Tuesday, 28 November 2017

how to install fluxion || Live hacking with fluxion || Educational

Fluxion

WARNING:-This tutorial is only for educational purpose, i will not be responsible for any kind of illegal activity.


What You Should Know About Fluxion: A Tool for Hacking Wi-Fi Without Dictionary or Bruteforce.

                                    

How it works

  • Scan the networks.
  • Capture a handshake (can't be used without a valid handshake, it's necessary to verify the password)
  • Use WEB Interface *
  • Launch a FakeAP instance to imitate the original access point
  • Spawns a MDK3 process, which deauthenticates all users connected to the target network, so they can be lured to connect to the FakeAP and enter the WPA password.
  • A fake DNS server is launched in order to capture all DNS requests and redirect them to the host running the script
  • A captive portal is launched in order to serve a page, which prompts the user to enter their WPA password
  • Each submitted password is verified by the handshake captured earlier
  • The attack will automatically terminate, as soon as a correct password is submitted
  • For a guide to the Captive Portal attack, read the Captive Portal attack guide


Requirements

A Linux-based operating system. We recommend Kali Linux 2 or Kali 2016.1 rolling. Kali 2 & 2016 support the latest aircrack-ng versions. An external wifi card is recommended.



Note

  • Be aware of sites pretending to be related with the Fluxion Project. They may be delivering malware.
  • Fluxion DOES NOT WORK on Linux Subsystem For Windows 10, because the subsystem doesn't allow access to network interfaces.


Installation and
Live hacking

Hello Guys,
Today, I am going to introduce you to an awesome tool, Fluxion (not for windows) for hacking wi-fi passwords.
But this is for education purpose only.
Fluxion is based on the programs such as aircrack-ng, mdk3, hostapd etc. The tool uses MITM attack for capturing the wpa/wpa2 passwords. So just let the hunt begin.
You can download or clone the tool from github https://github.com/deltaxflux/fluxion
or type the command in terminal git clone https://github.com/deltaxflux/fluxion
When download is done, just go to the directory and run the script using command ./fluxion
(If there are some dependencies which needed to be installed then first install them and then follow.)
STEP – 1
  • You will have to choose your language.
STEP – 2
  • Choose the wireless card which you would like to put in the monitor mode and scan the network(air).
STEP -3
  • Select your target.
STEP – 4
  • Capture the handshake.
STEP -5
  • Then use the web interface method for fakeap to be created
STEP – 6
  • Then wait , when someone logged into your fakeap then the password is being compared with the captured handshake. If the password matches, then fluxion stops automatically and you can find the password in the directory.

For video tutorial Click Here


Like my facebook page www.facebook.com/webcrush and subscribe my channel Hack Damn

thank you.

Wednesday, 22 November 2017

Kali Linux 2017.3 Released With Powerful New Tools

Kali Linux is a Penetration Testing Distribution based on Debian. Developed by Offensive Security. It is the world’s most capable and famous security testing platform, utilized by security experts in an extensive variety of specializations, including penetration testing, forensics, reverse engineering, and vulnerability assessment.

                                             


                                                         


Kali Linux 2017.3


With the New release they include all patches, fixes, updates, and improvements since from the last release, if you are kali lover then it’s time to Upgrade by using following Commands.




apt update
apt dist-upgrade
reboot




Improvements in New release


With the new release, the kernel has been updated to 4.13.10 and many other new improvements.
  • CIFS now uses SMB 3.0 by default.
  • EXT4 directories can now contain 2 billion entries instead of the old 10 million limit.
  • TLS support is now built into the kernel itself.

Also with the new update, they have provided package updates for Reaver, PixieWPS, Burp Suite, Cuckoo, The Social Engineering Toolkit. You can check the complete Changeloghere.




Valuable New Tools

With Kali Linux 2017.2 around eight new tools added, now with Kali Linux 2017.3, they have added Four more tools to the distribution now.
Tools are primarily focused on open source information gathering and the tools are not available the in the default installation.After installation, we need to update the Distro with an apt update.



