Showing posts with label Kali. Show all posts
Showing posts with label Kali. Show all posts

Monday, June 5, 2017

Crack WPA/WPA2 Wifi Password Without Dictionary/Brute Fore Attack using Fluxion


Fluxion, A Key To Pentesting/Hacking Your WPA/WPA2 Security Without Brute Force


Fluxion script has been available for a while and is most apt for security researchers and pentesters to test their network security by hacking WPA/WPA2 security without brute forcing it. Fluxion is based on another script called linset. Fluxion is not much different from Linset but makes use of certain improvements, bug fixes, and additional features. Fluxion works by using something like a man in the middle attack/ evil twin attack to get WPA password instead of going the bruteforce/dictionary route.

Friday, April 1, 2016

Kali Linux Tutorials: DDOS attack using slowloris


Today in hackerlaxu.blogspot.com I am going to talk about how to use slowloris to perform a ddos attack, for first what is a ddos attack? If you don't know the answer don't panic k4linux have already explained all about Ddos Attack, you just need to read the article about What is a Ddos Attack?

In this tutorial we will use Slowloris.

 What is Slowloris and how to use it on Kali Linux ?

Slowloris is a piece of software written by Robert "RSnake" Hansen which allows a single machine to take down another machine's web server with minimal bandwidth and side effects on unrelated services and ports. To use Slowloris on kali linux you must download the perl script, change its permission, and follow the steps in the video if below.

Monday, March 28, 2016

How To Hack Windows Users with Metasploits ! [GUIDE]






Hacking Windows Users with Metasploit
Hi, welcome to Hacker laxu blog 😀 Do you ever wanted to hack other’s computer in your life? If yes, well i’m here to help you. In this guide we are going to hack any Windows users by using Metasploit frameworks. Before we proceed, please read and understand these first.

Metasploit
A computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.

Exploit
An exploit is the means by which an attacker, or pentester for that matter, takes  advantage of a flaw within a system, an application, or a service. An attacker  uses an exploit to attack a system in a way that results in a particular desired  outcome that the developer never intended. Common exploits include buffer  overflows, web application vulnerabilities (such as SQL injection), and configuration errors.

Payload
A payload is code that we want the system to execute and that is to be selected  and delivered by the Framework. For example, a reverse shell is a payload that  creates a connection from the target machine back to the attacker as a Windows command prompt, whereas a bind shell is a payload that  “binds” a command prompt to a listening port on the target machine, which  the attacker can then connect. A payload could also be something as simple as  a few commands to be executed on the target operating system.

Meterpreter
An advanced, dynamically extensible payload that uses in-memory DLL injection stagers and is extended over the network at runtime. It communicates over the stager socket and provides a comprehensive client-side Ruby API. It features command history, tab completion, channels, and more.

Requirements
  1. Pentesting Operating System (I recommend Kali Linux)
  2. Metasploit Framework (Already installed in most Security OS)
  3. Basic knowledge

Sunday, March 27, 2016

Automated Blind SQL Injection Attacking Tools~bsqlbf Brute forcer

What is Blind SQL Injection:
Some Websites are vulnerable to SQL Injection but the results of injection are not visible to the attacker.  In this situation, Blind SQL Injection is used. The page with the vulnerability may not be one that displays data but will display differently depending on the results of a logical statement injected into the legitimate SQL statement called for that page. This type of attack can become time-intensive because a new statement must be crafted for each bit recovered.
There are plenty of automated Blind Sql Injection tool available. Here i am introducing one of Tool named as bsqlbf(expanded as Blind Sql Injection Brute Forcer).
This tool is written in Perl and allows extraction of data from Blind SQL Injections. It accepts custom SQL queries as a command line parameter and it works for both integer and string based injections
Supported Database:
  • MS-SQL
  • MySQL
  • PostgreSQL
  • Oracle

Sunday, March 20, 2016

How to hack a Windows pc with metasploit

Hello friends!

