Showing posts with label Linux. Show all posts
Showing posts with label Linux. Show all posts

Thursday, October 27, 2016

Install Andriod on your Pedrive

Andriod 6.0 Marshmallow, or Android Lollipop v5.0, or Kitkat v4.4 on Pendrive

Hey Guys Many of you were facing problem with Unet Bootin app so I am back with a different software to install android on Your PC,Including The latest 'Android 6.0' you may use any of the ISO files.
This Tutorial Showing you:
How Install Original Android 6.0 Marshmallow or Lollipop v5.0 or Kitkatv4.4 Source Code On Your Flash/Pen Drive and Use it anywhere.

Sunday, March 20, 2016

How to hack a WordPress website with WPScan

This tutorial in the category WordPress hacking shows you how to scan WordPress for possible vulnerabilities and enumerate WordPress users. We will conclude this tutorial with a demonstration on how to brute force root passwords using WPScan in Kali Linux. WPScan is a black box WordPress vulnerability scanner and a must have tool for any WordPress web developer to scan for vulnerabilities and solve issues before they get exploited. Together with Nikto, a great webserver assessment tool, this tool should be part of any penetration test targeting a WordPress Website.
WPScan comes pre-installed on the following Linux distributions:

The latest version is WPScan 2.8 and the database currently contains:

Saturday, March 19, 2016

Crunch Password list generation in Kali Linux

In this tutorial we will be using the Crunch Password list generation tool in Kali Linux. Crunch is an easy to use tool for generating a custom made password list used for brute force password cracking. Crunch comes as a standard tool in Kali Linux. This tutorial shows you how easy it is to generate a password list containing all combinations of 4 letters, 5 letters and a password list containing 5 letters followed by a year. You can also use Crunch to generate password lists based on default router passwords as demonstrated in a few other tutorials. UPC Broadband routers use 8 capital letters as default password for Wifi and TP Link routers use the 8 digit default WPS PIN. Both can be easily generated with Crunch.

Crunch password list generation

Thursday, March 17, 2016

MAC address spoofing with Macchanger in Kali Linux

MAC address spoofing is a technique for changing your Media Access Control (MAC) address on a network device. A MAC Address is a unique and hardcoded address in network devices which cannot be changed. Macchanger is a tool included with Kali Linux and can change the MAC address to any desired address until the next reboot. In this tutorial we will be spoofing the MAC address of our wireless adapter with a random MAC address generated by Macchanger.

MAC Address Spoofing

First we need to take down the network adapter in order to change the MAC address. This can be done using the following command:
ifconfig wlan1 down
Replace wlan1 with your own network adapter.
Now use the following command to change your MAC address to a new random MAC Address:

How To: Trace Web Admin Panel | Kali Linux | BackTrack | ubuntu

                        How to : Trace Web Admin Panel :


                      1 ) Download The Script : Spider-webFinder.pl

                      2 ) How to Install Perl on Linux :

                       # For Ubuntu Linux / Anonymous Linux /                       BackTrack / Kali Linux




sudo apt-get update
sudo apt-get install perl

# For  Redhat / Centos /

yum install perl

3 ) Now Execute the Perl Program :

netwrkspider@netwrkspider:~$ perl spider_adminFinder.pl
sh: -c: line 0: syntax error near unexpected token `('
sh: -c: line 0: `spider Web Admin Finder (Hacker Edition)'

Tuesday, March 15, 2016

Installing Kali - Dual Booting Kali With Windows

Kali Linux Dual Boot with Windows

Installing Kali alongside a Windows installation can be quite useful. However, you need to exercise caution during the setup process. First, make sure that you’ve backed up any important data on your Windows installation. Since you’ll be modifying your hard drive, you’ll want to store this backup on external media. Once you’ve completed the backup, we recommend you peruse Kali Linux Hard Disk Install, which explains the normal procedure for a basic Kali install.
In our example, we will be installing Kali Linux alongside an installation of Windows 7, which is currently taking up 100% of the disk space in our computer. We will start by resizing our current Windows partition to occupy less space and then proceed to install Kali Linux in the newly-created empty partition.
Download Kali Linux and either burn the ISO to DVD, or prepare a USB stick with Kali linux Liveas the installation medium. If you do not have a DVD or USB port on your computer, check out the Kali Linux Network Install. Ensure you have:
  • Minimum of 8 GB free disk space on Windows
  • CD-DVD / USB boot support

Preparing for the Installation

How to Install Kali Linux on a USB Drive [GUIDE!]



How to Install Kali Linux on a USB Drive
Previously i posted a guide on How to Install Kali Linux inside Windows. As for today, i’m going to show you the alternate way to install Kali Linux.
What happen is that when you boot up the USB into the Live session, and make changes to the system, such as download a file, run the system update, install an application etc, your data will be saved to the reserved space in the USB drive. Data saved in this reserved space won’t be deleted when you shut down the live session. The next time you boot into the live session, you are still able to access and retrieve the data.
Advantages of Data persistency in Live Session
  • The main advantage of a Live USB is that it doesn’t need a lot of storage space. You can easily create a Live USB with data persistency with a 2GB USB drive while a full installation will require at least 8GB of storage space.
  • A Live USB is configured to run on almost all desktops and has a great compatibility with various hardware. If you want to test the Linux distro on various computers, using a Live USB with data persistency is the best way to do it.

