Skip to main content

Posts

Showing posts from March, 2014

Wireless Hacking - Part7

WIFI HACKING WIFI hacking, it's always been a hot topic for hackers (security testers) and techie guys. So let's start gaining a little knowledge about it. What is WI-FI? Wi-Fi or WiFi is a technology for wireless local area networking with devices based on the IEEE 802.11 standards.802.11 is the "radio frequency" needed to transmit Wi-Fi, it was defined by Vic Hayes who created the IEEE 802.11 committee. Wi-Fi is a trademark of the Wi-Fi Alliance, which restricts the use of the term Wi-Fi Certified to products that successfully complete interoperability certification testing. Devices that can use Wi-Fi technology include personal computers, video-game consoles, smart phones, digital cameras, tablet computers, digital audio players and modern printers. Wi-Fi compatible devices can connect to the Internet via a WLAN network and a wireless access point. What is WIFI-Hacking? Cracking of wireless networks is the defeating of security devices in wireless local

Wireless Hacking - Part6

NEW HACKING ERA: WIRELESS HACKING BY DRONES Drone Hack (Defensive) The global market for commercial drones is projected to reach US$1.8 billion by 2020, driven by the expanding use of unmanned aerial vehicles (UAVs) in executing high-risk tasks and the growing prominence of drones-as-a-service (DaaS). Growing demand for superior aerial imagery, remote sensing, air surveillance, development of advanced sensors, improvements on computing speed, and enhanced data processing capabilities, are driving the use of UAVs in commercial applications. Technology maturity and falling prices of these systems are expanding market opportunities into a wide range of commercial applications like:     ● Precision agriculture     ● Construction and Inspection     ● Public safety and FRO (First Responder Operations)     ● Mapping and Surveying This is a guide on defense, specifically the Parrot Bebop Drone – once pulled out of the box, it has no encryption or authentication methods, thus it leav