Quantcast
Channel: hackvault
Browsing latest articles
Browse All 45 View Live

2016.0303.NO.WIRES.REQUIRED

2016.0303 It's time to brush-up on your WLAN basics.  It's always a good idea to refresh with foundations on how things work.  For the past few weeks, most of the hackvault's updates touched on some...

View Article


PHV Equipment Check for DEFCON 24 [revised 201:10:40]

08/10/2016 UPDATE: This postalso appeared in the Wall of Sheep blog ->>CLICK HEREThey say not to bring any electronic devices at DEFCON!? .... what's the fun in that? Well, your mother also said...

View Article


Aircrack Basics for Wi-Fi Sheep Hunters

AIRCRACK BASICSBy: @donds https://hackvault.blogspot.comThe instructions below are strictly for research and educational purposes only.  Please setup a test lab, it is illegal to hack an AP without...

View Article

DEFCON 24: Wi-Fi Sheep Hunt Contest Brief

WI-FI SHEEP HUNT 2016Wall of Sheep (WOS)Packet Hacking Village (PHV)MISSION BRIEF:WELCOME to WI-FI SHEEP HUNT 2016. Your mission, if you choose to accept it, is to hunt and herd our lost SHEEPS. Clues...

View Article

Image may be NSFW.
Clik here to view.

Wi-Fi SHEEP HUNT 2016 Official Contest Brief

View Article


DEFCON 24: The Bender Badge

The Bender Badge, in my humble opinion, was the most sought after electronic badge of DEFCON 24. No it is not the official DEFCON 24 Badge, but the most excellent creation of AND!XOR.  If you are on...

View Article

Image may be NSFW.
Clik here to view.

Mis-Behaving MagSafe Won’t Charge my MacBook!!

The old MacBook Pro I use is my goto laptop.  It is old, but super reliable.  It is a late-2011 MAcBook Pro, has a 3.5” 750GB drive, and a DVD R/W disk drive… yes, you can still actually watch old DVDs...

View Article

Image may be NSFW.
Clik here to view.

DEFCON 25: Ides of Defcon Badge

Unlock Codes?! Yes please! Let the games begin... details to follow after the con.... 

View Article


DEFCON 25: SHEEP HUNT 2017

SHEEP HUNT 2017The Wall of Sheep (WOS)Packet Hacking Village (PHV)It is time to scour the DEF CON airwaves for lost SHEEPS. Collect clues by playing and solving the different Sheep Hunt challenges....

View Article


Network Probe with a Raspberry Pi

From Cloudshark's - Building a network capture probe with Raspberry PiPublished: 2016.0331Here are the basics - Install dumpcap on your Raspberry Pi (it comes as part of the tshark package): sudo...

View Article

Image may be NSFW.
Clik here to view.

Some Defense Against the Dark Arts.

2018.0406 Note: This post has been sitting in my draft files for a long while.  It's old but it should still be pretty significant today.  ===============If you have ever visited the Wall of Sheep...

View Article

DEFCON 25: Aircrack Basics

NOTE: Theinstructionsbelowarefor concept learningandeducationpurposesonly.Itisillegaltohackan access point without the owner’sconsent.PHASE1 – Monitor ModeOPENATERMINALWINDOW(Terminal1)1.    To setyour...

View Article

WIFISH 2016 - No Hacking Required.

There I said it. There was no hacking required. Just plain old smarts and creativity were all you needed to get through all 3 challenges, ultimately finding and 0wning all the WiFi Sheep Hunt Access...

View Article


Image may be NSFW.
Clik here to view.

Hacker Summer Camp Check List - 2018

UPDATED: 2018.0731Every year I go through an exercise of sorting through all my gear to figure out which ones I will bring to hacker summer camp.  I always end up bringing more than I need.  But just...

View Article

DEF CON 26: Conference Badge Info and Resource

NOTE: I'm basically dropping links related to the DEF CON 26 badge.  Once I get the time to work on the badge, my findings will follow....

View Article


Image may be NSFW.
Clik here to view.

hackvault is back!

It's been a few DEF CONs since I've posted. The years in between have been a whirlwind of activities which included highs and lows.  Highs as it opened up hacking event opportunities in Beijing and...

View Article

Image may be NSFW.
Clik here to view.

Kali Desktop Experience for Windows Subsystem for Linux

Win-KeX | Kali Linux DocumentationKex adds the Kali GUI on WSL.  Click the link above for instructions on how to intall WSL, Kex and how to run it.  The notes below are extra settings provided by...

View Article


Piping Crunch with Aircrack-ng

 Piping Crunch with Aircrack-ng TO get rid of the constantly increasing dictionary files used to retrieve WiFi passwords from cap files. When we pipe the output from Crunch with Aircrack-ng the data...

View Article

PSRemoting (Run PowerShell Remotely)

 Donds how can i activate to run powershell remotelyTo enable PowerShell remoting on a remote computer, you can use the Enable-PSRemoting cmdlet. Here are the steps to follow:Open an elevated...

View Article

Check for App Version on Windows

 I need a powershell to check for an application versionSure, here's an example PowerShell script that you can use to check the version of an application:bash$applicationName = "Your Application...

View Article

Image may be NSFW.
Clik here to view.

Aircrack | Crunch | Hashcat

 Hacking WPA/WPA2 passwords with Aircrack-ng & HashcatLast Updated on April 6, 2022 by Kalitut 1 CommentHacking WPA/WPA2 passwords with Aircrack-ng: dictionary searching, collaboration with...

View Article


Windows Network - Common Protocols

In a typical Microsoft Windows network environment, you would expect to see a range of protocols that facilitate network communication, resource sharing, authentication, and management. Here are some...

View Article


WIFI | Aircrack Revisit

Title: Cracking Wireless Networks with Aircrack-ng: A Comprehensive Guide for Network Forensics ExpertsIntroduction:Aircrack-ng is a powerful suite of tools used to assess and exploit wireless network...

View Article

REGEX - Regular Expressions

What is Regex?Regular expressions (regex) are sequences of characters that form search patterns, primarily used for string matching within texts. Regex is an essential tool in programming, data...

View Article

HASHCAT and HANDSHAKES

To retrieve the password from the .cap files of access point handshakes using hashcat, you can follow these steps:1. Ensure you have a compatible version of hashcat installed on your system. You can...

View Article

Browsing latest articles
Browse All 45 View Live