Skip to content

oyesam7/whitehat-2

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 

Repository files navigation

Footprinting and Reconnaissance

Scanning Networks

Enumeration

Method:

System Hacking

Malware Threats, Trojans and Viruses

Sniffing

Hacking Webservers

Hacking Web Applications

Wireless Terminologies

Components of Wireless Network

Bluetooth Threats

  • Leaking Calendars and Address Books
  • Bugging Devices
  • Sending SMS Messages
  • Causing Financial Losses
  • Remote Control
  • Social Engineering
  • Malicious Code
  • Protocol Vulnerabilities

Wireless Network Security

Creating Inventory of Wireless Devices Placement of Wireless AP Placement of Wireless Antenna Disable SSID Broadcasting Selecting Stronger Wireless Encryption Mode Implementing MAC Address Filtering Monitoring Wireless Network Traffic Defending Against WPA Cracking Passphrases Client Settings Passphrase Complexity Additional Controls Detecting Rogue Access Points Wireless Scanning: Wired-side Network Scanning SNMP Polling

Wi-Fi Discovery Tools

  • inSSIDer and NetSurveyor
  • Vistumbler and NetStumbler
  • Locating Rogue Access points
  • Protecting from Denial-of-Service Attacks: Interference
  • Assessing Wireless Network Security
  • Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyzer

WPA Security Assessment Tool

WIPS Tool

Adaptive Wireless IPS

Hacking Mobile Platforms

Evading IDS, Firewall and Honeypots

Standarts and Documents

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published