This very day is the launch date of our official website. The development stages of our tool have almost ended and our script is exiting the cave of private development. Let the bright sunlight shine upon thy furnished masterpiece collaboratively coded by our team of web developers and security researchers – please give a round of applause to Phyber Security Team!
Yet to be released within a few days is a tool that will allow anyone of any age to hack into any neighboring wifi networks. The tool will not be distributed as a web application. Instead, it is made to run as binary executable because of (1) server load and code tampering (2) easier delivery of updates and bug reporting.
The official launch date is not far from this post’s creation date. It’s expected to be out by as early as tomorrow. We are just preparing this blog to introduce and document about the tool and future new versions. Our source code is open to those qualified to make revisions, please contact me through the contact form if you have an idea in mind!
We will make sure the basic functions will work seamlessly before releasing it. The advanced functions will have an excuse for error because of their apparent complexity but will be available for bug reporting.
In order for the tool to work, the end user must give the script the required permission levels to access the wireless card’s input and output. For the tool to get the permission, it will prompt the user for permission. As soon as it is given permission, the tool will be able to make the appropriate requests for the appropriate commands. For example, as soon as the tool starts, it will make its first GET request for available network SSID’s, signal strength, and encryption types.
When you want to target a particular network, the tool will further analyze the network and perform basic tests to assess its security functions. For example, a typical WEP network will have a long hash code that can be decrypted using a dictionary attack, the time will vary depending on the length and the characters used. When these properties are defined, cracking the hash code will be significantly easier since the attacks can be narrowed down and simplified. The same concept applies to more advanced encryption types such as WPA and WPA2, but with broader properties.
Once the whole process completes, the password should have already been decoded. Finalization will only take 5 seconds, and as soon as this is done, the password will be shown on your screen and you will be able to seamlessly connect to the desired network!
There is absolutely no need to get geeky with the tool and understand every logic of how it works! It’s made to work without needing an end user with technical knowledge! Lose your worries, the tool will be of benefit to anyone!