Sponsors

Saturday, 16 August 2014

Best Wi-Fi Hacking Tools

1. Kismet

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and (with appropriate hardware) can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet also supports plugins which allow sniffing other media such as DECT. Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and infering the presence of nonbeaconing networks via data traffic. 

-Features :

1. 802.11b, 802.11g, 802.11a, 802.11n sniffing
2. Standard PCAP file logging (Wireshark, Tcpdump, etc)
3. Client/Server modular architecture
4. Multi-card and channel hopping support
5. Runtime WEP decoding
6. Tun/Tap virtual network interface drivers for realtime export of packets
7. Hidden SSID decloaking
8. Distributed remote sniffing with Kismet drones
9. XML logging for integration with other tools
10. Linux, OSX, Windows, and BSD support (devices and drivers permitting)

2. NetStumbler

NetStumbler is a tool for Windows that facilitates detection of Wireless LANs using the 802.11b, 802.11a and 802.11g WLAN standards. It runs on Microsoft Windows operating systems from Windows 2000 to Windows XP. A trimmed-down version called MiniStumbler is available for the handheld Windows CE operating system.

-Used for :
1. Wardriving
2. Verifying network configurations
3. Finding locations with poor coverage in a WLAN
4. Detecting causes of wireless interference
5. Detecting unauthorized ("rogue") access points
6. Aiming directional antennas for long-haul WLAN links

3. WireShark

Wireshark is the world's foremost network protocol analyser. It lets you see what's happening on your network at a microscopic level. It is the de facto standard across many industries and educational institutions.

-Features :

1. Deep inspection of hundreds of protocols, with more being added all the time
2. Live capture and offline analysis
3. Standard three-pane packet browser
4. Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others
5. Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility

4. AirSnort

AirSnort is a Linux and Microsoft Windows utility (using GTK+) for decrypting WEP encryption on an 802.11b network. Distributed under the GNU General Public License,[1] AirSnort is free software. However, it is no longer maintained or supported.

5. CoWPAtty

CoWPAtty automates the dictionary attack for WPA-PSK. It runs on Linux. The program is started using a command-line interface, specifying a word-list that contains the passphrase, a dump file that contains the four-way EAPOL handshake, and the SSID of the network. 

Wednesday, 9 July 2014

20 Penetration Testing Tools

What is a penetration test?


 Penetration testing, often called “pentesting”,“pen testing”, or “security testing”, is the practice of attacking your own or your clients’ IT systems in the same way a hacker would to identify security holes. Of course, you do this without actually harming the network. The person carrying out a penetration test is called a penetration tester or pentester.


Performed for: Websites/Servers/Networks

1. It starts with a list of Vulnerabilities/potential problem areas that would cause a security breach for the systems.
2. If possible, this list of items has to be ranked in the order of priority/criticality
3. Devise penetration tests that would work (attack your system) from both within the network and outside (externally) to determine if you can access data/network/server/website unauthorized.
4. If the unauthorized access is possible, the system has to be corrected and the series of steps need to be re-run until the problem area is fixed.

Metasploit 

Metasploit pentesting tool
This is the most advanced and popular Framework that can be used to for pen-testing. It is based on the concept of ‘exploit’ which is a code that can surpass the security measures and enter a certain system. If entered, it runs a ‘payload’, a code that performs operations on a target machine, thus creating the perfect framework for penetration testing.

Wireshark
Wireshark logo
This is basically a network protocol analyzer –popular for providing the minutest details about your network protocols, packet information, decryption etc. It can be used on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many other systems. The information that is retrieved via this tool can be viewed through a GUI, or the TTY-mode TShark utility.  

 w3af

w3af4
W3afis a Web Application Attack and Audit Framework.
Some of the features are: fast HTTP requests, integration of web and proxy servers into the code, injecting payloads into various kinds of HTTP requests etc.

CORE Impact

CORE Impact
CORE Impact Pro can be used to test mobile device penetration, network/network devise penetration, password identification and cracking, etc. It has a command-line and a GUI clickable interface, works Microsoft Windows. 

Back Track

Back Track
Back Track works only on Linux Machines. The new version is called Kali Linux. This is one of the best tools available for Packet sniffing and injecting. An expertise in TCP/IP protocol and networking are key to succeed using this tool. 

Netsparker

Netsparker logo
Netsparker comes with a robust web application scanner that will identify vulnerabilities, suggest remedial action etc. This tool can also help exploit SQL injection and LFI (local file induction). It has a command-line and GUI interface, works only on Microsoft Windows.

