tag:blogger.com,1999:blog-30525863728600562832024-03-08T13:26:20.706-06:00Cybexin's Blog - Network Security BlogCybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.comBlogger218125tag:blogger.com,1999:blog-3052586372860056283.post-3581816438630999872009-11-09T04:13:00.003-06:002009-11-09T04:16:14.248-06:00Cracking WPA2 Password Using Pyrit<object height="344" width="425"><param name="movie" value="http://www.youtube.com/v/HY9Y99bOyhE&hl=en&fs=1&"><param name="allowFullScreen" value="true"><param name="allowscriptaccess" value="always"><embed src="http://www.youtube.com/v/HY9Y99bOyhE&hl=en&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" height="344" width="425"></embed></object><br /><br /><br />In this video its shown how to attack Wireless Networks using Pyrit tool. Pyrit is a GPU cracker for attacking WPA/WPA2 PSK protocols. It allows to create massive databases, pre-computing part of the WPA/WPA2-PSK authentication phase in a space-time-tradeoff.Pyrit takes a step ahead in attacking WPA-PSK and WPA2-PSK.Download and other details can be found <a href="http://code.google.com/p/pyrit/">here</a>.Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com4tag:blogger.com,1999:blog-3052586372860056283.post-49224152882467250682009-09-24T04:15:00.002-05:002009-09-24T04:21:35.118-05:00Nmap Using TOR Networks<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/7PVNt7D5LHw&hl=en&fs=1&"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/7PVNt7D5LHw&hl=en&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object><br /><br /><br />A good video showing how to scan networks with Nmap using Tor network to stay anonymous.<br />An Attacker downloads and configure <a href="http://www.thoughtcrime.org/software/tortunnel/">TorTunnel</a>,<a href="http://www.torproject.org/">TOR</a> bundle and <a href="http://proxychains.sourceforge.net/">proxychains</a>.After setting up everything an attacker uses nmap to find out running services on different IPs.The main purpose of this video to stay anoanymous while scanning different networks.......Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com0tag:blogger.com,1999:blog-3052586372860056283.post-60286569161955843782009-09-17T06:22:00.000-05:002009-09-17T06:25:13.739-05:00Milw0rm Exploits Archive<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/r6IDjVtmt38&hl=en&fs=1&"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/r6IDjVtmt38&hl=en&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object><br /><br /><br />A live demo on how to use latest exploits from milw0rm on backtrack live distro in detail. In this video Attacker lauches an attack against Dream FTP Server to crack Administrator's password on a windows box.Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com0tag:blogger.com,1999:blog-3052586372860056283.post-32443669558954462062009-09-02T05:14:00.003-05:002009-09-02T05:20:26.727-05:00Gerix WiFi Cracker<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/AkCTik4rWIE&hl=en&fs=1&"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/AkCTik4rWIE&hl=en&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object><br /><br /><br />Gerix Wifi Cracker NG is pre-installed on the BackTrack 4 Final version and is available on all the different Debian Based distributions, like Ubuntu etc...This software requires Aircrack-ng, xterm, zenity and obviously python-qt3. It has a nice GUI interface with the help of which there is very little or no manual work left.Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com1tag:blogger.com,1999:blog-3052586372860056283.post-57581455686127265692009-08-21T09:09:00.003-05:002009-08-21T09:13:42.508-05:00Karma Exploit<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/Ne7hof-w0kU&hl=en&fs=1&"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/Ne7hof-w0kU&hl=en&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object><br /><br /><br />This video is on using <a href="http://www.metasploit.com/users/hdm/tools/karma.rc">karma exploit</a> from metasploit on Backtrack 4.An Attacker setup his own fake Accesspoint in monitor mode, DHCP daemon and a web server daemon.Attacker runs Metasploit's karma exploit.The moment IP is assigned to victim's PC , all the activity is logged at the attacker's machine including the URL visit and credentials used for mail and web.<br />Attacker now has full comtrol on victim's machine....Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com0tag:blogger.com,1999:blog-3052586372860056283.post-23270275568786696272009-08-05T06:14:00.003-05:002009-08-05T06:19:39.290-05:00Sniffing And HTML Injection<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/YOG9aMDyCwI&hl=en&fs=1&"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/YOG9aMDyCwI&hl=en&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object><br /><br /><br />This video explains various examples of network sniffing and HTML injection with Ettercap-NG tool on BackTrack-4 on a Local Area Network.Shows how an attacker can change text of chat messages within <span>LiveMessanger </span>using ettercap filters and also using Ettercap plugin,Filters,filterf_modify,file-inject. An Attacker can even find who else is ARP poising on LAN using search_poisoning ettercap plugin.Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com0tag:blogger.com,1999:blog-3052586372860056283.post-20260774600174490672009-07-27T07:37:00.003-05:002009-07-27T07:50:12.545-05:00Wireless Key Grabber<object height="344" width="425"><param name="movie" value="http://www.youtube.com/v/F8SoKrJoA5M&hl=en&fs=1&"><param name="allowFullScreen" value="true"><param name="allowscriptaccess" value="always"><embed src="http://www.youtube.com/v/F8SoKrJoA5M&hl=en&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" height="344" width="425"></embed></object><br /><br /><br />This video is showing how to use Wireless Key Grabber. It requires lighttpd and it runs a fake wireless access point to grab wireless keys.whenever a user tries to connect to any website after connecting to this fake access point his browser is forwarded to a customised URL.Metasploit DLL injection is used to grab wireless key.Download link is <a href="http://forums.remote-exploit.org/wireless/24959-wireless-key-grabber-wkg-fully-automated.html">available here</a>.Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com0tag:blogger.com,1999:blog-3052586372860056283.post-391651577347856242009-07-18T00:31:00.004-05:002009-07-18T00:55:25.142-05:00DNS Spoofing And Browser Spying<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/vS9v0poMr3s&hl=en&fs=1&"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/vS9v0poMr3s&hl=en&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object><br /><br /><br />In this video an attacker sniffs network traffic from a remote machine using ARP and DNS Spoofing with Ettercap.Uses Driftnet program to listens to network traffic and sniff out images from TCP streams on the network.And finally uses remote_browser plugin of ettercap which sends visited URLs of the victim to attackers browser.Like this an attacker's browser follows what ever the victim is browsing. Just watch this.....Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com0tag:blogger.com,1999:blog-3052586372860056283.post-48582454532235608682009-07-10T08:13:00.005-05:002009-07-10T08:38:56.014-05:00Hacking and decrypting SSL and TLS traffic<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/TOPMBaCG6vE&hl=en&fs=1&"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/TOPMBaCG6vE&hl=en&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object><br /><br /><br />A Video demonstrating how a Attacker can sniff wireless networks using veriety of different tools like arpspoof for ARP Spoofing so that victim's computer routes all internet traffic via attacker's network interface.DNSSpoof is used to send the IP of an infected machine which is setup by an attacker.And finally WebMitm tool is used to send a spoofed certificate.When ever a user opens up any SSL encrypted web site,WebMitm issues a fake certificate.once the user accepts that certificate,Attacker can then sniff complete network traffic using wireshark.When attacker collect enough data,he can use SSLDump to decrypt everything using the certificate issued by WebMitm.Like this attacker can have complete details about user's credentials.Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com0tag:blogger.com,1999:blog-3052586372860056283.post-88037646634969396382009-07-09T09:01:00.002-05:002009-07-09T09:11:23.766-05:00Sniffing SSL Secured Logins With Ettercap<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/ESGV9zlo0Zo&hl=en&fs=1&"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/ESGV9zlo0Zo&hl=en&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object><br /><br /><br />A Small video showing how easy it is to intercept HTTPS traffic from <span>switched </span>local network by spoofing the SSL certificate using man in the middle attack with Ettercap. <span>The attacker uses one way ARP poisoning on victim and issues a fake spoofed SSL certificates on a switched Ethernet network.