Weaponizing hostapd-wpe

TL;DR: Installing hostapd-wpe on a wireless router powered by an external power bank provides a standalone wireless attack platform with […]

Evil AP Attacks with Spoofed Certificates

We’ve written in the past about the “Evil twin” or “Evil AP” attack using hostapd-wpe (“wireless pwnage edition”). This remains […]

CTF Example – Wireless Security

Each of SecureState’s previous Capture the Flag events has included a challenge in which participants were tasked with tracking down […]

Approaches for Wireless Man-in-the-Middle

The wireless medium is inherently susceptible to man-in-the middle attacks. Whether the objective of such an attack is to capture […]

Spawning Meterpreter Over Bluetooth

The last post on Shells with Spencer presented code to spawn a shell with a full PTY with a Bluetooth RFCOMM socket for […]

Spawning Shells Over Bluetooth

Lately, unique remote access techniques have become more commonly discussed. Most are payloads that beacon over some protocol using space within […]