Open Wi-Fi Got Encrypted. Here's Why Your Rogue AP Still Works.
So you’re sitting in your local café, laptop open, and you connect to the free Wi-Fi. No password. No fuss. Job done. But underneath that seamless …
// Security Research & Exploit Development
Penetration Testing, Exploit Development & Wireless Security. No filler. No fluff. Just the real work.
So you’re sitting in your local café, laptop open, and you connect to the free Wi-Fi. No password. No fuss. Job done. But underneath that seamless …
One of the most common questions I still receive is: “What WiFi adapter should I use for pentesting?” Over the last 13 years, I’ve tested a …
Hidden SSIDs are one of those security measures that feel effective but provide almost no real protection against a determined attacker. Here’s why — and …
Even the most secure wireless deployments — including EAP-TLS with client certificate validation — can become entry points when endpoints are exploited in less …
We wrapped up Cohort 1 of the WiFi Attacks Specialist course last week and I wanted to take a moment to say thank you to everyone who joined. Twelve …
A lightweight Python wrapper that automates the full PMKID capture-to-crack workflow using hcxdumptool and hashcat. No client required — just the target BSSID, …
Stack-based buffer overflows are the foundational technique of Windows exploit development. If you’ve never written one, this is the right place to start. …
// WiFi Attacks Specialist Course
Live cohort-based training covering everything from 802.11 fundamentals to advanced rogue AP attacks.
View Training