Category Archives: Wireless Security

Word List / Dictionaries built into Kali

The word list that are built into Kali are located in the /usr/share/wordlists directory. They are compressed with Gzip.   A popular wordlist in Kali is called “rockyou” here is how to extract it for use.   Open a terminal window.   Change to the directory rockyou is located in.   cd /usr/share/wordlists   Use… Read More »

Cracking a WPA Capture with the GPU using HashCat

  After a WPA/WPA 2 Handshake Capture has been saved to a drive cracking it with current computers can be challenging. To speed this process up the GPU in some video cards can be utilized. This can speed things up drastically when doing a brute force crack on a WPA data capture. You will need… Read More »

What Is a Wireless Network Adapter?

A wireless network adapter allows a computer, laptop, smartphone, or tablet to communicate to a router which then talks to the Internet.   In the past the most common network adapter was Ethernet where a physical cable called CAT5 was run from a router to a computer. This is still a very common setup but… Read More »

Router Channel 14 The Banned Channel

  Each country in the world controls their own wireless spectrum with most following the same frequency standard.   Some countries however add something’s other countries don’t. When this happens manufactures that sell wireless devices like routers build firmware /software that can be changed from one country to the next.   Channel 14 is one… Read More »

Router Channel Width

  Many routers are now coming with the ability to change the channel width and tweak the setting to get better performance.   What is channel width? Channel width can be thought of like a highway. A four lane highway can handle more cars than a two lane. Of course the bigger the highway means… Read More »