Using the information that I obtained during Recon, I am now going to grep pieces of information through a collection of breached databases that I have. This is my collection. Any hits will be very beneficial. Breached data contains PPI and confidential information. Email/Password combos, SSN, Addresses, Full Names, Phone Numbers, Etc.. This information can […]
Bug Hunting Pt.1
I am participating in the above vulnerability disclosure program for the Defense Industrial Base. The Defense Industrial Base Vulnerability Disclosure Program (DIB-VDP) Pilot is a 12-month voluntary event established collaboratively by DC3’s DoD Defense Industrial Base Collaborative Information Sharing Environment (DCISE), DoD Vulnerability Disclosure Program (DoD VDP), and the Defense Counterintelligence and Security Agency (DCSA). […]
Homemade WiFi Deauther
What is a deauther? A deauther is a tool that executes a type of denial of service attack on any given WiFi network. The attack is called a deauthentication attack. Deauthentication attacks work by sending packets that tell the receiver they are disconnected. Similar to “jamming” but instead of attacking a frequency or frequency range, […]