<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>MDK4 on Chief Dennis' Blog</title><link>https://chiefdennis.github.io/tags/mdk4/</link><description>Recent content in MDK4 on Chief Dennis' Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Thu, 15 May 2025 15:43:16 +0100</lastBuildDate><atom:link href="https://chiefdennis.github.io/tags/mdk4/index.xml" rel="self" type="application/rss+xml"/><item><title>WifiChallenge Lab CTF</title><link>https://chiefdennis.github.io/projects/wifi_challenge_lab/</link><pubDate>Thu, 15 May 2025 15:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/wifi_challenge_lab/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/projects/wifi_challenge_lab/image1.png" alt="">&lt;/p>
&lt;h2 id="introduction">
 Introduction
 &lt;a class="heading-link" href="#introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>This write-up summarizes the completion of the WiFiChallenge Lab, a practical cybersecurity exercise focused on wireless network security. Throughout the lab, various Wi-Fi attack techniques were explored and executed, including packet capture, handshake extraction, password cracking, and exploiting common vulnerabilities in WEP and WPA/WPA2 networks. The objective was to simulate real-world scenarios, enhance practical skills in wireless penetration testing, and deepen understanding of Wi-Fi security protocols and their weaknesses. This walkthrough outlines the methodology, tools used, challenges encountered, and key takeaways from the experience.&lt;/p></description></item></channel></rss>