Today i will teach you how to hack a pc with metasploit
Note: This is an advance topic.Read Carefully. Feel free to ask any kind of queries . We are always here to help you.
If you are really interested in network security, chances are you must have heard of the Metasploit over the last few years.
Now, have you ever wondered what someone can do to your PC, by just knowing your IP. Here’s the answer. He could 0wN you, or in other words , he could have full access to your PC provided you have just a few security loopholes which may arise cause of even a simple reason like not updating your Flash player last week, when it prompted you to do so.
Metasploit is a hacker’s best friend, mainly cause it makes the job of exploitation and post-exploitation a lot easier compared to other traditional methods of hacking.
The topic Metasploit is very vast in itself. However, i’ll try keeping it basic and simple so that it could be understood by everyone here. Also, Metasploit can be used with several other tools such as NMap or Nessus (all these tools are present in Backtrack ).
In this tutorial, i’ll be teaching you how to exploit a system using a meterpreter payload and start a keylogger on the victim’s machine.
Hacking through Metasploit is done in 3 simple steps: Point, Click, 0wn.
Before I go into the details of The Metasploit Framework, let me give you a little idea of some basic terms (may seem boring at first, but you must be knowing them)

How to hack a WordPress website with WPScan

This tutorial in the category WordPress hacking shows you how to scan WordPress for possible vulnerabilities and enumerate WordPress users. We will conclude this tutorial with a demonstration on how to brute force root passwords using WPScan in Kali Linux. WPScan is a black box WordPress vulnerability scanner and a must have tool for any WordPress web developer to scan for vulnerabilities and solve issues before they get exploited. Together with Nikto, a great webserver assessment tool, this tool should be part of any penetration test targeting a WordPress Website.
WPScan comes pre-installed on the following Linux distributions:

The latest version is WPScan 2.8 and the database currently contains:

Saturday, March 19, 2016

Crunch Password list generation in Kali Linux

In this tutorial we will be using the Crunch Password list generation tool in Kali Linux. Crunch is an easy to use tool for generating a custom made password list used for brute force password cracking. Crunch comes as a standard tool in Kali Linux. This tutorial shows you how easy it is to generate a password list containing all combinations of 4 letters, 5 letters and a password list containing 5 letters followed by a year. You can also use Crunch to generate password lists based on default router passwords as demonstrated in a few other tutorials. UPC Broadband routers use 8 capital letters as default password for Wifi and TP Link routers use the 8 digit default WPS PIN. Both can be easily generated with Crunch.

Crunch password list generation

Thursday, March 17, 2016

MAC address spoofing with Macchanger in Kali Linux

MAC address spoofing is a technique for changing your Media Access Control (MAC) address on a network device. A MAC Address is a unique and hardcoded address in network devices which cannot be changed. Macchanger is a tool included with Kali Linux and can change the MAC address to any desired address until the next reboot. In this tutorial we will be spoofing the MAC address of our wireless adapter with a random MAC address generated by Macchanger.

MAC Address Spoofing

First we need to take down the network adapter in order to change the MAC address. This can be done using the following command:
ifconfig wlan1 down
Replace wlan1 with your own network adapter.
Now use the following command to change your MAC address to a new random MAC Address:

How To: Trace Web Admin Panel | Kali Linux | BackTrack | ubuntu

                        How to : Trace Web Admin Panel :


                      1 ) Download The Script : Spider-webFinder.pl

                      2 ) How to Install Perl on Linux :

                       # For Ubuntu Linux / Anonymous Linux /                       BackTrack / Kali Linux




sudo apt-get update
sudo apt-get install perl

# For  Redhat / Centos /

yum install perl

3 ) Now Execute the Perl Program :

netwrkspider@netwrkspider:~$ perl spider_adminFinder.pl
sh: -c: line 0: syntax error near unexpected token `('
sh: -c: line 0: `spider Web Admin Finder (Hacker Edition)'

Tuesday, March 15, 2016

Penetration Testing : Crash Windows 7 Using Metasploit and Remote Desktop Connection Vulnerability

Crashing Windows 7


Now while the story so far has been smooth and cozy, it gets a bit tough from here on. For modern operating systems like Windows 7, there aren't any magical exploits like the ones we had for unpatched Windows XP machines. However, when it comes to Windows 7, there aren't any direct exploits for gaining access to the machine. We can try some client side attacks, etc. Social engineering toolkit would be great for stuff like that. However, there is still one vulnerability that waits to be exploited. In Windows 7, there is a hole in the RDP port (3389) which can work over LAN as well as over the internet. Over the internet stuff can get a bit tougher, however on the LAN, this should be a piece of cake (if you have successfully followed out pentest tutorials so far).



Requirements

Now you will require an attacker Kali machine, and a victim Windows machine, both running on Virtual machines. Windows 7 should be a fresh install, with no updates, as they can patch the vulnerability, making it unexploitable. Now when you have got all this setup, you can move on to further steps.

