Networking
Welcome to our “Networking” section, a space dedicated to unraveling the secrets and challenges of cybersecurity in the field of networks and communications. Here, we invite you to delve into a fascinating world of knowledge, from attacks with devices like the WiFi Pineapple to essential concepts like network segmentation or the use of tools like HackRF One.
..,.oooE777999V(;
...oooP779090(;'' '''' I
...ooB777979V;;'' .....=v}}=}=}=}}v== 5
97?(;'' .........< . . .:.:.:.:.`:;``;;;;;;;;<;;;<;<<<<<<<<<<
b ; . : .:.:.:.`;;;;;;;;;;;<;;<;<<<<<<<<, I
`,` . : :.:.:.:.`.`;;;;;;;;;;;;<;<;<<. 5
b ; . : .:.:.:.`;;;;;;;;;;;<;<;<: E
`,< . . .:.:.:.``;;;;;;;;;;. I
b : . . :.:.:.:.:.:.;;;. 5
`>; . .:..:.:.:.`.: |
b : . . :.:.:.x T
`,; . . .:: E
b : _ !4
`r : __.__,--,;'))))).
b : ___...--'; `))))))))' '' `>!9eOc
`r : __,--:-;;;)))))))))))'' '' ' ' _. -'-'.`!9Eg.
L : . __.--_--:,)))))))))))'' ' ' _. ._.-'-'-'-'\-'\---\/\ ``Qu.
`,: !x;:)))))))) ')'' ' _ _._-.'\'\_\_-'\''-\'_'\-'\'\ -_\'-\-. 95n.
D` ))))''' _ .___.-_:/-/\/-_\ /-_, /-,\ \-/_\/\,-\_/-\/-/--' ..v<]9o.
__b :<> -_\._/\,- ,_ -\ _/\-\ _-\ -_/-\,\/,-/\_/-_\'\--' .vvvvvvv}v}}x}]NEo.
.ooPO%LOCu `< `/\_ -:\/_/-/,\/,/-,/_,-/\ :_\:_-:__-'' ...vvvvvvvvvvvvxx}vx}}}}==No
.oPO' `y. `< ~-\ _\/\_,- \ , - ,___..--' .......>>vvvvvvvvx>vvvvvvvvvv)v~~~`
.@tTL' `y, `< .-vvv<<<<<<<<vvvvv=>~~~~` _uuua'''
.&P' `L, `>>><<<<><>v~>^` ` _uuug'
`L, ~~` _uuua''
`L,: _uuua'' iuuuaE'
Unauthenticated access to ADB Daemon
Risks of ADB Port Exposure on Android Devices Keep reading Unauthenticated access to ADB Daemon
Subnetting
Learn how subnetting works Keep reading Subnetting
Evil-Twin and Evil-Portal Attack
Capturing credentials via an Evil Portal attack using a Pineapple WiFi Keep reading Evil-Twin and Evil-Portal Attack