Posts

Showing posts from July, 2021

WPA/WPA2 CRACKING (WPS DISABLE)

Hello Hackers, How are u?, ... In previous article we had seen that how you can crack WPA/WPA2 encrypted wifi when WPS is enable on it, in this article we are going to see that how you can crack WPA/WPA2 when WPS is disable. so lets get started: in some real life cases WPS is not enable by default so in this cases we are going to hack the wifi by following simple three steps:    capturing the handshake: For This Guys pls do watch this video: https://drive.google.com/file/d/1bpwQexRgh-9juR6nyCUw3cs6uWVvL8x_/view?usp=sharing Creating a wordlist:   know how to create wordlist for this do watch this video: https://drive.google.com/file/d/1glGiReDR8NVPci0PlZgK-D18WjBeASvc/view?usp=sharing cracking WPA/wPA2 practically:     we had capture the handshake and also created the wordlist now its cracking time guys. for this Guys pls do watch this video. https://drive.google.com/file/d/1Z75_PZYHzHq145BZrs_IkjjFnbSTfTy0/view?usp=sharing     That's all for today g...

WPA/WPA2 CRACKING (WPS ENABLE)

 In this Tutorial, we aregoing to learn About how you can crack WPA/WPA2 wifi password when WPS  is enable on it. so without doing further delay lets get started... before going to hack into WPA/WPA2 when WPS  is enable we first must know about what WPS is and How it works: What is WPS? WPS stands for WIFI Protected Setup. It is a feature that is used with WPA & WPA2 (WIFI Protected Access & WIFI Protected Access II). It is a wireless security standard which aims to make the process to establish connection with a Wireless Access Point using WPA/WPA2 encryption faster and easier. HOW WPS WORKS? WPS is a wireless security standard which helps to connect to access point with out using actual PASSWORD. It has two modes of operation PIN PBC (Push Button Configuration)  When Access Point is setup up to used pin based authentication, used needs to setup a pin which will be used for authentication. User who wants to connect to the network can now use this WPS p...

WEP cracking

Hello Hackers, How are u?, ... In this article i am going to be talking about WEP cracking.   so lets get started:  before going to hack into wep we should first know about wep  and how it works: what is WEP: Wired Equivalent Privacy (WEP) is considered as a form of security protocol that was designed in order to provide a level of security and privacy to a wireless local area network (W LAN ) comparable to what is normally expected of a wired local area network. [1] Since a wireless network can transmit data all over an area through radio waves, this data can easily be intercepted through wireless data transmissions. Other users may even be able to eavesdrop on private and confidential conversations made through wireless networks without this form of security. Thus, WEP adds security to a wireless network by encrypting this data. Once data is intercepted, it will become unrecognizable to the system because it has already been encrypted. However, systems that ar...

Deauthentication Attack

Hello Hackers, this is how i am going to be calling you from now on... In this article i am going to be talking about attack called deauthentication.   so lets get started: What is a Deauth Attack: Deauthentication attack is a type of denial of service attack that targets communication between a user ( or all users ) and a Wi-Fi access point. This attack sends disassociate packets to one or more clients which are currently associated with a particular access point. Of course, this attack is totally useless if there are no associated wireless client or no fake authentications. The cool thing about this attack is that even in 2019 where all networks are using a WPA2 encryption you can still easily deauth anything or anyone without even being inside the network!   in short this attack is used to disconnect client from the network.   Why would you want to attack in that way:   A deauth attack is, most of the times, a step of a greater attack! Hackers usually need...

Discovering All the Connected Client in the Network.