Nessus

Nessus logo
Nessus also is a scanner and one that needs to be watched out for. It is one of the most robust vulnerability identifier tools available. It specializes in compliance checks, Sensitive data searches, IPs scan, website scanning etc. 

 Burpsuite

Burpsuite logo
Burp suite is also essentially a scanner (with a limited “intruder” tool for attacks), although many security testing specialists swear that pen-testing without this tool is unimaginable. 

Cain & Abel

If cracking encrypted passwords or network keys is what you need, then Cain& Abel is the tool for you. It uses network sniffing, Dictionary, Brute-Force and Cryptanalysis attacks, cache uncovering and routing protocol analysis methods to achieve this. 

Zed Attack Proxy (ZAP)

Zed Attack Proxy logo
ZAP is a completely free to use, scanner and security vulnerability finder for web applications. ZAP includes Proxy intercepting aspects, variety of scanners, spiders etc. 

Acunetix

Acunetix logo
Acunetix is essentially a web vulnerability scanner targeted at web applications. It provides SQL injection, cross site scripting testing, PCI compliance reports etc. along with identifying a multitude of vulnerabilities. 

John The Ripper

John The Ripper logo
Another password cracker in line is, John the Ripper. This tool works on most of the environments, although it’s primarily for UNIX systems. It is considered one of the fastest tools in this genre. Password hash code and strength-checking code are also made available to be integrated to your own software/code which I think is very unique. 

Retina

Retina logo
As opposed to a certain application or a server, Retina targets the entire environment at a particular company/firm. It comes as a package called Retina Community. It is a commercial product and is more of a vulnerability management tool more than a pen-testing tool. 
 Sqlmap
Sqlmap pen test logo
Sqlmap is again a good open source pen testing tool. This tool is mainly used for detecting and exploiting SQL injection issues in an application and hacking over of database servers. It comes with command-line interface. Platform: Linux, Apple Mac OS X and Microsoft Windows are supported platforms. 

Canvas

Canvas pen test logo
Immunity’s CANVAS is a widely used tool that contains more than 400 exploits and multiple payload options. It renders itself useful for web applications, wireless systems, networks etc. It has a command-line and GUI interface, works on Linux, Apple Mac OS X and Microsoft Windows. 

Social Engineer Toolkit

Social Engineer Toolkit logo
The Social-Engineer Toolkit (SET) is a unique tool in terms that the attacks are targeted at the human element than on the system element. It has features that let you send emails, java applets, etc containing the attack code. It goes without saying that this tool is to be used very carefully and only for ‘white-hat’ reasons.  It has a command-line interface, works on Linux, Apple Mac OS X and Microsoft Windows. 

Sqlninja

Sqlninja penetration testing
Sqlninja, as the name indicates is all about taking over the DB server using SQL injection in any environment. This product by itself claims to be not so stable its popularity indicates how robust it is already with the DB related vulnerability exploitation. It has a command-line interface, works on Linux, Apple Mac OS X and not on Microsoft Windows. 
Nmap
Nmap logo
“Network Mapper” though not necessarily a pen-testing tool, it is a must-have for the ethical hackers. This is a very popular tool that predominantly aids in understanding the characteristics of any target network. The characteristics can include: host, services, OS, packet filters/firewalls etc.  

 BeEF

BeEF  pen testing tool
BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser- what this means is that, it takes advantage of the fact that an open web-browser is the window(or crack) into a target system and designs its attacks to go on from this point on . It has a GUI interface, works on Linux, Apple Mac OS X and Microsoft Windows. 

 Dradis
Dradis pen testing tool
Dradis is an open source framework (a web application) that helps with maintaining the information that can be shared among the participants of a pen-test. The information collected helps understand what is done and what needs to be done. It achieves this purpose by the means of plugins to read and collect data from network scanning tools, like Nmap, w3af, Nessus, Burp Suite, Nikto and many more.  It has a GUI interface, works on Linux, Apple Mac OS X and Microsoft Windows. 




Tuesday, 24 June 2014

How To Hack Facebook Account By using BT5

Now am going to teach about a simple hacking trick by Using Back Track 5. This trick can be applied in local networks.It is just for gaining knowledge and  education purpose only.

Step 1: Run  BT 5 (OS) And go to  Application Launcher Menu Then click BackTrack. 


Step 2: Then go to Exploitation Tools -------> Social Engineering Tools ------> Social Engineering Tool kit
--------> Set 


Step 3: Then Konsole Terminal will be open.Then Enter your Choice 2 (Website Attack Vectors ).
           