Saturday, 18 November 2017

Creation, enable, disable & removal of Swap partition



1. system current swap details. 
-----------------------------------


[root@rhel6 ~]# swapon -s
Filename                                Type            Size    Used    Priority
/dev/sda5                               partition       4194296 0       -1
[root@rhel6 ~]# free -g
             total       used       free     shared    buffers     cached
Mem:             1          0          1          0          0          0
-/+ buffers/cache:          0          1
Swap:            3          0          3


2. Creating swap partition
-----------------------------

[root@rhel6 ~]# fdisk -cu /dev/sdb
Device contains neither a valid DOS partition table, nor Sun, SGI or OSF disklabel
Building a new DOS disklabel with disk identifier 0xa9373e40.
Changes will remain in memory only, until you decide to write them.
After that, of course, the previous content won't be recoverable.

Warning: invalid flag 0x0000 of partition table 4 will be corrected by w(rite)

Command (m for help): p

Disk /dev/sdb: 16.4 GB, 16444260352 bytes
255 heads, 63 sectors/track, 1999 cylinders, total 32117696 sectors
Units = sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk identifier: 0xa9373e40

   Device Boot      Start         End      Blocks   Id  System

Command (m for help): n
Command action
   e   extended
   p   primary partition (1-4)
p
Partition number (1-4): 1
First sector (2048-32117695, default 2048):
Using default value 2048
Last sector, +sectors or +size{K,M,G} (2048-32117695, default 32117695): +4096M

Command (m for help): p

Disk /dev/sdb: 16.4 GB, 16444260352 bytes
255 heads, 63 sectors/track, 1999 cylinders, total 32117696 sectors
Units = sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk identifier: 0xa9373e40

   Device Boot      Start         End      Blocks   Id  System
/dev/sdb1            2048     8390655     4194304   83  Linux

Command (m for help): t
Selected partition 1
Hex code (type L to list codes): 82
Changed system type of partition 1 to 82 (Linux swap / Solaris)

Command (m for help): p

Disk /dev/sdb: 16.4 GB, 16444260352 bytes
255 heads, 63 sectors/track, 1999 cylinders, total 32117696 sectors
Units = sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk identifier: 0xa9373e40

   Device Boot      Start         End      Blocks   Id  System
/dev/sdb1            2048     8390655     4194304   82  Linux swap / Solaris

Command (m for help): w
The partition table has been altered!

Calling ioctl() to re-read partition table.
Syncing disks.


3. Asking Kernel to re-read fs on /dev/sdb disk to identify created partition. 
-----------------------------------------------------------------------------------

[root@rhel6 ~]# partx -a /dev/sdb
BLKPG: Device or resource busy
error adding partition 1

Note:- you can ignore error partition was identified. 

4. making the created partition as swap
---------------------------------------------

[root@rhel6 ~]# mkswap /dev/sdb1
Setting up swapspace version 1, size = 4194300 KiB
no label, UUID=a42349d1-abcc-48b0-a331-52320829779c


5. enabiling  the /dev/sdb1 partition as swap.
-------------------------------------------

[root@rhel6 ~]# swapon /dev/sdb1
[root@rhel6 ~]# echo $?
0

Note:- Return 0 means previous command executed successfully. 

6. Checking that new swap partition status. 
---------------------------------------------

[root@rhel6 ~]# swapon -s
Filename                                Type            Size    Used    Priority
/dev/sda5                               partition       4194296 0       -1
/dev/sdb1                               partition       4194296 0       -2


Note:- In Above 2 partitions /dev/sdb1 is the new one which we added


7. Now add an entry in /etc/fstab to make /dev/sdb1 swap partition permanent 
--------------------------------------------------------------------------------

[root@rhel6 ~]# vim /etc/fstab
[root@rhel6 ~]# grep /dev/sdb1 /etc/fstab
/dev/sdb1 swap swap defaults 0 0





    =========================================================

Removing added /dev/sdb1 swap partition
    =========================================================


