Hack Wireless Connection For Moderate Users.

Tuesday 27 March 2012


Doesn't it suck when you see your laptop’s catching so many wi-fi signals but none of them is accessible.. don’t you feel like “I wish I could some how break the password and dive into the deep oceans of the information” I beleive everyone should be able to have free internet. If someday I make it big enough and I’ll be having ample money.. I promise I’ll provide free wifi hotspots all over the places.. “Let there be INTERNET”.. even If I don’t get rich.. I’ll become a politician and would make Internet a Fundemental right to every citizen.. Now that would be something..
That’s enough with the Castles in the air.. now lets get back to reality..
What I can do for you right now is that I can tell you how to hack a wi-fi network to access Internet.. Some would call it stealing.. some like me won’t..
I’ll call it Sharing.. Sharing is what on which the whole Internet is build upon…
So.. Here’s how we do it..

1) First we need to scan for available wireless networks.
Theres this great tool for windows to do this.. called “NetStumbler” or Kismet forWindows and Linux and KisMac for Mac
It’ll also show how the Wi-fi network is secured..
The two most common encryption types are:
1. WEP
2. WAP
WEP i.e Wire Equivalent Privacy is not consideres as safe as WAP i.e Wireless Application Protocol.
WEP have many flaws that allows a hacker to crack a WEP key easily.. whereas
WAP is currently the most secure and best option to secure a wi-fi network..
It can’t be easily cracked as WEP because the only way to retreive a WAP key is to use a brute-force attack or dictionary atack.
Here I’ll tell you how to Crack WEP
To crack WEP we will be using Live Linux distribution called BackTrack to crack WEP.
BackTrack have lots of preinstalled softwares for this very purpose..
The tools we will be using on Backtrack are:
Kismet – a wireless network detector
airodump – captures packets from a wireless router
aireplay – forges ARP requests
aircrack – decrypts the WEP keys
1. First of all we have to find a wireless access point along with its bssid, essid and channel number. To do this we will run kismet by opening up the terminal and typing in kismet. It may ask you for the appropriate adapter which in my case is ath0. You can see your device’s name by typing in the command iwconfig.
2. To be able to do some of the later things, your wireless adapter must be put intomonitor mode. Kismet automatically does this and as long as you keep it open, your wireless adapter will stay in monitor mode.
3. In kismet you will see the flags Y/N/0. Each one stands for a different type of encryption. In our case we will be looking for access points with the WEP encryption. Y=WEP N=OPEN 0=OTHER(usually WAP).

4. Once you find an access point, open a text document and paste in the networks broadcast name (essid), its mac address (bssid) and its channel number. To get the above information, use the arrow keys to select an access point and hit <ENTER> to get more information about it.
5. The next step is to start collecting data from the access point with airodump. Open up a new terminal and start airodump by typing in the command:
airodump-ng -c [channel#] -w [filename] –bssid [bssid] [device]
In the above command airodump-ng starts the program, the channel of your access point goes after -c , the file you wish to output the data goes after -w , and the MAC address of the access point goes after –bssid. The command ends with the device name. Make sure to leave out the brackets.
6. Leave the above running and open another terminal. Next we will generate some fake packets to the target access point so that the speed of the data output will increase. Put in the following command:
aireplay-ng -1 0 -a [bssid] -h 00:11:22:33:44:55:66 -e [essid] [device]
In the above command we are using the airplay-ng program. The -1 tells the program the specific attack we wish to use which in this case is fake authentication with the access point. The 0 cites the delay between attacks, -a is the MAC address of the target access point, -h is your wireless adapters MAC address, -e is the name (essid) of the target access point, and the command ends with the your wireless adapters device name.
7. Now, we will force the target access point to send out a huge amount of packets that we will be able to take advantage of by using them to attempt to crack the WEP key. Once the following command is executed, check your airodump-ng terminal and you should see theARP packet count to start to increase. The command is:
aireplay-ng -3 -b [bssid] -h 00:11:22:33:44:5:66 [device]
In this command, the -3 tells the program the specific type of attack which in this case is packet injection, -b is the MAC address of the target access point-h is your wireless adapters MAC address, and the wireless adapter device name goes at the end.
8. Once you have collected around 50k-500k packets, you may begin the attempt to break the WEP key. The command to begin the cracking process is:
aircrack-ng -a 1 -b [bssid] -n 128 [filename].ivs
In this command the -a 1 forces the program into the WEP attack mode, the -b is the targetsMAC address, and the -n 128 tells the program the WEP key length. If you don’t know the -n, then leave it out. This should crack the WEP key within seconds. The more packets you capture, the bigger chance you have of cracking the WEP key.
I am sure it would have helped. :)

Hack WI-FI by Software - Easiest Way.

