Web Security Redefined

Banner 468

Facebook
RSS
Announcement! Attention all Users>> Please stop adblock/adblock Plus or edit in whitelist before to complete your Request for download etc.... Admin #rdx#
Showing posts with label Wifi Hacking. Show all posts
Showing posts with label Wifi Hacking. Show all posts

Be safe WIFI users ..!

If you are a WIFI user than u need to protect ur your network from being hacked. Hacking a wifi network is easily done by any person having some knowlegde about networks. It is done by sniffing ur network's packets and decryting it to get the password of ur network.Many different utilities are provided in an open source Operating system called "BACK TRACK" to do all the trick to hack others wifi network and illegally access the network.
Some suggestions to be safe.
The problem is that Microsoft designed Windows XP and Windows Vista to be convenient, especially when connecting via wireless, but convenience in the security world often carries a high price. Of course, it goes almost without saying that you should always have a suite of security applications including antivirus, antispam, and antispyware, as well as a personal firewall installed on your laptop. But to avoid having your laptop connect to the first access point that looks attractive, try these maneuvers:

1) Use a wireless broadband card
Rather than use a public cafe's open wireless, get a wireless broadband account and use your laptop to connect to 3G networks via cell modem. Overall wireless broadband accounts are more secure--it's harder to hack into a cellular call--and, in some cases, more reliable than public 802.11 wireless.

2) Change your home or office default router name
Don't make your laptop vulnerable in the first place. To do this, access your home or office router's firmware (usually this requires typing a specific address into a browser's address bar), then change the default SSID (Linksys, D-Link, Netgear, or the like) to something original (for example, UpUpAndBeyond, or something similar). While you're at it, change the router's default admin ID and password, and enable some form of encryption (WEP, WPA, or WPA2).

3) Disable the Windows networking automatic connect feature

Don't let your laptop connect just anywhere. To do so, right-click your current wireless network connection, click Properties, then click the Wireless Networks tab. Here you'll see a box with all of the last known connections you've made. After each, if it says "automatic," highlight and click properties, then select the connection tab for that network. Uncheck the box labeled "Connect when this network is in range."

The downside is that the next time you fire up your laptop, you won't be connected right away. Instead, you should see a list of available wireless networks. It'll cost you a few seconds to choose one and connect to the right network, but at least you'll know what you're connecting to.

4) Set a MAC address for the routers you know

This won't help with random, open public wireless networks the physical address of which you won't necessarily know, but it will help with home and office connections, particularly if you live or work in a crowded area. Again, if you haven't changed your SSID, how do you know if the Linksys router you're connecting to from the front of your apartment is the one in the back of your apartment, or your neighbor's next door?

5) Turn off the ad hoc connections option
This should already be disabled with most default Windows XP and Vista installations, but you should check anyway.

NEXT >>
[ Read More ]

Wireless Network Hacking | Download Wi-fEye

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDCWVg25lElyLAf6nx3N6Slq7wniMrrEmoI0L312-EWwabLV-u7yZ5qPvomiNCgqODWHvcRFfTFratxvHP5C9i0N7rVs2CcjnNBBoAeveLWk0In2aD2yy_MOZvItdHDKDv8eGVDCUBFSA/s1600/logo.pngNow No need to learn commands to perform wi-fi cracking and other attacks using Backtrack. Here is an interesting tool Wi-fEye designed to help network penetration testing.Wi-fEye will allow you to perform a number of powerful attacks Automatically, all you have to do is to lunch  Wi-fEye, choose which attack to perform,  select your target and let Wi-fEye do the rest !!