1. Checking Active swap partitions
-----------------------------------------

[root@rhel6 ~]# swapon -s
Filename                                Type            Size    Used    Priority
/dev/sda5                               partition       4194296 0       -1
/dev/sdb1                               partition       4194296 0       -2
[root@rhel6 ~]# free -m
             total       used       free     shared    buffers     cached
Mem:          2006        490       1515          0         43        219
-/+ buffers/cache:        227       1779
Swap:         8191          0       8191


2. As we are willing to remove /dev/sdb1 swap. first make it offline. 
----------------------------------------------------------------------
[root@rhel6 ~]# swapoff /dev/sdb1
[root@rhel6 ~]# swapon -s
Filename                                Type            Size    Used    Priority
/dev/sda5                               partition       4194296 0       -1



3. uncomment or remove /etc/fstab entry for /dev/sdb1
------------------------------------------------------

[root@rhel6 ~]# vim /etc/fstab
[root@rhel6 ~]# grep /dev/sdb1 /etc/fstab
#/dev/sdb1 swap swap defaults 0 0


4. permanently remove the partition using fdisk utility.
-------------------------------------------------------------

[root@rhel6 ~]# fdisk -cu /dev/sdb

Command (m for help): p

Disk /dev/sdb: 16.4 GB, 16444260352 bytes
76 heads, 1 sectors/track, 422601 cylinders, total 32117696 sectors
Units = sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk identifier: 0xa9373e40

   Device Boot      Start         End      Blocks   Id  System
/dev/sdb1            2048     8390655     4194304   82  Linux swap / Solaris

Command (m for help): d
Selected partition 1

Command (m for help): p

Disk /dev/sdb: 16.4 GB, 16444260352 bytes
76 heads, 1 sectors/track, 422601 cylinders, total 32117696 sectors
Units = sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk identifier: 0xa9373e40

   Device Boot      Start         End      Blocks   Id  System

Command (m for help): w
The partition table has been altered!

Calling ioctl() to re-read partition table.
Syncing disks.


5. Ask kernel to re-read /dev/sdb hard disk.
----------------------------------------------------

[root@rhel6 ~]# partx -a /dev/sdb
[root@rhel6 ~]# echo $?
0


6. Check the swap details. 
------------------------------
[root@rhel6 ~]# swapon -s
Filename                                Type            Size    Used    Priority
/dev/sda5                               partition       4194296 0       -1

[root@rhel6 ~]# free -m
             total       used       free     shared    buffers     cached
Mem:          2006        488       1518          0         43        219
-/+ buffers/cache:        224       1782
Swap:         4095          0       4095




FOLLOW this blog &

Like me on Facebook.

Recover deleted files from ext3/ext4 partition on CentoS 6

How to recover deleted files

I used ext4 magic, replacement for extundelete and ext3grep:
http://openfacts2.berlios.de/wikien/index.php/BerliosProject:Ext4magic

I have rpm's for CentOS 6 I downloaded from somewhere at:
http://rpms.plnet.rs/plnet-centos6-i386/RPMS.plnet-downloaded/ext4magic-0.3.1-1.2.i686.rpm
http://rpms.plnet.rs/plnet-centos6-x86_64/RPMS.plnet-downloaded/ext4magic-0.3.1-1.2.x86_64.rpm

What to do:

1. First thing to do is to unmount that partition and stop using it. If it is root partition, shutdown system and boot LiveCD/LiveDVD 6.x and work from it

2. Create a copy of your partition (to a filesystem where you have enough free space!):
dd if=/dev/DEVICE of=/BACKUPPATH/DEVICE.img

3. Create a backup of ext3/ext4 Journal:
debugfs -R "dump <8> /BACKUPPATH/journal.copy" /dev/DEVICE

4. Download and install ext4magic rpm:

CentOS i386 - for 32-bit system/LiveCD:
wget http://rpms.plnet.rs/plnet-centos6-i386/RPMS.plnet-downloaded/ext4magic-0.3.1-1.2.i686.rpm
yum install ext4magic-0.3.1-1.2.i686.rpm