Step 4: Then Enter your Choice 4 ( Tabnabbing Attack Method)
            Tabnabbing is like Phishing type of attack.This attack creates a clone page of the site which has to be attacked.


Step 5: Then Enter Number 2 ( Site Cloner) 
            In this step Entered URL will be Cloned 


Step 6: Enter the URL which has to be cloned like Facebook or G mail etc....


Step 7: Then Enter the Port Number (Eg: 80)


Step 8: Then open any Browser and Enter the local IP address like 192.1.1.3 
             Now the cloning process of the entered site will be going on 


Step 9: Now Cloned page will be appeared on the Screen 
            If any body enter their Username and Password on the cloned page, that will be traced by the BT. 


Step 10: This process working in local area network only. The hacked Username and Password will be shown like this..This type of attack can be applied in G mail and Yahoo etc...











Monday, 23 June 2014

How Make Trojan Backdoor by using Beast

Step 1:- Download the necessary software  Beast 2.06


Step 2:- Open the software



Step 3:- Now click on “Build server “button.

Step 4:- Now in this window click on the notifications tab.

Step 5:- In the notifications tab click on the e-mail button.

Step 6:- Now In this window fill your proper and valid email id.





Step 7:- Now go to “AV-FW kill” tab.

Step 8: – Now In this put a tick mark on the 3“disable XP firewall “.



Step 9:-Now click on “EXE icon” tab.




Step 10:- Select any icon and click on the ”Save Server” button and the Trojan will be made.



Step 11:-Now send this Trojan File to victim.

Step 12:- As and when the victim will install the Trojan on his system you will get a notification e-mail on your specified e-mail id while making the Trojan. This Email consists of the IP address and port of the victim.

Step 13:-Put This IP address and Port in the place shown in the below snap-shot.



Step 14:- After That Click on the “Go Beast” Button and You will be connected to victims PC.

Tuesday, 10 June 2014

Lesson-1

Introduction To C:
  • The C is a general-purpose, procedural, imperative computer programming language developed in 1972 by Dennis M. Ritchie at the Bell Telephone Laboratories to develop the UNIX operating system.
  •  The Unix operating system and virtually all Unix applications are written in the C language. C has now become a widely used professional language for various reasons.

    1. Easy to learn
    2. Structured language
    3. It produces efficient programs.
    4. It can handle low-level activities.
    5. It can be compiled on a variety of computers.
     
Facts about C
  • C was invented to write an operating system called UNIX.
  • C is a successor of B language which was introduced around 1970The language was formalized in 1988 by the American National Standard Institue (ANSI).
  • By 1973 UNIX OS almost totally written in C.
  • Today C is the most widely used System Programming Language.
  • Most of the state of the art software have been implemented using C
Why to use C ?

  • C was initially used for system development work, in particular the programs that make-up the operating system. C was adoped as a system development language because it produces code that runs nearly as fast as code written in assembly language. Some examples of the use of C might be:

  1. Operating Systems
  2. Language Compilers
  3. Assemblers
  4. Text Editors
  5. Print Spoolers
  6. Network Drivers
  7. Modern Programs
  8. Data Bases
  9. Language Interpreters
  10. Utilities
C Program File
  • All the C programs are writen into text files with extension ".c" for example hello.c. You can use "vi" editor to write your C program into a file.
  • This tutorial assumes that you know how to edit a text file and how to write programming insturctions inside a program file.

C Compilers
  • When you write any program in C language then to run that program you need to compile that program using a C Compiler which converts your program into a language understandable by a computer. This is called machine language (ie. binary format). So before proceeding, make sure you have C Compiler available at your computer. It comes alongwith all flavors of Unix and Linux.

  • If you are working over Unix or Linux then you can type gcc -v or cc -v and check the result. You can ask your system administrator or you can take help from anyone to identify an available C Compiler at your computer.

  • If you don't have C compiler installed at your computer then you can use below given link to download a GNU C Compiler and use it.

Getting Set Up - Finding a C-Compiler

  • The very first thing you need to do, before starting out in C, is to make sure that you have a compiler. What is a compiler, you ask? A compiler turns the program that you write into an executable that your computer can actually understand and run. If you're taking a course, you probably have one provided through your school. 
  • If you're starting out on your own, your best bet is to use Code::Blocks with MinGW. If you're on Linux, you can use gcc, and if you're on Mac OS X, you can use XCode. If you haven't yet done so, go ahead and get a compiler set up--you'll need it for the rest of the tutorial. 

