Showing posts with label Hack. Show all posts
Showing posts with label Hack. Show all posts

Sunday, February 28, 2016

HOW TO HACK WIFI WPA2-PSK PASSWORD IN WINDOWS



How to hack Facebook Account?? How to hack WiFi On Windows and On Mobile?? Etc... These are very Common Questions Searched by people over internet.There are alot of Tutorials about them some Tutorials are Failed other Ones are not work properly.Ater Some posts on KAli LINUX 2.0,i'm gona write a post on Window OS . So guys Today I'm Gona show you HOw to Hack wifi Wpa2-psk on windows.This tutorial is not Fake.It is tested by me i'm 101% sure that this tutorial will work.So lets Start...:D

Requirements:
  •  CommView for Wifi (Download)
  •  Elcomsoft Wireless Security Auditor (Download)
CommView for Wifi is a FREE Tool with help of ths Tool we will be able to Capture WPA- HANDSHAKE from our target Network.
 Elcomsoft Wireless Security Auditor is a paid tool i have its Professional version.I did'nt use its FREE trail EDITION so i'm not sure about it either it works or not.

Step 1:
 Download both of the tools and install it on your windows PC.i'm Gona crack wiFi network named Ultimate.Whatever in your case but in mY case it is Ultimate.

Step 2:
Open CommView For WiFi to Capture WPA-HANDSHAKE .For this go to uper left side of CommView window and Click on START option.

Step 3:
A new Window will pop up in this Click  on Capture to start capturing Handshake.it will show you all Available AP.

Step 4:
 NOW go to uper Bar of CommView and Click on TOOLS then Select Node Reassoication (If its not working then use (ALFA External Adapter for WiFi).


Step 5:
Select Your Target in "Send a Deauthentication request this Ap:" it will show us all Clients which are available.


Step 6:
Now Click on "SEND NOW".To send Packets for Authentication.it will take some time to capture the packets.

Step 7:
Go to uper bar of CommView and click on SaVe .Then choose Your file Format Commview Capture Files (*.ncf).your Packet caputring is Done.

Step 8:
Now its time to open the second tool Elcomsoft Wireless Security Auditor to carck our PASSWORD.Open it and go to "Import Data".Then select "Import CommView LOg" or Simply Press "Ctrl+v".
/>
Read Full Post

Sunday, February 21, 2016

Ethical Hacking CEH v9

The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.
Read more...   About EC-Council
This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

This is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers​.




REAL LIFE SCENARIO:-

The security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.


Download CEH v9 PDF’s

Download CEH v9 Tools


CEH Certified Ethical Hacker V9 Module PDF : Download Google Drive
CEHv9 Module 00 unlocked
CEHv9 Module 01 Introduction to Ethical Hacking
CEHv9 Module 02 Footprinting and Reconnaissance
CEHv9 Module 03 Scanning Networks
CEHv9 Module 04 Enumeration
CEHv9 Module 05 System Hacking
CEHv9 Module 06 Malware Threats
CEHv9 Module 07 Sniffing
CEHv9 Module 08 Social Engineering
CEHv9 Module 09 Denial-of-Service
CEHv9 Module 10 Session Hijacking
CEHv9 Module 11 Hacking Webservers
CEHv9 Module 12 Hacking Web Applications
CEHv9 Module 13 SQL Injection
CEHv9 Module 14 Hacking Wireless Networks
CEHv9 Module 15 Hacking Mobile Platforms
CEHv9 Module 16 Evading IDS, Firewalls, and Honeypots
CEHv9 Module 17 Cloud Computing
CEHv9 Module 18 Cryptography
/>
Read Full Post

Linux Mint ISos Hacked

Absolute security is a myth. And this has been proved once again with Linux Mint website being hacked.

Yes, one of the most popular Linux distribution, Linux Mint was attacked recently. Hackers managed to hack the website and replace the download links of some Linux Mint ISOs to their own, modified ISOs with a backdoor in it. Users who downloaded these compromised ISOs are at risk of hacking attacks.

