p o c k e t n o t e s

~online notebook~

This blog post is continuation from Part01

Read more...

A list of windows commands,

Read more...

By default wireshark display's standard view. This default view is useful but is of little help for wireless analysis.

In wireless packet capture,

Read more...

What if, we can name source and destination mac addresses wireshark!. Aliases are a boon while analysing wireshark packet captures.

Read more...

In general 4-way handshake process happens as described earlier. Keys are generated on either sides(client and AP) both parties confirm on keys.Then keys are used for encryption.

But

Read more...

Understanding WPA2 handshake is important to know KRACK attack. Part-1 of this blog post will be about basics required to understand KRACK.

WPA2 uses 4 way handshake process to generate required unique keys

Read more...

WPA Handshake on 5GHz using Wifi Pineapple tetra In this blog post wifi-pineapple will be used to capture WPA2 handshake on 5GHz access point. Atheros based chipset is used in Wifi pineapple

Read more...

Screen is a terminal multiplexer used to create multiple pseudoterminals. Here are some frequently used commands,

Read more...

Tshark is a command line tool used as network protocol analyzer. This tool can be used to capture network traffic, or read an existing pcap file.

Read more...

Here is how we can combinine two variables into hashtable,

Read more...

Enter your email to subscribe to updates.