WiNX and Winx portable, two ideal options to hack a WiFi network

WinX

If you are one of those people who like to check the strength of a WiFi network, or in much friendlier terms, perform a wireless audit, you will undoubtedly like to know about the existence of WinX or its portable version baptized with the name of Portable WiNX, two small motherboards equipped with a firmware developed specifically to attack or defend a WiFi network.

As you can see in the image that is located right at the top of this same entry, corresponding to the WiNX board, we are talking about two different projects, although with completely identical functionality, that is, the only thing that really differs from one to the other is that the portable version will allow you to connect an AA battery to power the device although both boards can be powered from a power bank through a USB cable.

Hack any type of WiFi network quickly and easily thanks to WiNX

At this point we will go on to talk about the different firmware that we can install on our board. By default, the WiNX boards will arrive at your home equipped with a system that is only capable of scan WiFi 802.11 b / g / n networks. This software is capable of detecting certain data on a network such as its SSID, BSSID, channel, channel width, RSSI and even the type of encryption it uses.

As an option we have a second firmware where we will be allowed to configure WiNX as a rogue access point. Thanks to this function, we will be able to generate an AP for any user to connect to it so that we can capture all the data, including their user data and password from different websites.

How to Live Aligned with third option We have a firmware capable of capturing all the traffic present in a WiFi network so that later, through the use of specific software, such as Wireshark or Airodump-g, on a second computer, we will be able to study it in all kinds of detail.

Finally highlight a fourth possibility which would allow us to create a fully customized captive portal on this device. The only limitation of this functionality is that we only have a maximum memory size of 150 KB.


Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.