2016.0303.NO.WIRES.REQUIRED
2016.0303 It's time to brush-up on your WLAN basics. It's always a good idea to refresh with foundations on how things work. For the past few weeks, most of the hackvault's updates touched on some...
View ArticlePHV Equipment Check for DEFCON 24 [revised 201:10:40]
08/10/2016 UPDATE: This postalso appeared in the Wall of Sheep blog ->>CLICK HEREThey say not to bring any electronic devices at DEFCON!? .... what's the fun in that? Well, your mother also said...
View ArticleAircrack Basics for Wi-Fi Sheep Hunters
AIRCRACK BASICSBy: @donds https://hackvault.blogspot.comThe instructions below are strictly for research and educational purposes only. Please setup a test lab, it is illegal to hack an AP without...
View ArticleDEFCON 24: Wi-Fi Sheep Hunt Contest Brief
WI-FI SHEEP HUNT 2016Wall of Sheep (WOS)Packet Hacking Village (PHV)MISSION BRIEF:WELCOME to WI-FI SHEEP HUNT 2016. Your mission, if you choose to accept it, is to hunt and herd our lost SHEEPS. Clues...
View ArticleDEFCON 24: The Bender Badge
The Bender Badge, in my humble opinion, was the most sought after electronic badge of DEFCON 24. No it is not the official DEFCON 24 Badge, but the most excellent creation of AND!XOR. If you are on...
View ArticleMis-Behaving MagSafe Won’t Charge my MacBook!!
The old MacBook Pro I use is my goto laptop. It is old, but super reliable. It is a late-2011 MAcBook Pro, has a 3.5” 750GB drive, and a DVD R/W disk drive… yes, you can still actually watch old DVDs...
View ArticleDEFCON 25: Ides of Defcon Badge
Unlock Codes?! Yes please! Let the games begin... details to follow after the con....
View ArticleDEFCON 25: SHEEP HUNT 2017
SHEEP HUNT 2017The Wall of Sheep (WOS)Packet Hacking Village (PHV)It is time to scour the DEF CON airwaves for lost SHEEPS. Collect clues by playing and solving the different Sheep Hunt challenges....
View ArticleNetwork Probe with a Raspberry Pi
From Cloudshark's - Building a network capture probe with Raspberry PiPublished: 2016.0331Here are the basics - Install dumpcap on your Raspberry Pi (it comes as part of the tshark package): sudo...
View ArticleSome Defense Against the Dark Arts.
2018.0406 Note: This post has been sitting in my draft files for a long while. It's old but it should still be pretty significant today. ===============If you have ever visited the Wall of Sheep...
View ArticleDEFCON 25: Aircrack Basics
NOTE: Theinstructionsbelowarefor concept learningandeducationpurposesonly.Itisillegaltohackan access point without the owner’sconsent.PHASE1 – Monitor ModeOPENATERMINALWINDOW(Terminal1)1. To setyour...
View ArticleWIFISH 2016 - No Hacking Required.
There I said it. There was no hacking required. Just plain old smarts and creativity were all you needed to get through all 3 challenges, ultimately finding and 0wning all the WiFi Sheep Hunt Access...
View ArticleHacker Summer Camp Check List - 2018
UPDATED: 2018.0731Every year I go through an exercise of sorting through all my gear to figure out which ones I will bring to hacker summer camp. I always end up bringing more than I need. But just...
View ArticleDEF CON 26: Conference Badge Info and Resource
NOTE: I'm basically dropping links related to the DEF CON 26 badge. Once I get the time to work on the badge, my findings will follow....
View Articlehackvault is back!
It's been a few DEF CONs since I've posted. The years in between have been a whirlwind of activities which included highs and lows. Highs as it opened up hacking event opportunities in Beijing and...
View ArticleKali Desktop Experience for Windows Subsystem for Linux
Win-KeX | Kali Linux DocumentationKex adds the Kali GUI on WSL. Click the link above for instructions on how to intall WSL, Kex and how to run it. The notes below are extra settings provided by...
View ArticlePiping Crunch with Aircrack-ng
Piping Crunch with Aircrack-ng TO get rid of the constantly increasing dictionary files used to retrieve WiFi passwords from cap files. When we pipe the output from Crunch with Aircrack-ng the data...
View ArticlePSRemoting (Run PowerShell Remotely)
Donds how can i activate to run powershell remotelyTo enable PowerShell remoting on a remote computer, you can use the Enable-PSRemoting cmdlet. Here are the steps to follow:Open an elevated...
View ArticleCheck for App Version on Windows
I need a powershell to check for an application versionSure, here's an example PowerShell script that you can use to check the version of an application:bash$applicationName = "Your Application...
View ArticleAircrack | Crunch | Hashcat
Hacking WPA/WPA2 passwords with Aircrack-ng & HashcatLast Updated on April 6, 2022 by Kalitut 1 CommentHacking WPA/WPA2 passwords with Aircrack-ng: dictionary searching, collaboration with...
View ArticleWindows Network - Common Protocols
In a typical Microsoft Windows network environment, you would expect to see a range of protocols that facilitate network communication, resource sharing, authentication, and management. Here are some...
View ArticleWIFI | Aircrack Revisit
Title: Cracking Wireless Networks with Aircrack-ng: A Comprehensive Guide for Network Forensics ExpertsIntroduction:Aircrack-ng is a powerful suite of tools used to assess and exploit wireless network...
View ArticleREGEX - Regular Expressions
What is Regex?Regular expressions (regex) are sequences of characters that form search patterns, primarily used for string matching within texts. Regex is an essential tool in programming, data...
View ArticleHASHCAT and HANDSHAKES
To retrieve the password from the .cap files of access point handshakes using hashcat, you can follow these steps:1. Ensure you have a compatible version of hashcat installed on your system. You can...
View Article