 


Features goes as follows: It has Four main sections  1.Cracking menu: This menu will allow you to:
  • Enable monitor mode
  • View avalale Wireless Networks
  • Launch Airodump-ng on a specific AP
  • WEP cracking: this will allow you to perform the following attacks automatically:                                  
    • Interactive packet replay.
    • Fake Authentication Attack.
    • Korek Chopchop Attack.
    • Fragmentation Attack.
    • Hirte Attack (cfrag attack).
    • Wesside-ng.
  • WPA Cracking: This contains the following attacks:
    • Wordlist Attack
    • Rouge AP Attack
2.  Mapping: this menu will allow you to do the following:


  • Scan the network and view the connected hosts.
  • Use Nmap Automatically.
3.  MITM:  this menu will allow you to do the following Automatically:

  • Enable IP forwarding.
  • ARP Spoof.
  • Launch ettercap (Text mode).
  • Sniff SSL/HTTPS traffic.
  • Sniff URLs and send them to browser.
  • Sniff messengers from instant messengers.
  • Sniff images.
  • DNS Spoof.
  • HTTP Session Hijacking (using Hamster).
  4. Others: this menu will allow you to o the following automatically:

  • Change MAC Address.
  • Hijack software updates (using Evilgrade).
Official Site Wi-fEye
                  DOWNLOAD


Disclaimer: The information presented in this post is only for educational purpose.We do not encourage any one to misuse the information.Site and the author is not responsible any illegitimate use for the information.



[ Read More ]

Automatic HTTPS/SSL bypass using Wi-fEye (using sslstrip)

This video shows how to bypass https using Wi-fEye.
All you have to do is choose the target then Wi-fEye will ARP-spoof this target ,set an ip-tables rule to redirect the packages from port 80 to 10000, and starts sslstrip.





[ Read More ]

Cracking WPA/WPA2 using reaver

Ok so this method is not new its been around for more than a year now , but since I never updated Wi-fEye for more than a year it doesn’t contain this attack , so while I was making a module to do this attack automatically I thought it might be a good idea to explain how to do it manually first.
Using reaver we don’t need any clients to be connected to the target network , we also don’t need to use a dictionary to brute force the WPA/WPA2 key,  This method depends on brute forcing  the WPS pin for the network , therefore it will only work on networks that use WPS pins. Cracking a WPS pin is much more easier than cracking a WPA or a WPA2 key as WPS pins only contain numbers , therefore using brute force its a matter of time (up to 10 hours) till we guess the correct pin , once we have the pin reaver can retrieve the WPA or WPA2 key from it.


[ Read More ]

3 ways to fix the fixed channel: -1 issue

http://z0o0z.files.wordpress.com/2013/01/fixed-channel.jpg
 fixed-channel:-1

Yesterday while I was working on the new version of Wi-fEye , I found out that every time I try to use airodump-ng I get the ‘mon0: fixed channel -1′ error message , now this is a very popular one , and there are a few ways to get around it , in the past to get around this I usually set the channel when I enable monitor mode , so instead of running

airmon-ng start [interface]

execute

airmon-ng start [interface] [target-AP-channel]

For example if your network interface is wlan0 and the target AP is running on channel 6 then the command would be

airmon-ng start wlan0 6

This unfortunately didn’t work on ubuntu 12.04 , so I decided to set the channel and enable monitor mode manually without airmon-ng. 

iwconfig [interface] channel [target-channel]
 ifconfig [interface] down
 iwconfig [interface] mode monitor
 ifconfig [interface] up

This – sort of – did the trick , when I say sort of i mean the error message is gone , I can run airodump-ng successfully on any AP with no problems , I can assotiate with APs successfully as well , even the injection test (airmon-ng -9 wlan0) tells my that injection is working , but when I actually try to inject packets it doesn’t work :S.
At this stage I was out of ideas and had to ask google , after some googlig I decided to patch my kernel but before that I thought it could be a good idea to search for compat wireless , so I did and it was a good idea indeed.
first check you kernel version:

uname -r

then install the relevant compat wireless package from the software center or using apt-get.
Then I restarted my system and BOOM , injection is working perfectly.

Now all of these ways have worked for me at some stage (depending on the kernel , the linux distro and the wifi card) , so if you are stuck with the same problem try them all and see what works for you.


