Friday, 26 April 2013

How To Crack A WPA Key With Aircrack-ng

((•)) Hear this post





With the increase in popularity of wireless networks and mobile computing, an overall understanding of common security issues has become not only relevant, but very necessary for both home users and IT professionals alike. This article is aimed at illustrating current security flaws in WPA/WPA2. Successfully cracking a wireless network assumes some basic familiarity with networking principles and terminology. To successfully crack WPA/WPA2, you first need to be able to set your wireless network card in "monitor" mode to passively capture packets without being associated with a network. One of the best free utilities for monitoring wireless traffic and cracking WPA-PSK/WPA2 keys is the aircrack-ng suite, which we will use throughout this article. It has both Linux and Windows versions (provided your network card is supported under Windows).

Network Adapter I am going to use for WPA/WPA2 cracking is Alfa AWUS036H , OS# Backtrack 5R2 

Step 1 : Setting up your network device 

To capture network traffic wihtout being associated with an access point, we need to set the wireless network card in monitor mode. To do that, type:
Command # iwconfig (to find all wireless network interfaces and their status)


Command # airmon-ng start wlan0 (to set in monitor mode, you may have to substitute wlan0 for your own interface name)


 Step 2 : Reconnaissance 

This step assumes you've already set your wireless network interface in monitor mode. It can be checked by executing the iwconfig command. Next step is finding available wireless networks, and choosing your target:

Command # airodump-ng mon0 (Monitors all channels, listing available access points and associated clients within range.


 Step 3 : Capturing Packets 

To capture data into a file, we use the airodump-ng tool again, with some additional switches to target a specific AP and channel. Assuming our wireless card is mon0, and we want to capture packets on channel 1 into a text file called data:

Command # airodump-ng -c 1 bssid AP_MAC -w data mon0 


Step 4 : De-Authentication Technique 

To successfully crack a WPA-PSK network, you first need a capture file containing handshake data. You may also try to deauthenticate an associated client to speed up this process of capturing a handshake, using:

Command # aireplay-ng --deauth 3 -a MAC_AP -c MAC_Client mon0 (where MAC_AP is theMAC address of the access point, MAC_Client is the MAC address of an associated client.


 So, now we have successfully acquired a WPA Handshake.


 Step 5 : Cracking WPA/WAP2 

Once you have captured a four-way handshake, you also need a large/relevant dictinary file (commonly known as wordlists) with common passphrases.

Command # aircrack-ng -w wordlist ‘capture_file’.cap (where wordlist is your dictionary file, and capture_file is a .cap file with a valid WPA handshake) 



Cracking WPA-PSK and WPA2-PSK only needs (a handshake). After that, an offline dictionary attack on that handshake takes much longer, and will only succeed with weak passphrases and good dictionary files.
Cracking WPA/WPA2 usually takes many hours, testing tens of millions of possible keys for the chance to stumble on a combination of common numerals or dictionary words. Still, a Weak/short/common/human-readable passphrase can be broken within a few minutes using an offline dictionary attack.


subscribe me to on facebook get my latest updates and tricks..



Catch me on Facebook. Click Here

For regular updates and problem solving or sharing knowledge, you can join our group Hacks and Security Tips


You Can like Our page Here.


Twitter-

Follow me.

Google +

Add me Here

You can also see our Google + page  Here

Wednesday, 10 April 2013

Kaspersky All version Keys & Activator

((•)) Hear this post

Kaspersky Activator 1.0

Kaspersky Activator 1.0 activates Kaspersky Anti-virus, Kaspersky Internet Security & Kaspersky PURE using 'KEY' files that can be download from this site. Manual process of Kaspersky product activation via KEY files is a very cumbersome task. Kaspersky Activator 1.0 automates this manual process and saves your precious time. 
Features:
  • Supports all major Kaspersky products.
    • Kaspersky Anti-virus (All Versions)
    • Kaspersky Internet Security (All Versions)
    • Kaspersky PURE (All Versions)
  • Activates Kaspersky via KEY files offline.
  • No need to search for KEYs on the internet.
  • Valid KEYs are available from within Activator itself.
 
