We have updated our tutorial on how to crack WPA / WPA2 with even more powerful and easier to use passphrase recovery tools.
We've also added tips for creating easy-to-remember but essentially uncrackable passphrases.
Wireless networks secured by WPA / WPA2 can be cracked. But it's not as easy as cracking WEP.
WEP Cracking has gotten much easier in the two years since our original tutorial. You only need one computer, one wireless adapter and one tool suite.
With some fairly simple hacking, Jim Buzbee turns the Apple TV into the best media player he's seen yet.
Humphrey Cheung turns the tables in his final installment of the WEP Crack series. Part III describes an approach to wireless security that matches defensive measures against the level of expected threat.
Jim Buzbee is back with his latest adventures in hacking Linksys' NSLU2. This time, he turns it into a UPnP-based media server - just the ticket if you'd like to free your PC from streaming media duties.
In Part 2 of this series, Humphrey Cheung shows how to use the tools configured in Part 1 to capture data and perform a WEP key recovery.
It's common knowledge that WEP can be "easily" cracked. But did you ever wonder how easy it is? In Part 1 of a two-part series, Humphrey Cheung takes you step-by-step through putting together a WEP-cracking setup and using Kismet to find vulnerable wireless LANs.
In Part 5 of his Hacking the Linksys NSLU2 series, Jim Buzbee introduces us to the Unslung firmware that is the next step in the evolution of this little box into a general-purpose Open Source application platform.
Part 4 of Jim Buzbee's series shows how to modify the NSLU2's flash so that you can automate the startup of the other hacks and open the door to even more customizations.