Or 

Basic Of C-Language

Introduction and Basic C Features


  • Intro to C
  • If statements
  • Loops in C
  • Functions and Program Organization
  • Switch case 
Pointers, Arrays and Strings

  • Pointers
  • Structures
  • Arrays
  • C-style Strings
File IO and command line arguments

  • C File I/O
  • Typecasting
  • Command line arguments
Linked lists, binary trees, recursion

  • Linked Lists
  • Recursion
  • Variable argument lists
  • Binary Trees

Saturday, 19 April 2014

History of the Network


1960 AT&T Dataphone :



AT&T designed its Dataphone, the first commercial modem, specifically for converting digital computer data to analog signals for transmission across its long distance network. Outside manufacturers incorporated Bell Laboratories´ digital data sets into commercial products. The development of equalization techniques and bandwidth-conserving modulation systems improved transmission efficiency in national and global systems.



1964 :


Online transaction processing made its debut in IBM´s SABRE reservation system, set up for American Airlines. Using telephone lines, SABRE linked 2,000 terminals in 65 cities to a pair of IBM 7090 computers, delivering data on any flight in less than three seconds.



1966 Acoustically coupled modem:


John van Geen of the Stanford Research Institute vastly improved the acoustically coupled modem. His receiver reliably detected bits of data despite background noise heard over long-distance phone lines. Inventors developed the acoustically coupled modem to connect computers to the telephone network by means of the standard telephone handset of the day.


1970:

Citizens and Southern National Bank in Valdosta, Ga., installed the country´s first automatic teller machine.



ARPANET topology:


Computer-to-computer communication expanded when the Department of Defense established four nodes on the ARPANET: the University of California Santa Barbara and UCLA, SRI International, and the University of Utah. Viewed as a comprehensive resource-sharing network, ARPANET´s designers set out with several goals: direct use of distributed hardware services; direct retrieval from remote, one-of-a-kind databases; and the sharing of software subroutines and packages not available on the users´ primary computer due to incompatibility of hardware or languages.






1971:


The first e-mail is sent. Ray Tomlinson of the research firm Bolt, Beranek and Newman sent the first e-mail when he was supposed to be working on a different project. Tomlinson, who is credited with being the one to decide on the "@" sign for use in e-mail, sent his message over a military network called ARPANET. When asked to describe the contents of the first email, Tomlinson said it was “something like "QWERTYUIOP"”



1972:


Wozniak´s "blue box", Steve Wozniak built his "blue box" a tone generator to make free phone calls. Wozniak sold the boxes in dormitories at the University of California Berkeley where he studied as an undergraduate. "The early boxes had a safety feature — a reed switch inside the housing operated by a magnet taped onto the outside of the box," Wozniak remembered. "If apprehended, you removed the magnet, whereupon it would generate off-frequency tones and be inoperable ... and you tell the police: It´s just a music box."






1973 Ethernet:



Robert Metcalfe devised the Ethernet method of network connection at the Xerox Palo Alto Research Center. He wrote: "On May 22, 1973, using my Selectric typewriter ... I wrote ... "Ether Acquisition" ... heavy with handwritten annotations — one of which was "ETHER!" — and with hand-drawn diagrams — one of which showed `boosters´ interconnecting branched cable, telephone, and ratio ethers in what we now call an internet.... If Ethernet was invented in any one memo, by any one person, or on any one day, this was it."

Robert M. Metcalfe, "How Ethernet Was Invented", IEEE Annals of the History of Computing, Volume 16, No. 4, Winter 1994, p. 84.



1975:

Telenet, the first commercial packet-switching network and civilian equivalent of ARPANET, was born. The brainchild of Larry Roberts, Telenet linked customers in seven cities. Telenet represented the first value-added network, or VAN — so named because of the extras it offered beyond the basic service of linking computers.

1976:

The Queen of England sends first her e-mail. Elizabeth II, Queen of the United Kingdom, sends out an e-mail on March 26 from the Royal Signals and Radar Establishment (RSRE) in Malvern as a part of a demonstration of networking technology.

1979:


John Shoch and Jon Hupp at the Xerox Palo Alto Research Center discover the computer "worm," a short program that searches a network for idle processors. Initially designed to provide more efficient use of computers and for testing, the worm had the unintended effect of invading networked computers, creating a security threat.