You surely have many wifi networks around your location, with most of them howeverbeing locked. You might want to recover your own wifi network’s forgotten password, or hack someone else’s wifi network, for any reason. We provide the way to unlock any network you want.
–Our Wifi ReHacker is offered free of charge, for a limited time only so hurry up!
It is guaranteed to work, no matter what protection or encryption your target wireless network has: you can hack WEP, WPA, WPA2 or even WPA2 enteprise that requires a username and password combination.
Download Here

How to Hack Wifi networks:

1. Download and install our software

2. Select the network you want to hack

3. That’s it!

For the first time in history, it’s so easy to hack a wifi network.With ReHacker you are guaranteed to hack wifi network passwords in a matter of seconds, without the need to use complicated i hacking software like BackTrack or aircrack, kismet, etc. Only with a click of your mouse, you can within seconds hack any wifi network, router or access point you want. You can even apply this guide to Ad-Hoc networks.
Our special offer will last only for a few days, as an offer to our loyal users. Download the wifi hack program now for FREE, before the limited trial period is over.

Top Online Security Providers for your browser and free online scan.


Computer security is of foremost importance these days even more than our physical security..lol.There are few online tools available through which we ensure our security to certain extent.We cannot say our PC will be 100% secure but to some extent we will be benefited  for sure.
File scanner:

1.Kaspersky:
It can used to scan files upto size 1mb and archieve file(zip,arj format etc) upto 1mb.The database is updated every 3 hours to ensure that newest virus are detected.


2.Avast:
Here you can scan a single file each time and that should not be more than 16mb.


3.VirusTotal:
Here you can scan a file upto 20mb.You can send file by SSL and via email also.


4.NovirusThanks:
Here you can scan file upto 20mb,where the file will be scanned by 24 antivirus engine and is one of the best online scanning tool.


System scanner:

1.Bitdefender:
It can scan your PC ,system memory,boot sector.It can be used without uninstalling the existing security product.


2.Symantec(Norton):
It can be used to scan the system.It is the one of the old Anti-virus company and easy to use.


3.Eset:
Administrative previleges is required to use this online scanner.It is user friendly and operates from the browser.


4.PandaSecurity:
You need the activex control to use this online tool.It is a good product from panda.

Browser scanner:

1.Qualys:
You need to install the required plugin to use this tool.It checks for vulnerability and issues in the browser.


2.BrowserScope:
It scans for browser functionality and issues.


3.Scanit:
It will scan the browser for issues and vulnerabilites.You need to close all other tabs before using it and enable persistent cookies.


4.Panopticlick:
It test your browser and give scores for uniqueness and trackable functionality.

Url scanner:

1.UrlVoid:
It scans the url with multiple antivirus engine.It is simple to use.


2.Avg:
Just copy and drop the suspicious url and press enter.


3.VirusTotal:
It is a simple tool to use as the file scanner of it.


4.OnlineLinkscan:
It scan the link from potential threats with a simple click.

Port scanner:

1.T1shopper:
It scans the Ipaddress for open ports.There is a list of some essential ports on the webpage.


2.Nmap:
It is one of the best port scanning tool and easy to use.


3.SubnetOnline:
It scans an Ipaddress for open and closed TCP ports.


4.AuditmyPc:
Here you can scan for ports to test the strength of your firewall.


5.Hashmian:
It provide a range of ports to scan and list of some essential ports.