Information Gathering

Installing Kali - Dual Booting Kali With Windows

Kali Linux Dual Boot with Windows

Installing Kali alongside a Windows installation can be quite useful. However, you need to exercise caution during the setup process. First, make sure that you’ve backed up any important data on your Windows installation. Since you’ll be modifying your hard drive, you’ll want to store this backup on external media. Once you’ve completed the backup, we recommend you peruse Kali Linux Hard Disk Install, which explains the normal procedure for a basic Kali install.
In our example, we will be installing Kali Linux alongside an installation of Windows 7, which is currently taking up 100% of the disk space in our computer. We will start by resizing our current Windows partition to occupy less space and then proceed to install Kali Linux in the newly-created empty partition.
Download Kali Linux and either burn the ISO to DVD, or prepare a USB stick with Kali linux Liveas the installation medium. If you do not have a DVD or USB port on your computer, check out the Kali Linux Network Install. Ensure you have:
  • Minimum of 8 GB free disk space on Windows
  • CD-DVD / USB boot support

Preparing for the Installation

How to Install Kali Linux on a USB Drive [GUIDE!]



How to Install Kali Linux on a USB Drive
Previously i posted a guide on How to Install Kali Linux inside Windows. As for today, i’m going to show you the alternate way to install Kali Linux.
What happen is that when you boot up the USB into the Live session, and make changes to the system, such as download a file, run the system update, install an application etc, your data will be saved to the reserved space in the USB drive. Data saved in this reserved space won’t be deleted when you shut down the live session. The next time you boot into the live session, you are still able to access and retrieve the data.
Advantages of Data persistency in Live Session
  • The main advantage of a Live USB is that it doesn’t need a lot of storage space. You can easily create a Live USB with data persistency with a 2GB USB drive while a full installation will require at least 8GB of storage space.
  • A Live USB is configured to run on almost all desktops and has a great compatibility with various hardware. If you want to test the Linux distro on various computers, using a Live USB with data persistency is the best way to do it.

How to HACK any PC using Kali Linux


Isn't it cool that you can control other's pc from your pc!!! Yes you can do it very easily.All you need is Kali linux in your PC and a cup of coffee. In this tutorial you will learn HOW TO HACK ANY PC USING KALI LINUX. 


We are going to use SOCIAL ENGINEERING TOOLKIT for the hacking purpose. You may be curious about What the hell is social engineering toolkit? Let's first start with what is SET?

SOCIAL ENGINEERING TOOLKIT
SET is basically an open source python driven tool aimed at penetration testing around social engineering. It was created by the founder of TrustedSec. It is a menu driven based attack system, which makes the use of hacker tools easy. It is not made with command line interface because the social engineering attacks requires lot of customization according to the scenarios. Let's dive into the SET menu.

How to spoof mac address using kali linux macchanger


First of all we should know what is mac address ?

MAC ADDRESS - MEDIA ACCESS CONTROL ADDRESS

Mac Address is nothing but the physical address of your machine. It is uniquely assigned to the network interfaces for communication purpose. It is assigned by the manufacturer of network interface controller( NIC ) , this NIC is read-only memory.

Now this is something interesting, MAC ADDRESS SPOOFING .What is it? What is the need of it? How to do it?

MAC ADDRESS SPOOFING

Metasploit for the Future Hackers (msfvenom) : Hack Any Android Phone


msfvenom is a kali linux hacking tool for android ,is a combination of Msfpayload and Msfencode, putting both of these tools into a single Framework instance known as msfvenom payload.
Hacking With METASPLOIT in Kali Linux is a old tool. Metasploit is enhanced by msfvenom in kali linux. Metasploit is now a outdated tool.
So, let's get started!!



STEPS :

Credential Harvestor : Port Forwarding : Phishing Facebook

In the previous tutorial, we created a fake login page for facebook using Credential harevester. This however, would work only over Local Area network. Today we will enable port forwarding on our router and use our external IP address to create a phishing page that will work over the internet. The picture gives a good idea what port forwarding does. In the previous case, out page was only visible to computers on the right side of the firewall, i.e. those within the local network. The firewall handles traffic which comes through public address and decides whether to forward it to the internal network or block it. The port forwarding feature of the router tells it to allow traffic through a certain port.

