Saturday, September 26, 2020

How to hack WiFi password using Fern WiFi Cracker

 We can find wireless networks everywhere, and they are accessible by everyone within the transmission range of the router. But most of the time a password is required to be able to connect with the network. But all the networks are vulnerable to many attacks. There is a number of ways to hack a wireless network, the standard way is to capture a handshake and then brute-force the password.



In this tutorial, you are going to learn the quickest method of How to Hack / Crack WiFi Password. We are going to use the Fern WiFi Cracker tool in this tutorial. Click here for more info:- https://techohalic.com/how-to-hack-wifi-password/

Thursday, September 24, 2020

Best USB WIFI adapter used for hacking

 USB WIFI adapters used for hacking :- A lot of people usually get confused when it is about wireless adapter and wireless cards. They don’t know what they are, why do they need them and how to select the right wireless adapter or wireless card, because there a number of brands and a number of models available in the market. In this article, I will try to clear that confusion.



What is a wireless adapter?

Wireless adapter is a device that you can connect with your computer via USB port, which further allow you to connect other WIFI devices or network. So, you can connect to WIFI and can communicate with other computers or devices that are connected to that same WIFI network. Most of the laptops and mobile phones have a built-in wireless adapter. But the main problem with that built-in wireless adapter in laptop is that, if you have Kali Linux installed as virtual machine, then you will be unable to access that built-in wireless adapter in it. You will need a USB wireless adapter for the purpose. And the second is that, most of these built-in wireless cards are not good for hacking because most of them do not support monitor mode or packet injection. So, if you installed Kali Linux as main operating system on your machine, then also you will not able to use that built-in wireless card for hacking. for more visit :- https://techohalic.com/best-usb-wifi-adapters-used-for-hacking/

Saturday, September 19, 2020

How to change MAC address

 When it comes to networking, then most of us probably heard of MAC addresses. This article is all about, what is the MAC address? What it is used for? How to change the MAC address?


What is the MAC address?

MAC address is stands for Media Access Control address. It is a unique, physical, and permanent address that is assigned to network interface devices by their manufacturers. So, whether it is your wireless card or ethernet card, each one of these comes with a permanent, physical and unique address, known as Mac address. So, there are no two devices in the world with the same MAC address. This address will always remain the same for a specific device, even after you unplug it from your computer and plug it into another computer, it will never change.



Benefits of changing a MAC address

  1. Increase anonymity

  2. Impersonate other devices

  3. Bypass filter

Click here to learn about How to change the MAC address in Kali Linux https://techohalic.com/how-to-change-mac-address/

Sunday, September 13, 2020

How to Protect Yourself Online from Hackers

 In the present day we provide, almost all our data online, so it is important to take some safety measures that'll help you to Protect Yourself Online from Hackers. Here are a few tips that might help you to do so.



Use 2 Factor Authentication

You should use 2-factor Authentication because 2-factor authentication adds an extra layer of security to your account. If you have 2-factor authentication turned on in your account then you not only need the username & password but also the code (OTP), that will be sent by the site to your registered mobile number. So even if the hacker manages to get your password, he will not be able to gain access to your account because the site will only text the code to the registered mobile number (your number). Although this 2 Factor Authentication can also be bypassed!

https://techohalic.com/how-to-protect-yourself-online-from-hackers/


Sunday, September 6, 2020

Top 5 hacking apps for pc

Top 5 hacking apps for pc

Here is the list of top 5 hacking tools that are used by Hackers. but before that have a look at what is Hacking.

Hacking is an endeavor to misuse a computer system or a private network. Basically, it is the unapproved access to or commands over computers or computer networks for some unlawful reasons. Hacking is to gain access to an unauthorized system.

for example, login into an unauthorized email account is also an act of hacking that account.



Gaining access to an unauthorized remote computer is hacking that computer.

There are a large number of ways to hack into a system and the word hacking can refer to a number of things but the main concept is the same. To know more visit our blog now.

These tools are available for all major operating systems like Windows, Mac Os, and Linux.

https://techohalic.com/top-5-hacking-tools/