Will installing a kernel mode driver onto a PC compromise the entire network it’s connected to?

At home, my personal PC and work computers all connect to the same network, via ethernet and WiFi.
A video game on my personal PC is requiring an install of a "kernel mode driver." At the risk of asking the obvious,

Can this com… Continue reading Will installing a kernel mode driver onto a PC compromise the entire network it’s connected to?

Why am I having trouble capturing and transmitting ARP packets to increase data in a WPA2 network injection attack?

I’m trying to inject packets into my own WPA2 network and rapidly increase the data packets. I’ve followed these steps:
Connected my wireless adapter to my Kali Linux machine.
Put my wireless adapter into monitor mode using these commands:… Continue reading Why am I having trouble capturing and transmitting ARP packets to increase data in a WPA2 network injection attack?

For my home wifi, why sometimes, DHCP IP didn’t arranged by connected device and sometimes, some IP is skipped? [closed]

For my home wifi router,
I set Whitelist Mac filtering and set DHCP IP ranges from xx.xx.xx.33 to xx.xx.xx.40.
I turn off router every night and turn on again in the morning.
When I turn on home wifi router, 1st connected device mostly get… Continue reading For my home wifi, why sometimes, DHCP IP didn’t arranged by connected device and sometimes, some IP is skipped? [closed]

How does a password prevent an evil twin if the password is publicly known?

This discussion of WPA3 OWE seems to imply that WiFi at Starbucks/the airport/whatever can be secured against an evil twin attack if they use WPA3-Personal instead of OWE. But it seems like that wouldn’t actually do anything.
If I’m at som… Continue reading How does a password prevent an evil twin if the password is publicly known?

What kinds of attacks are eliminated in WPA2-PSK if for each device there’s a different (secret) PSK?

With regular WPA2-PSK there’s the fact that every device shares the same PSK, hence it’s possible to impersonate the AP by setting up an Evil Twin and watching the traffic. This isn’t possible without knowing the PSK, so for a setup where … Continue reading What kinds of attacks are eliminated in WPA2-PSK if for each device there’s a different (secret) PSK?

Why isn’t airolib-ng generating PMKs from the database after importing a password list and ESSID?

I have been trying to create PMKs using airolib-ng with a password list generated by crunch and an ESSID text file. Here’s the process I followed:

Created a password list file using crunch and saved it as pass_list.txt.
Created a database… Continue reading Why isn’t airolib-ng generating PMKs from the database after importing a password list and ESSID?