System Requirements:
  • Operating Systems:
    • Microsoft Windows XP (Service Pack 2 or higher)
    • Microsoft Windows Vista (32/64 Bit)
    • Microsoft Windows 7 (32/64 Bit)
  • Hardware Requirements:
    • Processor 1 GHz 32-bit (x86)/64-bit (x64) or higher
    • 256 MB of available RAM (32-bit)
    • 512 MB of available RAM (64-bit)
  • Software Requirements:
    • Microsoft .Net Framework 2.0

Monday, 8 April 2013

How to Make Keylogger/Trojan Undetectable

((•)) Hear this post


Welcome back readers, In this tutorial we are going to show you how to make an undetectable keylogger to most antivirus programs (AVG,AVAST,KASPERSKY).Already we had showed you how to make an key logger in our previous tutorial, if you do not know about it first read that here


Tools required:

*Xenocode post build 2009 for .NET beta Download OR Download OR Downlod
*Hex workshop HEX editor Download

Step 1: Initially disable your antivirus protection (Here I am using AVG antivirus Right click on AVG and click “Temporarily disable AVG protection” and select ” Until I restart next time”
Step 2: Install  Xenocode post build 2009 for .NET beta & Hex workshop HEX editor.Also don’t forget to use the crack
Step 3: Open Xenocode post build 2009 for .NET beta from program files and go to Application tab and click  “ADD” option from that and add your keylogger file (ie, already prepared through rapzo keylogger or any other.Here)

Step 4: Now go to “VIRTUALIZE” tab and click “ENABLE” check box at left side. Then go to “GENERAL” tab there. Uncheck the “INHERIT PROPERTIES” tick box at right corner. Then change the product title, publisher, description, website, version to your desired (Here I use AVG v11.3.4, AVG corporation, AVG , www.avg.com ,AVG.(Optional:If you want to change the icon click “BROWSE “ option and select the required application and automatically it will change to that app icon.)


Step 5:Now click “XENOCODE APPLICATION “and save it.


Step 6: Now your keylogger file will appear as shown(With avg icon making it undetectable to victim)


Step 7: Now go to “Hex workshop HEX editor (32 bit)” from “All programs”

Step 8: click “File->open->your keylogger file

Step 9:  Press “Ctrl+F” which opens Find dialog box change type to “TEXT STRING” and search for “COPYRIGHT”

Step 10: It will show the result as follows

Step 11: Now select these codes as shown in fig(....... inflate 1.2.3 copyright)



Step 12: Now right click on the selected area and click “FILL” option from that,then click OK.


Step 13: Result will change all binary codes to 00 as shown


Step 14: Then manually search for  “X.e.n.o.c.o.d.e. .V.i.r.t.u.a.l. .A.p.p.l.i.a.n.c.e. .R.u.n.t.i.m.e”(Ctrl+F feature cannot be used here, if required use Ctrl+F and search for letter X and find X.e.n.o.c.o.d.e)

Step 15: again as step 12 right click on the selected area and click “FILL” option from that, and then click OK.

Then it will look as


Step 16: click save option from File->save.


On that dialog box click Yes. Then it will be automatically saved to your key logger file.

Step 17:Turn back the antivirus and scan that key logger file.

Hurrah!!!!  Yes you made it ,an undetectable key logger J !!!This file is not detected by most antivirus (AVG,AVST,KASPERSKY)which is used by most of our friends. You cancheck it through online scanners as shown

Now send that keylogger file to your victim which would not be detected by his antivirus.
If you have any clarifications comment on these post and we will try to solve it at best
Please Share it! :)

Sunday, 7 April 2013

the official trick to know ur top profile viewers...

((•)) Hear this post





1. just open your facebook profile page...
2. Press Ctrl+U
3. then in search box type "ordered_list.top_friends"4just see the square brackets and copy the id's..
5 now go to new Tab and go to www.facebook.com/id  {for example:  facebook.com/100002124543457 } 6. congrates u hav got the list...

Banner Ad