If you find this post useful and interesting then do drop your comment.,it will be appreciated.. :)

10 Essential Hacking Book


1.Hacking Exposed 6:This is one of the best  international selling book on computer security as it covers all the spheres of hacking and security like system hacking,network hacking,software hacking,windows hacks,counter measures to prevent the expliotation on Unix systems,new web hacking tools,updated footprinting.The most effective part of  this book is its case studies.
(READ  HERE  ONLINE)

2.The Hacker's Underground Handbook:This is one of the best book i will recommend for the noobs.It covers all the feature and fields of hacking in a well explained and explicit manner with examples.This book can inspire a person to pursue a career on ethical hacking.This book will makes person familiar with the hackers frame of mind and the way he/she thinks.
  (VISIT HERE)


3.Spunkins Viruses Revealed:This is a very nice book which covers A-Z of virus and malwares.After reading this book a person will get  a fundamental and practial idea about malwares(a must read one).
(DOWNLOAD)

4.Networking Bible:It covers A-Z  one may need to maintain and setup networks.It has step-by-step guide to networking ,different architectures and hardware to security, diagnostics, Web services, and much more

(READ HERE ONLINE)

5.The Art of Deception:In this book Kevin Mitnik(hacker turned security consultant) has depicted how a person and companies are vulnerable to social engineering.Here in this book he has elaborated the concepts with few real life examples so,one will find this book very interesting.
(VISIT HERE)

6.Secrets of super hacker:This is one of the finest book on hacking available online.It contains detail illustration of the techniques used by hackers like data stealing,guessing password,Social engineering,Reverse Social engineering,Virus,worms,fake emails....etc.
(READ HERE ONLINE)


7.Counter Hack Reloaded:This book is of great help to ensure network security and take valid and effective counter measures against attack.By reading this book one can understand how to respond to diffeerent forms of web attack  in both Unix/Linux and  Windows environment.
(READ HERE ONLINE)

8.Byte of Python:Python is a very easy to learn language if someone has little bit know how about programming.This book is written in a very easy to learn manner by Mr.Swaroop.This book is being used as an instructional material in various educational institution like Havard,Boston,California University etc.It is even used in NASA in their Jet Propultion Laboratory.


(DOWNLOAD)

9.Linux Newbie Administrator Guide:This book covers the basic essentials of linux and its intallation explained in an easy step wise manner.It also explains why we need linux? how it is differerent from windows?and how linux ensures security of our PC.


(DOWNLOAD)

10.HTML & XHTML: The Complete Reference (Osborne):This is one of the best book on HTML & XHTML.By reading this book one can learn step by step procedure on how to construct  webpage,learn standard markups,improve layouts with CSS etc...

(READ HERE ONLINE)

I  feel the above mentioned books are quite  essential in learning the basics and fundamentals of hacking and computer security.What ever we learn  or how much we learn  about hacking it is still a vast ocean,there are chances that we may miss a trick so,keep reading as much books as you can and the most important thing is to implement it practically by practical i mean in an ethical way....because "Compufreaks" condemns  Black Hat.


Note:Some download link are not provided because it may result in some legal problem so,anyone need the link for Downloading the books can drop a comment here with Email-Id  orcontact us.

Fast-Track Tutorial For Beginners.



Step 1.
Boot backtrack and open a shell console and change the directory to " cd /pentest/exploits " and
type "python setup.py install" to check if fast-track has all dependancies install so that it will download from online as shown below.
Step 2.
Now type "python fask-track.py" inorder to select the desired interactive mode.Here I have selected the menu driven mode (./fast-track.py -i) as in this discussion we will be using that.
Step 3.
Now as I got the menu for fast-track usage in the screen, I selected no.6 that is "Payload Generator" as shown in the image below.
Step 4.
Now in this step we have to select the type of payload from the given menu,here I have selected "Reverse_Tcp Meterpreter" that is no.2 as shown in the image below.
Step 5.
Now we need to encode our payload inorder to bypass the AV ,here we have selected no.2 as shown in the image below.
Step 6.
Now we need to enter the host IpAddress and the desired port.Then select the form of payload that is "executable" or "shellcode" as shown in the image below.
Step 7.
As you can see the payload is being saved in .txt format so,we can get the shellcode from it.If we would have choosen the "executable" format then a .exe file would have been created.

Step 8.
If the .exe file is run in the victim's box and we have setup a listener then we can get the meterpreter seesion on our desktop as shown in the image below.
 

Information Vulnerability in Everyday Life - Are You Safe?


One day in my Networking class my teacher asked us how many of us had flash drives - Almost everyone raised their hands. He then asked how many encrypted their flash drives - Almost no one raised their hands. He followed this up by calling us all stupid and recounting a story in which he happened upon a flash drive a year prior. In an attempt to determine the owner he went to check the files for a name, and ended up finding the student&#039;s resume with all of their personal information on it. He said it was incredible and terrifying how easy it could be to find information on someone.