 
[ Read More ]

Get Access to your college wireless network

WirelessKeyView recovers all wireless network security keys/passwords (WEP/WPA) stored in your computer by the 'Wireless Zero Configuration' service of Windows XP and by the 'WLAN AutoConfig' service of Windows Vista. It allows you to easily save all keys to text/html/xml file, or copy a single key to the clipboard.

System Requirement

  • Windows XP with SP1 or greater.
  • You must login to windows with admin user.

Using WirelessKeyView

WirelessKeyView doesn't require any installation process or additional DLL files. Just copy the executable file (WirelessKeyView.exe) to any folder you like, and run it.

After you run it, the main window should displayed all WEP/WPA keys stored in your computer by Windows 'Wireless Zero Configuration' service. For WEP keys, the key is also displayed in Ascii form. Be aware that this utility can only reveal the network keys stored by Windows operating system. It cannot recover network keys stored by any other third-party software.

Notice About WPA-PSK Keys

When you type a WPA-PSK key in Windows XP, the characters that you type are automatically converted into a new binary key that contains 32 bytes (64 Hexadecimal digits). This binary key cannot instantly be converted back to the original key that you typed, but you can still use it for connecting the wireless network exactly like the original key. In this case, WirelessKeyView displays this binary key in the Hex key column, but it doesn't display the original key that you typed.
As opposed to Windows XP, Windows Vista doesn't convert the WPA-PSK Key that you type into a new binary key, but it simply keep the original key that you type. So under Windows Vista, the original WPA-PSK key that you typed is displayed in the Ascii key column.

Registry/File Location of The Stored Keys

Windows XP and Windows Vista stores the wireless keys in completely different locations:
  • Windows XP: The wireless keys are stored in the Registry under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WZCSVC\Parameters\Interfaces\[Interface Guid].
  • Windows Vista: The wireless keys are stored in the file system, under c:\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\[Interface Guid]. The encrypted keys are stored in .xml file.

Deleting Wireless Keys Of Old Network Adapters

Starting from version 1.15 of WirelessKeyView, you can delete wireless keys/passwords of old network adapters that are no longer plugged to your computer, by using the 'Delete Selected Items' option.
Be aware that this delete option only works for network adapters that are not active anymore. If your network adapter is active, use the standard user interface of Windows to delete the unwanted keys.

Using this utility on Windows 7

Starting from Windows 7, Microsoft changed the encryption and hashing algorithms that are used by the Windows Data Protection (DPAPI) system. This change also affects the encryption of the wireless keys stored by Windows, and thus WirelessKeyView failed to retrieve the wireless keys under Windows 7.
The research and development of a new code that will decrypt the keys of Windows 7 may take a while. So for now, I added a workaround that will allow Windows 7 users to retrieve their wireless keys. This workaround uses an old method of code infection that I used until version 1.25 and it still works properly under Windows 7. This method has one drawback that you should be aware: In some circumstances, it may crash the lsass.exe process and will require your system to restart.
In order to use this code injection method under Windows 7, go to 'Advanced Options' (F9), and choose the 'Use code injection method' option. 

Translating WirelessKeyView to other languages

In order to translate WirelessKeyView to other language, follow the instructions below:
  1. Run WirelessKeyView with /savelangfile parameter:
    WirelessKeyView.exe /savelangfile
    A file named WirelessKeyView_lng.ini will be created in the folder of WirelessKeyView utility.
  2. Open the created language file in Notepad or in any other text editor.
  3. Translate all string entries to the desired language. Optionally, you can also add your name and/or a link to your Web site. (TranslatorName and TranslatorURL values) If you add this information, it'll be used in the 'About' window.
  4. After you finish the translation, Run WirelessKeyView, and all translated strings will be loaded from the language file.
    If you want to run WirelessKeyView without the translation, simply rename the language file, or move it to another folder. 
                                                               DOWNLOAD






                                                                        
[ Read More ]