Shoch took the term "worm" from the book "The Shockwave Rider," by John Brunner, in which an omnipotent "tapeworm" program runs loose through a network of computers. Brunner wrote: "No, Mr. Sullivan, we can´t stop it! There´s never been a worm with that tough a head or that long a tail! It´s building itself, don´t you understand? Already it´s passed a billion bits and it´s still growing. It´s the exact inverse of a phage — whatever it takes in, it adds to itself instead of wiping... Yes, sir! I´m quite aware that a worm of that type is theoretically impossible! But the fact stands, he´s done it, and now it´s so goddamn comprehensive that it can´t be killed. Not short of demolishing the net!" (247, Ballantine Books, 1975).

1975:


USENET established.  USENET was invented as a means for providing mail and file transfers using a communications standard known as UUCP.  It was developed as a joint project by Duke University and the University of North Carolina at Chapel Hill by graduate students Tom Truscott, Jim Ellis, and Steve Bellovin. USENET enabled its users to post messages and files that could be accessed and archived. It would go on to become one of the main areas for large-scale interaction for interest groups through the 1990s.

1975:


The first Multi-User Domain (or Dungeon), MUD1, is goes on-line. Richard Bartle and Roy Trubshaw, two students at the University of Essex, write a program that allows many people to play against each other on-line. MUDs become popular with college students as a means of adventure gaming and for socializing. By 1984, there are more than 100 active MUDs and variants around the world.


1983:

The ARPANET splits into the ARPANET and MILNET.  Due to the success of the ARPANET as a way for researchers in universities and the military to collaborate, it was split into military (MILNET) and civilian (ARPANET) segments.  This was made possible by the adoption of TCP/IP, a networking standard, three years earlier.  The ARPANET was renamed the “Internet” in 1995.

1985:

The modern Internet gained support when the National Science foundation formed the NSFNET, linking five supercomputer centers at Princeton University, Pittsburgh, University of California at San Diego, University of Illinois at Urbana-Champaign, and Cornell University. Soon, several regional networks developed; eventually, the government reassigned pieces of the ARPANET to the NSFNET. The NSF allowed commercial use of the Internet for the first time in 1991, and in 1995, it decommissioned the backbone, leaving the Internet a self-supporting industry.

The NSFNET initially transferred data at 56 kilobits per second, an improvement on the overloaded ARPANET. Traffic continued to increase, though, and in 1987, ARPA awarded Merit Network Inc., IBM, and MCI a contract to expand the Internet by providing access points around the country to a network with a bandwidth of 1.5 megabits per second. In 1992, the network upgraded to T-3 lines, which transmit information at about 45 megabits per second.

1985:


The Whole Earth 'Lectronic Link (WELL) is founded. Stewart Brand and Larry Brilliant started an on-line Bulletin Board System (BBS) to build a “virtual community” of computer users at low cost. Journalists were given free memberships in the early days, leading to many articles about it and helping it grow to thousands of members around the world.



1988:


Robert Morris´ worm flooded the ARPANET. Then-23-year-old Morris, the son of a computer security expert for the National Security Agency, sent a nondestructive worm through the Internet, causing problems for about 6,000 of the 60,000 hosts linked to the network. A researcher at Lawrence Livermore National Laboratory in California discovered the worm. "It was like the Sorcerer´s Apprentice," Dennis Maxwell, then a vice president of SRI, told the Sydney (Australia) Sunday Telegraph at the time. Morris was sentenced to three years of probation, 400 hours of community service, and a fine of $10,050.
Morris, who said he was motivated by boredom, programmed the worm to reproduce itself and computer files and to filter through all the networked computers. The size of the reproduced files eventually became large enough to fill the computers´ memories, disabling them.


1990:


The World Wide Web was born when Tim Berners-Lee, a researcher at CERN, the high-energy physics laboratory in Geneva, developed HyperText Markup Language. HTML, as it is commonly known, allowed the Internet to expand into the World Wide Web, using specifications he developed such as URL (Uniform Resource Locator) and HTTP (HyperText Transfer Protocol). A browser, such as Netscape or Microsoft Internet Explorer, follows links and sends a query to a server, allowing a user to view a site.

Berners-Lee based the World Wide Web on Enquire, a hypertext system he had developed for himself, with the aim of allowing people to work together by combining their knowledge in a global web of hypertext documents. With this idea in mind, Berners-Lee designed the first World Wide Web server and browser — available to the general public in 1991. Berners-Lee founded the W3 Consortium, which coordinates World Wide Web development.



1993:


The Mosaic web browser is released. Mosaic was the first commercial software that allowed graphical access to content on the internet. Designed by Eric Bina and Marc Andreessen at the University of Illinois’s National Center for Supercomputer Applications, Mosaic was originally designed for a Unix system running X-windows. By 1994, Mosaic was available for several other operating systems such as the Mac OS, Windows and AmigaOS.