CentOS 6 x86_64:
wget http://rpms.plnet.rs/plnet-centos6-x86_64/RPMS.plnet-downloaded/ext4magic-0.3.1-1.2.x86_64.rpm
yum install ext4magic-0.3.1-1.2.x86_64.rpm

5a. Run ext4magic on the copy/dd-image to recover all deleted files (-m switch):

ext4magic /BACKUPPATH/DEVICE.img -m -j /BACKUPPATH/journal.copy

5b. Run ext4magic on the actual partition (not recomended!):

ext4magic /dev/DEVICE -j /BACKUPPATH/journal.copy -m

5c. Recovers all files deleted the last 24 hours from directory user1/ which have the string jpg in their filename. The recovered files are stored at /LOCATION_TO_SAVE_FILES. A temporary file ./tmpfile is used to get the list of filenames to recover. :

ext4magic /BACKUPPATH/DEVICE.img -Lx -f user1 | grep "jpg" > ./tmpfile
ext4magic /BACKUPPATH/DEVICE.img -i ./tmpfile -r -d /LOCATION_TO_SAVE_FILES

5d. Since the files were delete 4 days ago, I decided to R recover (everything) after 5 days ago and before 2 days ago:

ext4magic -R -a $(date -d “-5day” +%s) -b $(date -d “-2day” +%s) \ -d /LOCATION_TO_SAVE_FILES /BACKUPPATH/DEVICE.img

More help:
http://source.kohlerville.com/2013/02/ext4-recover-deleted-files-undelete-using-ext4magic-on-centos-6/

You can use "man ext4magic" to get more help.



FOLLOW this blog &


Like me on Facebook.

Password reset methods for different Linux distro

Hello friends!!! I want to share password reset methods for different Linux distro! You are welcome to add new.. Here is some assumptions when you write for It :



  • Username is 'Linux', You can replace Linux with anything as ur case
  • Linux is installed in /dev/sda1, You may replace the /dev/sda1 with ur drive...
  • OS installation drive is not encrypted
  • Cant help in resetting BIOS password
 Ubuntu :
  • Boot from Live CD, You can use Ubuntu itself or any other...
  • Go to super user mode shell using sudo command

sudo su

  • Mount whole file system under mount using command mount.

mount /dev/sda1 /mnt

  • Now u need to chroot to /mnt with sudo command

chroot /mnt /bin/sh

  • Okay now here is babystep, password will not be shown...

passwd Linux
Enter new UNIX password :
Verify password :

  • Just reboot and use your new password to login...

FOLLOW my this blog &

Like me on Fcebook.

How to create a hotspot on Debian

Hotspot share your computer's Internet connection with other devices over Wi-Fi.

Find wireless driver and make sure that driver is ath5k or ath9k, this solution will only work for those drivers.
For others wireless cards and drivers for now doesn't work...

STEP-1). In terminal type: lspci
If you use usb wireless adapter type command lsusb.

We now need to install 2 additional tools to make out hotspot, 1st one is hostapd(hotspot server), 2nd one is dnsmasq(dns dhcp server).


STEP-2). apt-get install hostapd dnsmasq

STEP-3). Stop those services if started already, and prevent them from starting on system start up.

in terminal type:
sudo service hostapd stop
sudo service dnsmasq stop
sudo update-rc.d hostapd disable
sudo update-rc.d dnsmasq disable


STEP-4). Now we need to set up config files.
in terminal type: gedit /etc/dnsmasq.conf
or kate /etc/dnsmasq.conf if you use kde...

add those lines to the config file:


__Code:___________________________________________ ____________

# Bind to only one interface
bind-interfaces
# Choose interface for binding
interface=wlan0
# Specify range of IP addresses for DHCP leasses
dhcp-range=192.168.150.2,192.168.150.10

__________________________________________________ __________

STEP-5). hostapd config
In terminal type: gedit /etc/hostapd.conf

and add those lines:
_____Code:________________________________________ _______________

# Define interface
interface=wlan0

# Select driver
driver=nl80211
# Set access point name
ssid=myhotspot
# Set access point harware mode to 802.11g
hw_mode=g
# Set WIFI channel (can be easily changed)
channel=6
# Enable WPA2 only (1 for WPA, 2 for WPA2, 3 for WPA + WPA2)
wpa=2
wpa_passphrase=mypassword
__________________________________________________ _______
You can change ssid name and password for anything you want here. Current config will create hotspot named myhotspot with password mypassword.

