Google Researcher Publishes PoC Exploit for Apple iPhone Wi-Fi Chip Hack

You have now another good reason to update your iPhone to newly released iOS 11—a security vulnerability in iOS 10 and earlier now has a working exploit publicly available.

Gal Beniamini, a security researcher with Google Project Zero, has discovered a security vulnerability (CVE-2017-11120) in Apple’s iPhone and other devices that use Broadcom Wi-Fi chips and is hell easy to exploit.

This

Continue reading Google Researcher Publishes PoC Exploit for Apple iPhone Wi-Fi Chip Hack

Cyberspies Are Using Leaked NSA Hacking Tools to Spy On Hotels Guests

An infamous Russian-linked cyber-espionage group has been found re-using the same leaked NSA hacking tool that was deployed in the WannaCry and NotPetya outbreaks—this time to target Wi-Fi networks to spy on hotel guests in several European countries.

Security researchers at FireEye have uncovered an ongoing campaign that remotely steals credentials from high-value guests using Wi-Fi networks

Continue reading Cyberspies Are Using Leaked NSA Hacking Tools to Spy On Hotels Guests

WikiLeaks Reveals How CIA Malware Tracks Geo-Location of its Targeted

WikiLeaks has just published a new batch of the ongoing Vault 7 leak, and this time the whistleblowing website has unveiled a classified malware for that tracks geo-location of targeted PCs and laptops running the Microsoft Windows operating system.

I… Continue reading WikiLeaks Reveals How CIA Malware Tracks Geo-Location of its Targeted

Wikileaks Unveils ‘Cherry Blossom’ — Wireless Hacking System Used by CIA

WikiLeaks has published a new batch of the ongoing Vault 7 leak, this time detailing a framework – which is being used by the CIA for monitoring the Internet activity of the targeted systems by exploiting vulnerabilities in Wi-Fi devices.

Dubbed “Cherry Blossom,” the framework was allegedly designed by the Central Intelligence Agency (CIA) with the help of Stanford Research Institute (SRI

Continue reading Wikileaks Unveils ‘Cherry Blossom’ — Wireless Hacking System Used by CIA

Millions Of Smartphones Using Broadcom Wi-Fi Chip Can Be Hacked Over-the-Air

Millions of smartphones and smart gadgets, including Apple iOS and many Android handsets from various manufacturers, equipped with Broadcom Wifi chips are vulnerable to over-the-air hijacking without any user interaction.

Just yesterday, Apple rushed … Continue reading Millions Of Smartphones Using Broadcom Wi-Fi Chip Can Be Hacked Over-the-Air

Hacker Shows How Easy It Is To Hack People While Walking Around in Public

Wi-Fi enabled devices — widely known as the Internet of Things (IoT) — are populating offices and homes in greater and greater numbers.

From smartphones to connected printers and even coffee makers, most of these IoT devices have good intentions and can connect to your company’s network without a problem.

However, as the Internet of Things (IoT) devices are growing at a great pace, they

Continue reading Hacker Shows How Easy It Is To Hack People While Walking Around in Public

Fern Wifi Cracker – Wireless Security Auditing Tool

Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to crack and recover WEP/WPA/WPS keys and also run other network based attack… Continue reading Fern Wifi Cracker – Wireless Security Auditing Tool

THN Deal — Learn Wi-Fi Hacking & Penetration Testing [Online Course: 83% OFF]

Hacking Wi-Fi is not a trivial process, but it does not take too long to learn. If you want to learn WiFi Hacking and Penetration testing, you are at right place.

Don’t associate hacking as a negative, as you can learn some hacking skills yourself to … Continue reading THN Deal — Learn Wi-Fi Hacking & Penetration Testing [Online Course: 83% OFF]

Infernal Twin Updated 2.6.11 – Automated Wireless Hacking Suite

Infernal Twin is an automated wireless hacking suite written in Python which automates many of the repetitive tasks involved in security testing for wifi networks. Originally created to automate the Evil Twin attack, it has grown much beyond that into … Continue reading Infernal Twin Updated 2.6.11 – Automated Wireless Hacking Suite

MANA Toolkit – Rogue Access Point (evilAP) And MiTM Attack Tool

MANA Toolkit is a set of tools for rogue access point (evilAP) attacks and wireless MiTM. More specifically, it contains the improvements to KARMA attacks implemented into hostapd, as well as some useful configs for conducting MitM once you’ve managed to get a victim to connect. Contents MANA Toolkit contains: kali/ubuntu-install.sh – simple…

Read the full post at darknet.org.uk

Continue reading MANA Toolkit – Rogue Access Point (evilAP) And MiTM Attack Tool