread: Make a Phishing Page for Harvesting Credentials Yourself 7 Replies
1 mo ago -
Forum Thread: How Do You Make a Completely Undetectable Phishing Page? 2 Replies
1 mo ago
-
How To: Make Spoofed Calls Using Any Phone Number You Want Right from Your Smartphone
-
How To: Master Python, Linux & More with This Training Bundle
-
How To: Hack Android Using Kali (Remotely)
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
Hack Like a Pro: How to Crack Online Web Form Passwords with THC-Hydra & Burp Suite
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How To: Embed a Metasploit Payload in an Original .Apk File | Part 2 – Do It Manually
-
How To: The Essential Skills to Becoming a Master Hacker
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Buy the Best Wireless Network Adapter for Wi-Fi Hacking in 2019
-
Android for Hackers: How to Turn an Android Phone into a Hacking Device Without Root
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Crack Password-Protected ZIP Files, PDFs & More with Zydra
-
How To: Hack WPA WiFi Passwords by Cracking the WPS PIN
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
Be the First to Respond
Share Your Thoughts