Skip to main content
Completion requirements

Definitions and Descriptions.

Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL



WiFiPumkin3 is a piece of open source software that is used to create fake WiFi access points, also known as "evil twins". An evil twin is a WiFi access point that is designed to mimic a legitimate access point in order to trick users into connecting to it.

Once a user connects to an evil twin, the attacker can then intercept and monitor their internet activity. This can be used for a variety of purposes, including stealing personal information, spreading malware, or launching man-in-the-middle attacks.

WiFiPumkin3 is a tool that allows attackers to easily create and configure evil twin access points. It includes a number of features, such as the ability to spoof the MAC address of the access point, redirect traffic to a specific website, and perform man-in-the-middle attacks.

One example of how WiFiPumkin3 could be used is in a public place, such as a coffee shop or airport. An attacker could set up an evil twin access point with a similar name to the legitimate access point, such as "CoffeeShop WiFi". When users connect to the evil twin, the attacker can intercept and monitor their internet activity.

Another example is in a corporate environment, where an attacker could set up an evil twin access point in order to gain access to sensitive information or plant malware on company devices.

Overall, WiFiPumkin3 is a powerful tool that can be used by attackers to create fake WiFi access points and intercept internet activity. It is important for individuals and organizations to be aware of the risks posed by evil twins and take steps to protect themselves. This can include using a VPN or only connecting to trusted WiFi networks.


A forensic bridge, also known as a write blocker, is a device that is used in digital forensics to prevent any changes from being made to a storage device, such as a hard drive or USB drive, during the forensic imaging process. Write blockers are used in order to preserve the original evidence in its original state and prevent any contamination of the evidence.

There are two main types of forensic bridges: hardware-based and software-based. Hardware-based forensic bridges are physical devices that are connected between the storage device and the forensic analysis computer. They use hardware-level controls to prevent any changes from being made to the storage device.

Software-based forensic bridges, on the other hand, are programs that are installed on the forensic analysis computer and control access to the storage device. These programs can be used in conjunction with hardware-based forensic bridges to provide an additional layer of protection.

Both hardware-based and software-based forensic bridges work by allowing the forensic analyst to read data from the storage device, but preventing any changes from being made. This is useful in cases where the storage device may contain evidence that could be altered or deleted if access is not properly controlled.

For example, a forensic bridge might be used in the investigation of a cybercrime in order to preserve the contents of a suspect's computer for analysis. By using a forensic bridge, the analyst can ensure that the original evidence is not tampered with and that the integrity of the investigation is maintained.

Overall, forensic bridges are an important tool in digital forensics, as they allow analysts to preserve the original evidence and conduct a thorough analysis without the risk of contamination or alteration.

loader image