A few days later I decided to do him one better. I work as a cashier at a supermarket, and realized that it is a very easy thing to do just to pick up information on people when ringing up their orders. I spent my entire last shift listing the different pieces of information that I could gather on one person, and here are the results I came up with:


The store uses one of those "Club Cards" for customers to get deals. Right off the bat I know your name from the moment you scan that card. If you forget it at home, the store can use your phone number to look up the card, and then it lists some information for us to quiz you on to confirm that it is your card. So, just by looking up your card I now know your name , your address (Street, State, City and Zip Code, your phone number, your Club Card Number, and well as the names of every relative also registered to that phone number. All of this just from looking up your Club Card if you forget it. Even better, if looking up the phone number doesn&#039;t successfully find the card, the next step in the procedure is to take your driver&#039;s license and use that information to find your card. You can fill in the blanks there.

In addition to that, if I have access to a store computer, I can use the Club Card Number to look up all of that and even more information, including your email address, your date of birth, and even yourdriver&#039;s license number. But as long as you keep remembering your card you&#039;re safe, right? I can&#039;t look up the information on your card without the card number after all.

Well, how many of you tell the cashier to throw out the receipt for you or to just keep it? By doing that you are also leaving them with information. From the receipt I can get your club card number, the store you shop at, your shopping habitshow much money you normally spend and, depending on the method of payment, how much money you keep in your checking account. And because the receipt has the club card number, I have all of the information that goes with that as well.

Methods of paying other than cash can be risky as well. If a Credit Card fails to scan in the register&#039;s terminal three times in a row, the cashier needs to enter the number in manually - meaning that I now have access to your name and your credit card number. Same goes for your debit card number. If you pay with a check, just by reading the front of it I can gather your name, your spouse&#039;s name, youraddress, your bank, and sometimes depending on the check your phone number.

The important thing to remember is that a lot of important information is right there in the open. Any person who is paying enough attention can notice these things and piece them together properly. 

Other things that I managed to pick up just from watching people weren&#039;t necessarily related to the job itself. If you have a lot of key chain sized membership cards to different stores, I could make a mentalcatalog of where you shop. Also, if you like to stop by the store to pick up a drink or snack before/after you go to work, be careful about your uniform. Just by coming in ready for work I now know where you work, and if you have a name badge your name and your work position.

Other things to keep an eye out for are military pins to see any military history or affiliation, rings to see your marital status, or medical bracelets to see any allergies or medical conditions (also if you are buying prescription drugs). One gentleman that day actually had a necklace with his horoscope on it as well. Crosses or other religious jewelery/items can show what religion you are a part of. 


Some of this information seems completely harmless on its own, but just look at them all together. Whether it&#039;s for stalking, identity theft, or anything else like that, I just managed to create a strong profile on you, based on casual things that you do every week - Going to the store, looking up your card, and paying for your groceries. 

There are two things that I want everyone to take away from this article.

1.) Play your cards close to your chest, because there is a lot of sensitive information about you that can be very easy to obtain.

2.) Keep your eyes and mind open, because you never know when something useful will just be staring you in the face. 


Remember: "God gave us two eyes, two ears and one mouth, so that we may listen twice as much as we speak."

Refill Your Prescriptions by Scanning Your Bottle’s Barcode with Your Phone


Barcode


Refill Your Prescriptions by Scanning Your Bottle’s Barcode with Your Phone

iOS/Android: If you have a monthly prescription medication, you no longer need to call in your refills manually. Just download your Rite Aid, Walgreens, or CVS smartphone app, scan your barcode, and pick it up when you're ready.
We caught wind of this cool feature when Android Police reported on Rite Aid's new Android app, but it turns out Walgreens and CVS have had similar apps for awhile. Apart from finding the nearest pharmacy and providing you with weekly deals, each app has a very cool "refill by scan" feature in which you just grab your empty pill bottle, scan the barcode, and get an email, call, or text message when it's ready to go. Hit the links below to check out each pharmacy's respective apps.
The Rite Aid, Walgreens, and CVS apps are all free downloads for iOS and Android.