Posts

Showing posts with the label Kali

Ultimate Kali Hacking Suite [Facebook and WiFi Hacked]

Image
Hello All,                   Today we will see Ultimate Kali Hacking New Updated Posts on Wifi Hack & Other. 1. Hack WPA/WPA2 WPS - Reaver - Kali Linux 2. Speeding Up WEP Hacking : ARP request replay attack 3. Hacking WPA/WPA2 without dictionary/bruteforce : Fluxion 4. Hack WPA/WPA2 PSK Capturing the Handshake 5. WPA/WPA2 cracking using Dictionary attack with Aircrack-ng 6. Social Engineering Toolkit - Kali : Credential Harvestor : Hack Facebook 7. How to hack facebook using kali linux : CREDENTIALS HARVESTER ATTACK 8. Credential Harvestor : Port Forwarding : Phishing Facebook 9. Hack Facebook : Things You Should Know 10. Kali Linux : Touchpad issues - tapping, reverse/natural scrolling All Hackings Click here 1 Click Here 2

Hack WPA/WPA2 WPS - Reaver - Kali Linux

Image
WPA/WPA-2 When it was known that a WEP network could be hacked by any kid with a laptop and a network connection (using easy peasy tutorials like those on our blog), the security guys did succeed in making a much more robust security measure WPA/WPA2. Now hacking WPA/WPA2 is a very tedious job in most cases. A dictionary attack may take days, and still might not succeed. Also, good dictionaries are huge. An exhaustive bruteforce including all the alphabets (uppercase lowercase) and numbers, may take years, depending on password length. Rainbow tables are known to speed things up, by completing a part of the guessing job beforehand, but the output rainbow table that needs to be downloaded from the net is disastrously large (can be 100s of GBs sometimes). And finally the security folks were at peace. But it was not over yet, as the new WPA technology was not at all easy for the users to configure. With this in mind, a new security measure was introduced to compliment WPA. Wifi Pr...

Speeding Up WEP Hacking : ARP request replay attack

Image
Now if you have followed the basic WEP hacking tutorial, and optionally have also read the basic troubleshooting guide, then you are ready to proceed to the stage where you follow an intermediate level hacking tutorial. In this tutorial, we will look at the intricate details of what is happening and approach the complicated methods and concepts. To start with, I'll address a common question which was asked on my previous posts. 14 March 2014 19:28 i couldn't find any wlan when i write ifconfig in terminal Are you using Kali Linux on a virtual machine. Please note that a wireless adapter can only be used by only one machine at a time. Your host machine has access to the wireless adapter, not the virtual machine. This question has been discussed at length on superuser forums. The conclusion is that you can't directly connect internal wifi card using any Virtual machine software- "Unfortunately no virtualization software allows for direct access to hardw...

WPA/WPA2 cracking using Dictionary attack with Aircrack-ng

Image
WPA cracking involves 2 steps- Capture the handshake Crack the handshake to get the password We have already covered WPA-handshake capture in a lot of detail. In this tutorial we will actually crack a WPA handshake file using dictionary attack. Our tool of choice for this tutorial will be aircrack-ng. We will not bother about the speed of various tools in this post. However, in the next post, we will compare various CPU and GPU algorithms for WPA hash cracking. I'd like to add that I already know the password of the network so I'll simply put it into the dictionary that I'm using. A full fledged dictionary attack is quite time consuming. Also, a lot of people are facing problems with monitor mode in Kali 2.0. I have a post regarding that coming soon. PS: If you stumbled on this post out of nowhere and find it hard to follow, I recommend you go through some of the easier posts first.  How to use this site  is a good place to begin. My current state I have alr...

How to hack facebook using kali linux : CREDENTIALS HARVESTER ATTACK

Image
Do you know ,you can hack facebook password with one fake fb page(phishing). In this tutorial we will use Social Engineering tool i.e Credential Harvester attack in kali linux. All you need to do is follow the tutorial as it is to see the Credentials Harvester into the action. WHAT IS CREDENTIALS HARVESTER ATTACK ? It is a part of SOCIAL ENGINEERING TOOLKIT. In this method the attack started with a creation of phishing page. Attacker set the post back ip address to receive the credentials like usernames and passwords. The attacker can shorten the ip address to make the ip address looks like a genuine url. When the victim visits the url and feed the login details, the post back feature of the page will send all the data to attacker. LET'S DO THIS!!!!!!!!! Follow this video.......... STEPS: 1. Boot up kali linux on your machine and open terminal. 2. Type this command in the kali linux terminal.           ...