This tutorial walks you through cracking WPA/WPA2 networks which use
pre-shared keys. I recommend you do some background reading to better
understand what WPA/WPA2 is. The Wiki links page has a WPA/WPA2 section. The best document describing WPA is Wi-Fi Security - WEP, WPA and WPA2. This is the link to download the PDF directly. The WPA Packet Capture Explained tutorial is a companion to this tutorial.
Tampilkan postingan dengan label Backtrak. Tampilkan semua postingan
Tampilkan postingan dengan label Backtrak. Tampilkan semua postingan
Jumat, 16 November 2012
0 The basics of installing Backtrack 5R2 for the purposes of secure remote access.
So you are finally realizing how far behind the times you are and want to experiment with Backtrack. Better late than never
With the new release of Backtrack 5 R2, they have not included a
VMware image like in previous versions. So you have either two options,
boot in live mode and lose changes and settings upon each boot-up cycle,
or you can install backtrack to a partition on your machine. Now both
have their pros and cons like everything else in the world, however this
article is to help those out there who are opting to install to a
partition. This is a great option if you want to have a Backtrack box
always up and waiting to wreak network havoc with a remote install of
backtrack that you can always connect to. I have a Backtrack box up that
I access remotely if I want to do some testing and don’t want to boot
up an image and go through all the hassle of setting the entire thing
up, I just SSH into the box and do what I need to do. This article is
help you securely setup your Backtrack box so that it can be accessed
remotely from any computer that sits on the same subnet.

1 Cyber criminals are mass producing attack techniques, says Verizon
A recent post on The Inquirer
had me facepalming pretty hard. According to Verizon cyber criminals
are focusing on attacking small and medium sized businesses using
automated scripts that exploit vulnerabilities in the same exact way
every time. No shit, sherlock…
Using automated “scan & pwn” styled scripts is nothing new;
people have been using them since the dawn of friggen time. It started
with just supplying google dorks with your vulnerabilities and led to
completely automated tools such as Mass Defacers and the like. Currently
we have tools such as Metasploit which interface with nmap scans to
help automate the attacking of network services and even some of the
more popular web applications. Why then is Verizon acting like this is
something new when these are the same exact attacks we have been seeing
for years? Is Verizon behind the times? The recent infographic released
by Verizon (link here:
https://s3.amazonaws.com/infographics/Worst-IT-Security-Breaches-800.png
) was supposed to give insight into the attacks Verizon was recently
seeing. After reading this post about Verizon just catching up with the
“scan & pwn” styled attacks makes me wonder just how skewed this
infographic really is and if it is even a reputable source.
1 Hacking Facebook ,Gmail account using Backtrack and SET
Hello, friends i am back with a latest post on hacking facebook,gmail
accounts using backtrack and social engineering kit.Things you needed
are following:--->
1. Backtrack 5 R2
2. Internet connection
3. A brain
Now follow all my steps like i am showing in this post:----->
1. First open the social engineering kit using this command in cd /pentest/exploits/set and then press enter and then type ./set and hit enter like in image.
2. Now type 1 to select Social-Engineering Attacks and hit enter as in image.
4. Now type 4 to select Tabnabbing Attack Method and hit enter.
5. Now type 2 to select Site Cloner and hit enter.
6. Now enter the site address whom which you want to create fake pages.
7. Now ti will start cloning the site.
8. Now send ur ip address as a link to victim.
9. Now when victim click on it he/she get the fake page and when he fill the details he will got hacked.
Note : its for educational purpose.
3. Now type 2 to select Website Attack Vectors and hit enter as in image.
Langganan:
Postingan (Atom)