How was Linux Mint hacked?

As per the information available at present, attackers got hold of the ISOs through WordPress. Linux  Mint uses the Open Source CMS WordPress for its website. “The breach was made via WordPress. From there they got a www-data shell”.

Once they entered the website, they changed the download links to point it to a server in Bulgaria where the compromised Linux Mint ISOs with backdoor were served to unsuspecting users.

Don’t panic!

Don’t panic. Not just now. The hacking attack has compromised ISOs but not all of them.

Only Linux Mint 17.3 Cinnamon edition ISOs that were downloaded on 20th February are the victim. Rest are fine, assured Linux Mint. That too, when you downloaded directly from the website. If you used a torrent, you should be safe.

Though Linux Mint says that only Cinnamon editions should be impacted, as a precautionary measure, I suggest that all the Linux Mint ISOs downloaded after 18 February 2016 must be checked (explained later in the next section) to know if it’s been compromised or not.

If you downloaded Linux Mint ISO after 19 Feb, you are at risk. #LinuxMintHacked
CLICK TO TWEET
Check if your Linux Mint has been compromised or not?

If you still have the ISO, you should run a md5 checksum with the following command:

md5sum path_to_iso
In the end of this check, you should see a random number. Match them against their respective versions using the table below:

6e7f7e03500747c6c3bfece2c9c8394f  linuxmint-17.3-cinnamon-32bit.iso
e71a2aad8b58605e906dbea444dc4983  linuxmint-17.3-cinnamon-64bit.iso
30fef1aa1134c5f3778c77c4417f7238  linuxmint-17.3-cinnamon-nocodecs-32bit.iso
3406350a87c201cdca0927b1bc7c2ccd  linuxmint-17.3-cinnamon-nocodecs-64bit.iso
df38af96e99726bb0a1ef3e5cd47563d  linuxmint-17.3-cinnamon-oem-64bit.iso
If the checksum doesn’t match with its corresponding edition, you have a compromised ISO.

Don’t have ISO anymore but have a live USB/disk?

If you have a live USB or disk still with you, load the live session and run the following command in a terminal:

sudo ls -l /var/lib/man.cy
If it doesn’t find the file, you are good. But if it finds the file, you have a compromised ISO.

What if you have the compromised ISO?

Get rid of the ISO. If you burnt it to DVD, trash the disc. If you used it on USB, do a full format of the USB stick.

If you have installed this ISO on a computer:

Put the system offline.
Backup your personal data, if any.
Reinstall the OS (with an uncompromised ISO) or format the partition (if you are dual booting).
Change your passwords for important websites such as your email, Facebook etc
How is Linux Mint handling this issue?

At the time of writing this article, Linux Mint website is down. No downloads are available for now.

Linux Mint team is backtracking the hackers and have found that the hacked ISOs are hosted on 5.104.175.212 and the backdoor connects to absentvodka.com. Both of these lead to Sofia, Bulgaria, and the name of 3 people over there.

Linux Mint stated:

We don’t know their roles (those 3 people who are linked to the IP) in this, but if we ask for an investigation, this is where it will start.

What we don’t know is the motivation behind this attack. If more efforts are made to attack our project and if the goal is to hurt us, we’ll get in touch with authorities and security firms to confront the people behind this.

What next?

We need to wait and watch until the dust settles. This is a huge setback to the reputation of Linux Mint. But Linux Mint is not the first one to fall prey to the hackers. A few years back, Ubuntu Forums was hacked and the all user credentials were stolen.

In the cyber world, such attacks are not uncommon. I hope that Linux Mint takes control of the situation and focus more on the security.

Meanwhile, have you been impacted with the malicious backdoor? What are your views on the entire Linux Mint hacking episode?/>
Read Full Post

Twitter Delicious Facebook Digg Stumbleupon Favorites More