> Welcome to the Chr0nicHacker Terminal
Curated, ethics-first labs for Wi-Fi, BLE, captive portals, payload practice, password lists, and network mapping.
> Wi-Fi Hacking Lab
Capture WPA2 handshakes in a controlled lab, study deauth mechanics, and analyze frames with tools such as airodump-ng and aireplay-ng.
- ๐ก ESP32 used as a lab deauth device
- ๐ง Understanding handshake structure & defenses
- ๐ฅ Caution: Educational use only
> Bluetooth Spoofing Toolkit
Experiment with BLE beacon simulation, scanning, and device emulation in a safe environment using ESP32 BLE libraries.
- ๐งฟ BLE advertising & randomized addresses
- ๐ฑ Accessory emulation concepts
- โ ๏ธ Think ethical, act responsible
> Captive Portal Trap
Simulate an open Wi-Fi with a demo portal to demonstrate risks and teach mitigations like HSTS, VPN, and trusted network controls.
- ๐ ESP32 AP mode & portal flow
- ๐ณ๏ธ DNS redirection concepts
- ๐ก๏ธ Mitigations & user education
> Payloads & Recon Tools
Build a safe lab for testing USB keystroke devices, small-scope subnet discovery, and post-exploration artifacts โ with strict authorization.
- ๐งจ Custom BadUSB lab payloads
- ๐ Subnet scanning patterns
- ๐ฆ Post-exploration triage
> Password List Mastery
Learn how to responsibly craft and tune wordlists for red-team exercises and defensive testing using awk, sort, and audit tools.
- ๐ง Focused list creation
- ๐งช Mutations & masks (concepts)
- ๐ฃ Hashcat/Medusa basics (lab only)
> Network Enumeration Like a Boss
Map your own network with nmap, local ARP discovery, and service fingerprinting to baseline and harden your environment.
- ๐ Subnet discovery & inventory
- ๐ฏ Rogue device detection
- ๐ก๏ธ Defensible configurations
> Hidden Networks and Evil Twin Attacks
Unmask hidden SSIDs and study Evil Twin behavior in a lab to build better defenses: MAC randomization, network whitelists, and user prompts.
- ๐ญ Fake AP simulations
- ๐ก Karma-style behavior overview
- ๐ก๏ธ Protection strategies