
Wi-fi Hacking
Understanding and securing Wi-Fi networks has become a crucial aspect of cybersecurity. Whether you are an aspiring ethical hacker, a network administrator, or a tech enthusiast, gaining a solid foundation in Wi-Fi penetration testing is essential for safeguarding your digital environment.

Wi-fi Hacking Medium Level -
EVIL TWIN ATTACKS
Module 1 - WPS Reconnaissance

In order to analyze a target network, we need to view its WPS information.
Scanning WPS Networks with Airodump-ng
Scanning WPS Networks with Wash
Module 2 - Online PIN Brute-Forcing Using Reaver

Reaver is an excellent tool for conducting online password cracking attempts.
Brute-forcing WPS PIN
Bruteforcing using half known WPS PIN
Testing for Null PIN
Retrieving WPA-PSK using Reaver with a Known PIN
Module 3 - Secured Access Points

Traditionally, online brute-forcing attempts have been utilized in retrieving the WPS PIN and WPA-PSK. However, in recent years, manufacturers have become wiser to these attacks. As such, locking has been utilized to prevent these traditional bruteforcing techniques. The most recent vendors only allow up to 3 incorrect attempts. After each incorrect attempt, the AP will lock for 60 seconds. After 10 incorrect attempts, the AP will lock for 365 days.
Module 4 - Using Multiple Pre-defined PINs

While it is possible to bruteforce the WPS PIN using Reaver, we can also use a custom wordlist of potential PINs.
Using Python WPSPin to Generate Default PINs
Performing Vendor Lookup
Module 5 - PIN Generation Tools

When crafting an online brute-forcing attempt, it can be cumbersome to guess all 11,000 possible PINs especially considering most access points are utilizing default PINs.
Using the Vodafone EasyBox Default WPS Pin Algorithm
Using WPS-PIN to Generate Default PIN
Using Naranja MekaniK (nmk) to generate WPS PIN
Module 6 - Pixie Dust Attack

The Pixie Dust Attack is a well-known method for exploiting vulnerabilities in the WPS (Wi-Fi Protected Setup) protocol, used to retrieve the WPA/WPA2 pre-shared key (PSK) from a target wireless network.
Using Reaver
Using Oneshot
Module 7 - Push Button Configuration

Push Button Configuration (PBC) is a simple and user-friendly method for connecting devices to a wireless network using Wi-Fi Protected Setup (WPS).
Enumeration
Using wpa_cli
Using Oneshot
Legal Disclaimer

Disclaimer
All the techniques provided in the tutorials on www.lyonnfiurex.com are solely for educational purposes. All techniques taught here are only meant to be used in a closed laboratory environment or with consent from a second or third party. If you are using any of those techniques for illegal purposes, Lyon & Fiurex LLC Group can’t be held responsible for possible lawful consequences.
Any actions or activities related to the material within www.lyonnfiurex.com are solely your responsibility. If you misuse this information for illegal activities, criminal charges may be brought against your person.
The content on www.lyonnfiurex.com can be potentially damaging and or dangerous if misused. DO NOT, NEVER try any of the techniques you learned on www.lyonnfiurex.com without consent of the second/third party.
Lyon & Fiurex LLC Group is not accountable for the use of the information provided in our courses, which are solely for educational purposes.
Next level...