How to Hack Anyone's Wi-Fi Password Using a Birthday Card, Part 2 (Executing the Attack)
In the previous article, we learned how to set up our VPS, configure our PHP server, and developed an in-depth understanding of how the payload works. With all that taken care of, we can get into disguising our payload to appear as an image and crafting the note in the greeting card being delivered to our intended target. To elaborate slightly, we'll convert the "Stage 1" payload we learned about last time into an executable and modify its icon to make it appear to be a normal JPG image. With that out of way, the only thing left to do is put an enticing note in the greeting card and send it... more
from WonderHowTo http://ift.tt/2oCEnYP
via IFTTT