STEP-6). Now create anywhere you want a file named it hotspot.sh (best way to save script on Desktop)
Edit it with any text editor like this:

________ Code: ___________________________________________
#!/bin/bash
# Start
# Configure IP address for WLAN
sudo ifconfig wlan0 192.168.150.1
# Start DHCP/DNS server
sudo service dnsmasq restart
# Enable routing
sudo sysctl net.ipv4.ip_forward=1
# Enable NAT
sudo iptables -t nat -A POSTROUTING -o ppp0 -j MASQUERADE
# Run access point daemon
sudo hostapd /etc/hostapd.conf
# Stop
# Disable NAT
sudo iptables -D POSTROUTING -t nat -o ppp0 -j MASQUERADE
# Disable routing
sudo sysctl net.ipv4.ip_forward=0
# Disable DHCP/DNS server
sudo service dnsmasq stop
sudo service hostapd stop
__________________________________________________ ____________

You will probably need to change ppp0 in this to eth0 or any other number which refers to your wired connection.

STEP-7). Last step. Now you can start your hotspot by starting script. Just run it...
For me it looks like this:
root@distro:~# cd /root/Desktop/
root@distro:~# chmod +x hotspot.sh
root@distro:~/Desktop# ./hotspot.sh
Because I have it on my Desktop.

Enoy in your new Hotspot!!!!!!


FOLLOW us for more interesting tutorials.


Like me on Facebook.


Thursday, 16 November 2017

How to install any software(application) in Kali Linux

After installation of Kali Linux, it's a major task to install a software. For this people start searching on internet for the installation of every single software.

In this tutorial I will solve this problem and show you how to install any application in kali linux. I am installing SKYPE and you can install any software using the same process.

Let's start the tutorial😎

STEP-1) First we need to download the software package having extension .debClick here for download skype.deb file.

                                   


STEP-2) After downloading the file, we need to install gdebi package installer.

STEP-3) For install gdebi type apt-get install gdebi. It will take a minute if your internet connection is fine.

                             






STEP-4) Now gdebi is installed in your kali linux. Now go to the directory where skype.deb file is downloaded.

STEP-5) Right click on the file and click on open with other application. And then click on  GDebi package installer.

                            




STEP-6) Now interface of GDebi package installer will be open and now click on install package button. Package installation process will be start.

                           





STEP-7) Go and check your application list, SKYPE will be there.

                           






Thanks for visit. Hope this tutorial will help you.

FOLLOW us for more interesting tutorials.

LIKE me on Facebook.


Wednesday, 15 November 2017

How to install virtual box in Kali Linux.

Hello friends, In this tutorial we will know how to install Virtual box in Kali Linux.

Before starting the tutorial,let's take a look about Virtual box.


VirtualBox or VB is a software virtualization package that installs on an operating system as an application. VirtualBox allows additional operating systems to be installed on it, as a Guest OS, and run in a virtual environment. In 2010, VirtualBox was the most popular virtualization software application. Supported operating systems include Windows XPWindows VistaWindows 7macOS XLinuxSolaris, and OpenSolaris.


Now let's start the tutorial.


Step-1) First you need to perform updates on your Kali Linux machine. For this type apt-get update.


                              




Step-2) After updates you need to install dkms packages. Type apt-get install dkms.


                        





Step-3) Now simply you have to install virtual box. Type apt-get install virtualbox.


                       




Step-4) Now virtual box is start installing in your system/pc. Type virtualbox in terminal to open and execute virtual box.


Thanks for visit my blog. i hope this tutorial will help you.


Follow my blog if you find tutorials helpful.


Like  my page on Facebook.