Hack WPA/WPA2 WPS - Reaver - Kali Linux


When it was known that a WEP network could be hacked by any kid with a laptop and a network connection (using easy peasy tutorials like those on our blog), the security guys did succeed in making a much more robust security measure WPA/WPA2.

Now hacking WPA/WPA2 is a very tedious job in most cases. A dictionary attack may take days, and still might not succeed. Also, good dictionaries are huge. An exhaustive bruteforce including all the alphabets (uppercase lowercase) and numbers, may take years, depending on password length. Rainbow tables are known to speed things up, by completing a part of the guessing job beforehand, but the output rainbow table that needs to be downloaded from the net is disastrously large (can be 100s of GBs sometimes). And finally the security folks were at peace. But it was not over yet, as the new WPA technology was not at all easy for the users to configure. With this in mind, a new security measure was introduced to compliment WPA. Wifi Protected Setup (WPS). Now basically it was meant to make WPA even tougher to crack, and much easier to configure (push a button on router and device connects). However, it had a hole, which is now well known, and tools like reaver can exploit it in a single line statement. It still might take hours, but it is much better than the previous scenario in which months of brute-forcing would yield no result.



Here's what wikipedia says about WPS-
Created by the Wi-Fi Alliance and introduced in 2006, the goal of the protocol is to allow home users who know little of wireless security and may be intimidated by the available security options to set up Wi-Fi Protected Access, as well as making it easy to add new devices to an existing network without entering long passphrases. Prior to the standard, several competing solutions were developed by different vendors to address the same need. A major security flaw was revealed in December 2011 that affects wireless routers with the WPS feature, which most recent models have enabled by default. The flaw allows a remote attacker to recover the WPS PIN in a few hours with a brute-force attack and, with the WPS PIN, the network's WPA/WPA2 pre-shared key. Users have been urged to turn off the WPS feature, although this may not be possible on some router models.

 Working Of WPS

Hacking Website with Sqlmap in Kali Linux

A screenshot from the SQLmap official website
In the previous tutorial, we hacked a website using nothing but a simple browser on a Windows machine. It was a pretty clumsy method to say the least. However, knowing the basics is necessary before we move on to the advanced tools. In this tutorial, we'll be using Kali Linux (see the top navigation bar to find how to install it if you haven't already) and SqlMap (which comes preinstalled in Kali) to automate what we manually did in the Manual SQL Injection tutorial to hack websites.




Now it is recommended that you go through the above tutorial once so that you can get an idea about how to find vulnerable sites. In this tutorial we'll skip the first few steps in which we find out whether a website is vulnerable or not, as we already know from the previous tutorial that this website is vulnerable.

Kali Linux

First off, you need to have Kali linux (or backtrack) up and running on your machine. Any other Linux distro might work, but you'll need to install Sqlmap on your own. Now if you don't have Kali Linux installed, you might want to go to this page, which will get you started on Beginner Hacking Using Kali Linux

Sqlmap

Basically its just a tool to make Sql Injection easier. Their official website  introduces the tool as -"sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections."
A lot of features can be found on the SqlMap website, the most important being - "Full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase and SAP MaxDB database management systems." That's basically all the database management systems. Most of the time you'll never come across anything other than MySql. 

Hacking Websites Using Sqlmap in Kali linux

Monday, March 14, 2016

ALL IMPORTANT! GOOGLE DORKS! IN ONE PLACE! #MASTER #TREASURE #FOR #HACKERS

 
Google is not only a searching site but also an important tool for hackers. Yeah, I'm talking about the Google Dorks!

What are Google Dorks ?

It is basically an advanced google search to find vulnerable websites.
 

I have included 6 types of google dorks in this collection
  1. Google dorks for SQL injection
  2. Google dorks for Local File Inclusion
  3. Google dorks For open CCTV cams, 
  4. Google dorks for sensitive information, 
  5. Google Dorks for Uploading Shell in Wordpress Sites, 
  6. Google Dorks To Find Unsecure Web Admin Panels
  7. Carding Dorks
Copy and paste the below google dorks on the search engine and have fun!

Sunday, March 13, 2016

How to Use Blue J from Pen drive/USB Stick! [Latest]



BlueJ
It is an integrated Java development environment developed specifically for introductory programming learning and teaching. It is ideal for small-scale development. BlueJ offers a very easy-to-use and highly interactive interface that allows the interactive creation and invocation of objects. It is a development environment that allows you to develop Java programs quickly and easily. Its main features are that it is:
  • Simple BlueJ has a deliberately smaller and simpler interface than professional environments like NetBeans or Eclipse. This allows beginners to get started more quickly, and without being overwhelmed.
  • Designed for teaching BlueJ is deliberately designed with good pedagogy in mind. There is a popular textbook designed for teaching introductory university/college courses with BlueJ, and a site full of teaching resources.
  • Interactive BlueJ allows you to interact with objects. You can inspect their value, call methods on them, pass them as parameters and more. You can also directly invoke Java expressions without compiling. Thus BlueJ is a powerful graphical shell/REPL for Java.
  • Portable BlueJ runs on Windows, Mac OS X, Linux and other platforms which run Java. It can also run without installation from a USB stick.

