Evil Twin Attack with DNSMASQ – Wireless WPA2-PSK Cracking

Ever heard of an evil twin AP? An evil twin AP is like a rogue access point. The attacker creates a fake wireless AP to lure users into thinking it’s a trusted wireless…

Read more

Man in the Middle Attack with Websploit Framework

  We assume most of you know what a Man in the Middle (MitM) attack is, but below is a diagram of a Man in the Middle attack. A man-in-the-middle attack is a…

Read more

Automated MITM Attack with MitmAP Python Script

Wireless networks were first introduced in 1991. The wireless networking is an invention that makes it possible to transfer data packets over standard network protocols: the only difference is that it uses radio…

Read more

Generate 100% FUD Backdoor with TheFatRat – Windows 10 Exploitation

As you all knows, Windows 10 is the latest edition of Microsoft having great security features but what if someone send a trojan/virus/backdoor/payload which is 100% FUD (Fully Undetectable) ? So basically, with…

Read more