WIFI Hacking Tutorial: Using Aircrack, DeAuth and Wordlists to hack WIFI networks

Our tutorial today will be about WIFI hacking using the DeAuth attack, most useful for hacking WPA/WPA2 networks. It works by aquiring a handshake and decrypting it using a wordlist.
The system used in the tutorial is Kali linux, but it will work for any .deb based system (Debian, Mint, Ubuntu, etc.) and the technique will not be much different for other distributions either.

1: The tutorial is pretty straightforward, and starts out by putting your network adapter in monitor mode using AIRMON-NG.

2: Next we use AIRODUMP-NG to monitor and receive packets. Your network adapter then receives beacons. This means you get a clear view of all the different WIFI networks around you. After this you select the correct BSSID from the list, and the correct channel.

3: Using AIREPLAY-NG and filling in the correct BSSID and channel, we launch a DeAuth attack using a simple command. Then we wait until a so called “handshake” is received.

4: Close all the processes and start cracking the .cap (capture) file. This will be done using a wordlist. The program used for this is AIRCRACK-NG. Any wordlist saved as a .txt file will do. The bigger the wordlist, the more chance you have of cracking it.

Extra: A good wordlist to use is called the RockYou wordlist, wich is available for download here.

Below is a full tutorial video showing you the exact codes and steps in detail, so you will never make a mistake when you carry out your attack!

With credits to Razzor Sharp for his amazing video!

SQL injection tutorial – A step by step guide (4 parts)

Are you interested in learning about hacking? Perhaps you imagined hacking a website and uploading your own custom message to it? Today we want to introduce you to SQL injection. The guide below comes in 4 parts and takes you from beginner to advanced in less than an hour. The final part is about uploading a shell as an image.

Remember, these tutorials are for educational purposes only.

SQL injection tutorial – A step by step guide – Part 1:

SQL injection tutorial – A step by step guide – Part 2:

SQL injection tutorial – A step by step guide – Part 3:

SQL injection tutorial – A step by step guide – Part 4: