Skip to main content

Posts

Showing posts from March, 2019

Hide MAC Address And Become Untraceable (MAC address spoofing)

Tools Used:- Macchanger What is Mac address?  A MAC address (media access control address) is a unique identifier assigned to network interfaces for communications on the physical network segment. Every computer device has a different MAC address. The MAC address is a built-in all computer device when it is created. When the computer starts, the operating system reads from the hardware device. When you are connected to the wireless network, it sends packets to you and then your computer converts this information to websites, movies, images, etc. Imagine that two computers are connected to the wireless network, the first computer wants website google.com, and the second computer wants amazon.com, the network sends packets to these computers, but how do these computers know what packets ignore and what packets to receive? Computers identify packets to receive or ignore by MAC address when the network is sending a packet to the computer, it also writes in a packet the MAC addres...

Wireless /Wifi(WEP/WPA/WPA2) Password Cracking Using Dictionary Attack With Aircrack-ng (Kali Linux)

Tools Used:-Aircrack-ng In the present context of networking, WEP is not used cause it is the weakest and easy to crack through the network. WEP/WPA2 are the most used encryption tools to secure the wireless connection.   The most common way of getting past or cracking through WEP and WPA secured wireless connection is through the use of captured handshake. When you want to hack wifi, you need to capture “handshake”. The handshake is the connection of personal computer and wireless network, it is when network packet and personal computer packets meet each other. If you capture handshake then with a handshake you do not need to be in wifi range anymore, you can hack password with handshake and wifi name. Now you need to capture all the packets that are sent through the wifi router and all personal computers in the network . Step1: airmon-ng  This step is done before anything else is done in order to know your wifi interface name. Check the running process and  ...

Man-In-The-Middle(MITM) Attack Using Kali Linux

Tools Used :- Kali Linux, SSL Strip, Wireshark, Ettercap A  MITM  is a kind of cyber attack where a hacker/attacker compromises your network and starts redirecting all the network traffic through his own device. The hacker can see all your browsing information like your Passwords, Usernames, Emails, and even the messages you’re sending across. These kinds of attack don’t tend to work with a website using “HTTPS.” But, with a tool like SSLstrip, it can easily strip the user “https” back to “http”. This means the attack will get your information in plain text. Step1 : iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000 Go to terminal and type the command mentioned above. It will redirect Traffic port 80 to 10000 Step2 : iptables -L -t nat Step3 : Open SSLstrip Step4 : Launch Wireshark and select interface eth0 Step5 : sslstrip -l 10000 This step enables to listen to port 10000. -l in the command enables liste...