Posts

Showing posts from May, 2026

Javascript

  //single line comment /* multi line comment*/ // let, const //string, numbers, boolean, null, undefined const name = 'hemanth'; const age = 28; const rating = 4.5; const isCool = true; const x = null; const y = undefined; let z; console.log(typeof name); //strings const name = 'hemanth'; const age = 28; //concatination console.log('my name is '+name+  ' and I am '+ age); //template string console.log(`my name is ${name} and I am ${age}`); const hello = `my name is ${name} and I am ${age}`; console.log(hello); //string functions const s ='hello world'; console.log(s.length); console.log(s.toUpperCase()); console.log(s.toLowerCase()); console.log(s.substring(0, 5)); console.log(s.substring(0,5).toUpperCase()); console.log(s.split('')); const t = 'technology, computers, it, code'; console.log(t.split(', ')); //arrays /* array using constructor, new keyword and  something after that means it is called constructor */ const nu...

wireless pentesting full process with example

Wireless penetration testing using Kali Linux is a systematic process that moves from passive observation to active exploitation. Kali is the industry-standard OS for this because it comes pre-loaded with the Aircrack-ng suite , Reaver , and Hashcat . 1. Preparation: Enabling Monitor Mode By default, wireless cards are in "Managed" mode (connecting to one AP). To pentest, you must switch to Monitor Mode to see all traffic in the air. Check Hardware: airmon-ng Enable Monitor Mode: airmon-ng start wlan0 This creates a virtual interface, usually named wlan0mon . 2. Reconnaissance (Sniffing the Air) You need to identify the target BSSID (MAC address) and the Channel (CH) it’s operating on. Command: airodump-ng wlan0mon Observation: Look for the target network's ESSID and take note of the BSSID and Channel. Also, ensure there is at least one active client (Station) connected; otherwise, you can't capture a handshake. 3. Targeted Capture Now, focus your "sniffer...