Tampilkan postingan dengan label Backtrak. Tampilkan semua postingan
Tampilkan postingan dengan label Backtrak. Tampilkan semua postingan

Jumat, 16 November 2012

0 Tutorial: How to Crack WPA/WPA2

This tutorial walks you through cracking WPA/WPA2 networks which use pre-shared keys. I recommend you do some background reading to better understand what WPA/WPA2 is. The Wiki links page has a WPA/WPA2 section. The best document describing WPA is Wi-Fi Security - WEP, WPA and WPA2. This is the link to download the PDF directly. The WPA Packet Capture Explained tutorial is a companion to this tutorial.

0 The basics of installing Backtrack 5R2 for the purposes of secure remote access.

So you are finally realizing how far behind the times you are and want to experiment with Backtrack. Better late than never :) With the new release of Backtrack 5 R2, they have not included a VMware image like in previous versions. So you have either two options, boot in live mode and lose changes and settings upon each boot-up cycle, or you can install backtrack to a partition on your machine. Now both have their pros and cons like everything else in the world, however this article is to help those out there who are opting to install to a partition. This is a great option if you want to have a Backtrack box always up and waiting to wreak network havoc with a remote install of backtrack that you can always connect to. I have a Backtrack box up that I access remotely if I want to do some testing and don’t want to boot up an image and go through all the hassle of setting the entire thing up, I just SSH into the box and do what I need to do. This article is help you securely setup your Backtrack box so that it can be accessed remotely from any computer that sits on the same subnet.

1 Cyber criminals are mass producing attack techniques, says Verizon

A recent post on The Inquirer had me facepalming pretty hard. According to Verizon cyber criminals are focusing on attacking small and medium sized businesses using automated scripts that exploit vulnerabilities in the same exact way every time. No shit, sherlock…
Using automated “scan & pwn” styled scripts is nothing new; people have been using them since the dawn of friggen time. It started with just supplying google dorks with your vulnerabilities and led to completely automated tools such as Mass Defacers and the like. Currently we have tools such as Metasploit which interface with nmap scans to help automate the attacking of network services and even some of the more popular web applications. Why then is Verizon acting like this is something new when these are the same exact attacks we have been seeing for years? Is Verizon behind the times? The recent infographic released by Verizon (link here: https://s3.amazonaws.com/infographics/Worst-IT-Security-Breaches-800.png ) was supposed to give insight into the attacks Verizon was recently seeing. After reading this post about Verizon just catching up with the “scan & pwn” styled attacks makes me wonder just how skewed this infographic really is and if it is even a reputable source.

1 Hacking Facebook ,Gmail account using Backtrack and SET

Hello, friends i am back with a latest post on hacking facebook,gmail accounts using backtrack and social engineering kit.Things you needed are following:---> 1. Backtrack 5 R2 2. Internet connection 3. A brain Now follow all my steps like i am showing in this post:----->



1. First open the social engineering kit using this command in cd /pentest/exploits/set and then press enter and then type ./set and hit enter like in image.

2. Now type 1 to select Social-Engineering Attacks and hit enter as in image.


3. Now type 2 to select Website Attack Vectors and hit enter as in image.
 
4. Now type 4 to select Tabnabbing Attack Method and hit enter.


5. Now type 2 to select Site Cloner and hit enter.


6. Now enter the site address whom which you want to create fake pages.


7. Now ti will start cloning the site. 8. Now send ur ip address as a link to victim.


9. Now when victim click on it he/she get the fake page and when he fill the details he will got hacked. Note : its for educational purpose.
 

Cracker Copyright © 2011 - |- Template created by O Pregador - |- Powered by Blogger Templates