How to hack a TP link WR841N router wireless network

In this tutorial we will show you how to hack a TP link WR841N router wireless network with the default wifi password using Kali Linux. TP Link routers use the default WPS PIN as wifi password out of the box Which consists of 8 characters. We will try the following techniques to hack a TP link WR841N router wireless network:
1. First we try to get the password using Reaver 1.5.2 with Pixiedust WPS and the Aircrack-ng suite.
2. Than we try to get the WPS PIN using Reaver.
3. The last method is capturing a 4-way handshake using Airodump-ng, generate a default password list with Crunch and bruteforce it with oclHashcat.

1. Pixie Dust WPS Attack with Reaver

Let’s put the wifi interface in monitoring mode using:
airmon-ng start wlan0
For anyone getting the following error in Kali Linux 2.0 Sana:
[X] ERROR: Failed to open ‘wlan0mon’ for capturing
try this as a solution:
1. Put the device in Monitor mode Airmon-ng start wlan0
2. A monitoring interface will be started on wlan0mon
3. Use iwconfig to check if the interface MODE is in managed mode, if so then change it to monitor instead of managed with the following commands:
ifconfig wlan0mon down
iwconfig wlan0mon mode monitor
ifconfig wlan0mon up
4. iwconfig check if the mode is monitoring mode now
5. airodump-ng wlan0mon
If necessary kill the processes Kali is complaining about:

Saturday, March 12, 2016

Pixie Dust Attack WPS in Kali Linux with Reaver

In this tutorial we are going to do a pixie dust attack using Reaver 1.5.2, Aircrack-NG and Pixiewps. Pixie Dust attack is an offline attack which exploits a WPS vulnerability. The tool, Pixiewps, is written in C and works with a modified version of Reaver. When a wireless router is vulnerable for this attack retrieving the passphrase can be done in seconds. A link to the list of pixie dust vulnerable routers is included at the bottom of this tutorial.

Pixie Dust Attack

Let’s put the wifi interface in monitoring mode using:
airmon-ng start wlan0
If necessary kill the processes Kali is complaining about:

Hack UPC wireless networks

In this tutorials we will show you how to hack UPC wireless networks with the default password which is a common thing for many UPC customers. The first step is to create a password list which contains all possible combinations of 8 capital letters. We will be using Maskprocessor in Kali Linux to create the password list. Than we will be capturing a 4 way handshake with Airodump-ng by deauthentication of a connected client with Aireplay-ng. The last step is to brute force the password using Aicrack-ng. In part 2 of this tutorial we will be using oclHashcat with the power of GPU since CPU will take way too much time with this passwords list.

How to hack UPC wireless networks in 3 steps

Step 1: Creating the password list with Maskprocessor
Step 2: Capturing the 4-way handshake with Airodump-ng
Step 3: Brute forcing the password with Aircrack-ng

Creating the password list with Maskprocessor

Friday, March 11, 2016

Kali Linux inside windows

How to Install Kali Linux inside Windows[GUIDE!] 
kali1
Install Kali Linux inside Windows
In this post, i will guide you how to install Kali Linux inside Windows. Instead of replacing your current OS or dual-booting it, this is another way to install.
What is Kali Linux? Kali Linux is one of the Best Operating System for Penetration Testing  Hacking.
How to Install Kali Linux inside Windows
Vmware Settings
  1. Download and Install VmWare WorkStation
  2. Open Vmware WorkStation
  3. Click on Create a New Virtual Machine
  4. Tick Typical and click on Next
  5. Browse where you have the OS Image file
  6. Enter the Machine name, any name you like
  7. Specify the disk capacity
  8. Tick on Store Virtual Disk on Single file and click next
  9. Click on Customize Hardware if you want to edit anything
  10. Click on finish
  11. The virtual machine will started to mount the ISO file and boot it
Kali Installations

World Fastest OS


Elementary OS
A fast and open replacement for Windows and OS X  is a Linux distribution based on Ubuntu. It makes use of a desktop with its own shell named Pantheon,and is deeply integrated with other elementary OS applications like Plank (a dock), Midori (the default web browser) and Scratch (a simple text editor). This distribution uses Gala as its window manager,which is based on Mutter.The distribution initially started as a set of themes and applications designed for Ubuntu which later turned into its own Linux distro. Being Ubuntu-based, it is compatible with its repositories and packages and uses Ubuntu’s own software center to handle installation/removal of software. Its user interface aims at being intuitive for new users without consuming too many resources.
Features
  • Supported on Mac & PC
  • Its Free
  • Terminal
  • Multitasking view and workspace switcher
  • New lightdm lock screen
  • Top Panel
  • Quick access to privacy settings