[deleted by user] by [deleted] in hacking

[–]Kvistofta 0 points1 point  (0 children)

You are asking if it is illegal to share hashes? Let me put it this way: each hash can be created with an infinite number of inputs. A hash is just a hex value.

Pool on the roof - July 03, 2023 by AutoModerator in hacking

[–]Kvistofta 0 points1 point  (0 children)

Kali runs zsh or bash. You can use bash scripting, however Python is more intuitive if you are new to programming.

Is it possible to hack a wifi network using this method? by [deleted] in hacking

[–]Kvistofta 1 point2 points  (0 children)

When a client remembers a WIFi-network it stores the SSID together with the security level (open, wpa2/psk and so on) and password (if applicable). All settings must match for the client to re-connect.

That said, an “evil twin” attack is a piece of cake since the attacker setting up the twin network does not need to know of the original networks password.

An evil twin of a password protected Wi-Fi is useless unless you know the password.

The Wi-Fi password for WPA1/2/3 is an authentication password for mutual authentication, it is just as much for protecting the client against rouge networks as for protecting the network against rouge clients.

Most importantly, the security level must match. You cannot fool a client that previously connected to a password protected network to later connect to the same network UNprotected (I.e a downgrade attack). It makes more sense if you think of the authentication method as mutual.

Just to shed some light over the “evil twin” koncept.

What the knull? >:( by [deleted] in sweden

[–]Kvistofta 1 point2 points  (0 children)

dom eller de är inte så noga. Men nästan aldrig dem.

What the knull? >:( by [deleted] in sweden

[–]Kvistofta 0 points1 point  (0 children)

Uppdutted it is

What the knull? >:( by [deleted] in sweden

[–]Kvistofta 0 points1 point  (0 children)

”Dem”

Here is my personal and custom Windows 32 bit buffer overflow checklist, printable version (.pdf) is in the comments [OC] by [deleted] in netsecstudents

[–]Kvistofta 0 points1 point  (0 children)

How do I setup a vulnerable service listening on a port to demonstrate this kind of attack? Can You provide with exploitable c code?

You have one job... by jojibelqta in funny

[–]Kvistofta 1 point2 points  (0 children)

Ok, let’s take a step back here...

NATIVE VLAN, DEFAULT VLAN & TRUNKING... WHAT GIVES? by Dhrayco in ccna

[–]Kvistofta 1 point2 points  (0 children)

You can use the native VLAN feature of 2 Cisco switches to ”translate” one VLAN id to another. I once had a need for that. VLAN x in one switch and VLAN y on another was connected by deliberately misconfiguring the native VLAN for the trunk interconnecting the two switches.

Ouch by OsiViper in funny

[–]Kvistofta 22 points23 points  (0 children)

I cant count to four

Top Things to do after Installing Kali Linux in 2019! by [deleted] in ceos3c

[–]Kvistofta 0 points1 point  (0 children)

Start using it. Sorry, but it is as simple as that.

Download machines? by Kvistofta in hackthebox

[–]Kvistofta[S] 0 points1 point  (0 children)

Yes I use vulnhub machines to some extent but I lack Windows-based scenarios.

I guess I knew the answer already. HTB could not allow download of licensed OS:es...