  Hello guys pytools here, back again with another article. Today we are going to learn how you can Discover All the connected client in the same network. for this we are gonna use tool called Net discover. what is NetDiscover: Netdiscover is another discovery tool, and is built into Kali Linux 2018.2. Currently at the .03-pre-beta7 version and written by Jaime Penalba, Netdiscover can reform reconnaissance and discovery on both wireless and switched networks using ARP requests. in short netdiscover discover all the connected client in the same network. dicovering all the connected client using Netdiscover: for this Guys do watch this video:   https://drive.google.com/file/d/1KS5e9gkqrhOm9mGg-_zk4E6EUjIDi4GC/view?usp=sharing That's all for today guys hope you are enjoying our content and also guys Pls don't forget to follow us on Instagram and GitHub and do like our content on Instagram. https://instagram.com/__pytools__ https://GitHub.com/pytools786  

Bypassing HTTPS

  Hello guys pytools here, back again with another article. Today we are going to learn how you can Bypass https and hacked into the Network All the attacks that we learn so far are only work http only not on https. so without doing further delay lets get started. To bypass the HTTPS, we are going to use a tool called ssl-strip . What does ssl-strip does: ssl-strip downgrade any request to the HTTPS website and get it redirected to the HTTP version of this website. Once we go to the HTTP version, sniffing the data will be trivial, exactly like what happened in the previous section. MITMf starts SSLstrip automatically for us, but we can use it manually. want to know how ssl-strip works for this pls do watch this video : https://www.udemy.com/tutorial/learn-python-and-ethical-hacking-from-scratch/how-to-bypass-https/ Bypassing https using ssl-strip: https://drive.google.com/file/d/1KvF5BACPACJty6BIfozv0yJcRunan9n4/view?usp=sharing    That's all for today guys hope...

DNS SPOOFING

  Hello guys pytools here, back again with another article. Today we are going to learn how you can Perform DNS-Spoofing attack against the Network. before going to learn how to perform DNS-Spoofing you must know about what DNS is and how it works: What is the DNS: When users type domain names into the URL bar in their browser, DNS servers are responsible for translating those domain names to numeric IP addresses, leading them to the correct website.this is called DNS (domain Name Server) .   What is the DNS Spoofing: Domain Name Server (DNS) spoofing (a.k.a. DNS cache poisoning) is an attack in which altered DNS records are used to redirect online traffic to a fraudulent website that resembles its intended destination. means in dns spoofing when victim request any website we will redirect victim to our malacious website. How To Perform DNS spoofing attack:  wanna learn how to perform an DNS-Spoofing practically for this pls do watch this videos: https://drive.goog...

MAN IN THE MIDDLE ATTACK (Sniffing passwords over Network)

  Hello guys pytools here, back again with another article. Today we are going to learn how you can Perform MITM (Man in The Middle) attack against the Network. before going to learn how to perform MITM attack you must know about what MITM is and how it works: What is MITM attack : A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway. The goal of an attack is to steal personal information, such as login credentials, account details and credit card numbers. Targets are typically the users of financial applications, SaaS businesses, e-commerce sites and other websites where logging in is required.   Installing MITMF :     Before going to perform MITM attack using MITMF we need to install MITMF in our linux machine.   Know how to install MITM...

ARP SPOOFING

  Hello guys pytools here, back again with another article. Today we are going to learn how you can Perform ARP-Spoofing attack against the Network. before going to learn how to perform ARP-Spoofing you must know about what arp is and how it works: What is the ARP Protocol : Address Resolution Protocol (ARP) is a protocol that enables network communications to reach a specific device on the network. ARP translates Internet Protocol (IP) addresses to a Media Access Control (MAC) address, and vice versa. Most commonly, devices use ARP to contact the router or gateway that enables them to connect to the Internet. means when you are connected to the same network data is transferred through ARP via identifying mac address: What is ARP-SPOOFING  : An ARP spoofing allows attackers to intercept communication between network devices. The attack works as follows: The attacker must have access to the network. They scan the network to determine the IP addresses of at least tw...

changing mac address using macchanger

Image
    Hello guys pytools here, back again with another article. Today we are going to learn how you can change your Linux Mac address with  the help of mac address changer. So let's get started. Before diving into the usage instructions for macchanger, you'll need to have it installed on your system. Most likely, it won't be installed by default since it's a rather niche application. You can use your Linux distro's built-in package manager to install macchanger. Use the appropriate command below to install it.   To install macchanger on Ubuntu , Debian , and Linux Mint :            apt get install macchanger once you get install macchanger on your system you are ready to go:  Before we start using the macchanger command, you'll need to know the name of the network interface that you want to work with. You can execute the ifconfig command to see a list of all the available network interfaces on your system. In ...