Pre-requisites

  1. Must know how to use SET and Credential Harvester over local area network. If not read the tutorial on Credential Harvester (same as the link above).
  2. Kali Linux or backtrack 5 (other Linux distributions will work if you can install SET and all the dependencies)
  3. Patience - Finding your router password might be hard sometimes.
  4. Some basic knowledge (read a few old posts on this blog which I had written assuming that newbies were the ones reading. By now, after following dozens of my post, the readership has grown smart and doesn't need to be spoon fed.

Find you public IP

Social Engineering Toolkit - Kali : Credential Harvestor : Hack Facebook

Hacking Facebook

In the previous post I've discussed how not to hack Facebook. Here we will discuss how to hack Facebook. This tutorial is meant for enhancing you networking skills, as well as to develop understanding of how fake web pages are created, so that you can protect yourself from such attacks. Don't use this information to hack someone's account, or you'll run the risk of getting into legal troubles. If you haven't yet read the previous post, you should. It might not be very enlightening in terms of technical details, but it quite enjoyable and will provide you with a background of what we are looking at.

Social Engineering Toolkit

Humans are the weakest link in any security system ~Shashwat (That'll be me)
If you have read the previous post, then you know what I'm talking about. Social engineering toolkit does not exploit vulnerability in the mechanism of any service. It exploits the weakness in the human element of security. Some official words from the official guys before we move on to the actual hacking

Blind SQL Injection



What we know so far

If you've read the above three tutorials, you know the basic theory of what SQL Injection is, you know how to carry it out using you web browser on a vulnerable website, and you know how to use SQLMap to automate some of the process.
Now, for revision's sake, what we did in the Manual SQL injection tutorial was-
  1. Found a potentially vulnerable website (http://testphp.vulnweb.com)
  2. Used the asterisk  ( ' ) to verify vulnerability.
  3. Found out the number of rows and columns by making some small changes to the URL (which eventually changes the query that is executed on the server)
  4. We then obtained names of tables, their columns, and finally extracted data.
However, it is worth noting that the website was intentionally left vulnerable, and most often the flaws in security aren't this obvious. In our case, the website was willingly responding to our queries with errors. This may not always be the case. As long as we can see the errors, we know we're going in the right direction. Errors tend to give us clues. However, some websites may choose to suppress the error messages. This make SQLi harder. This is known as Blind SQL Injection.



What I didn't tell you

I explained in subtle details what each and every step did. However, I did not explain the motive behind each step. (I gave a rough idea in the Sql injection basics post)
The purpose of the asterisk ( ' ) was to find out how the server handles bad inputs. If it has some mechanisms for sanitizing or escaping these dangerous characters, then we would not see any error in output.

Hack WPA/WPA2 WPS - Reaver - Kali Linux


When it was known that a WEP network could be hacked by any kid with a laptop and a network connection (using easy peasy tutorials like those on our blog), the security guys did succeed in making a much more robust security measure WPA/WPA2.

Now hacking WPA/WPA2 is a very tedious job in most cases. A dictionary attack may take days, and still might not succeed. Also, good dictionaries are huge. An exhaustive bruteforce including all the alphabets (uppercase lowercase) and numbers, may take years, depending on password length. Rainbow tables are known to speed things up, by completing a part of the guessing job beforehand, but the output rainbow table that needs to be downloaded from the net is disastrously large (can be 100s of GBs sometimes). And finally the security folks were at peace. But it was not over yet, as the new WPA technology was not at all easy for the users to configure. With this in mind, a new security measure was introduced to compliment WPA. Wifi Protected Setup (WPS). Now basically it was meant to make WPA even tougher to crack, and much easier to configure (push a button on router and device connects). However, it had a hole, which is now well known, and tools like reaver can exploit it in a single line statement. It still might take hours, but it is much better than the previous scenario in which months of brute-forcing would yield no result.



Here's what wikipedia says about WPS-
Created by the Wi-Fi Alliance and introduced in 2006, the goal of the protocol is to allow home users who know little of wireless security and may be intimidated by the available security options to set up Wi-Fi Protected Access, as well as making it easy to add new devices to an existing network without entering long passphrases. Prior to the standard, several competing solutions were developed by different vendors to address the same need. A major security flaw was revealed in December 2011 that affects wireless routers with the WPS feature, which most recent models have enabled by default. The flaw allows a remote attacker to recover the WPS PIN in a few hours with a brute-force attack and, with the WPS PIN, the network's WPA/WPA2 pre-shared key. Users have been urged to turn off the WPS feature, although this may not be possible on some router models.

 Working Of WPS