Author: Tech Buzz Insider

Facebook Twitter Youtube Securing Wireless Networks: Understanding and Mitigating Encryption VulnerabilitiesWe know how to test the security of all known wireless encryptions (WEP/WPA/WPA2), it is relatively easy to secure our networks against these attacks as we know all the weaknesses that can be used by hackers to crack these encryptions.Exploring Encryption Methods1. WEP EncryptionWEP is an old encryption, and it’s really weak. Several methods can be used to crack this encryption regardless of the strength of the password and even if there is nobody connected to the network. These attacks are possible because of the way WEP works. We discussed…

Read More

Facebook Twitter Youtube Exploring ARP Spoofing and Bettercap for Network Interception Previously, we learned what ARP spoofing is and how to use it to intercept connections in our network using a tool called ARP Spoof. I covered this tool because it is simple, reliable, and available for a number of operating systems. Consequently, learning how to use this tool can be useful in so many scenarios. However, in this lecture, and in the next lectures, we’re going to be using a tool called Bettercap. Bettercap can be used to do exactly what we did with ARP Spoof. So we…

Read More