</span>Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com1tag:blogger.com,1999:blog-3052586372860056283.post-60298130209431267622009-07-01T08:55:00.003-05:002009-07-01T09:00:02.349-05:00How to hack a phone using BlueTooth<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/XlTEIYGk3Ro&hl=en&fs=1&"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/XlTEIYGk3Ro&hl=en&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object><br /><br />This video is live demonstration of hacking a cell phone using Bluetooth hacking tool called Super Bluetooth hack.This Java based tool allows to remotely make calls, view messages,remotely do any thing as if attacker is using the phone himself.Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com2tag:blogger.com,1999:blog-3052586372860056283.post-74152308101561125112009-06-26T03:07:00.004-05:002009-06-26T03:13:41.011-05:00DHCP Spoofing MITM attack<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/YJAglnMegMQ&hl=en&fs=1&"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/YJAglnMegMQ&hl=en&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object><br /><br /><br />This video is showing how to spoof DHCP IP assignment using Ettercap. When a new PC is added on the network which is configured to have IP address dynamically from a DHCP address. An attcker can spoof this IP assignment process and provide his own IPs, like a gateway which has been configured to sniff their usernames and passwords.Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com1tag:blogger.com,1999:blog-3052586372860056283.post-7651216284867047832009-06-23T04:25:00.003-05:002009-06-23T04:36:17.227-05:00Sniffing Remote Router Traffic via GRE Tunnels<object height="344" width="425"><param name="movie" value="http://www.youtube.com/v/s--bM4Yehko&hl=en&fs=1&"><param name="allowFullScreen" value="true"><param name="allowscriptaccess" value="always"><embed src="http://www.youtube.com/v/s--bM4Yehko&hl=en&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" height="344" width="425"></embed></object><br /><br />A good demo of sniffing network traffic remotely via setting up IP tunnel interface on remote router using WHAX live distro. Attackers makes configuration changes on router to start a tunnel interface and route all of the network traffic from that tunnel interface. Later they can sniff the traffic when ever they wants.Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com2tag:blogger.com,1999:blog-3052586372860056283.post-20055215074931007992009-06-17T05:02:00.002-05:002009-06-17T05:06:57.239-05:00Bluetooth Sniffing in Linux<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/TPxw0V42p1o&hl=en&fs=1&"><param name="allowFullScreen" value="true"><param name="allowscriptaccess" value="always"><embed src="http://www.youtube.com/v/TPxw0V42p1o&hl=en&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object><br /><br />A very good video showing how to sniff BlueTooth Pin while pairing two BlueTooth devices and crack it.Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com1tag:blogger.com,1999:blog-3052586372860056283.post-54727867560161403282009-06-16T00:30:00.002-05:002009-06-16T00:44:18.923-05:00Securing Web Services<div style="width: 425px; text-align: left;" id="__ss_522653"><a style="margin: 12px 0pt 3px; font-family: Helvetica,Arial,Sans-serif; font-style: normal; font-variant: normal; font-weight: normal; font-size: 14px; line-height: normal; font-size-adjust: none; font-stretch: normal; display: block; text-decoration: underline;" href="http://www.slideshare.net/digitallibrary/securing-web-services?type=powerpoint" title="Securing Web Services">Securing Web Services</a><object style="margin: 0px;" height="344" width="425"><param name="movie" value="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=securing-web-services3494&stripped_title=securing-web-services"><param name="allowFullScreen" value="true"><param name="allowScriptAccess" value="always"><embed src="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=securing-web-services3494&stripped_title=securing-web-services" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" height="344" width="425"></embed></object><div style="font-size: 11px; font-family: tahoma,arial; height: 26px; padding-top: 2px;"><br /><br /></div></div>This presentation is on Web Services Security , pointing at almost all of the fields requires attention for web application security.Shows how to effectively manage application development lifecycle and how to integrate Top 10 OWASP projects to develop any application keeping security in mind.<br /><br />A1 - <a href="http://www.owasp.org/index.php/Top_10_2007-A1">Cross Site Scripting (XSS)</a><br /><br />A2 - <a href="http://www.owasp.org/index.php/Top_10_2007-A2">Injection Flaws</a><br /><br />A3 - <a href="http://www.owasp.org/index.php/Top_10_2007-A3">Malicious File Execution</a><br /><br />A4 - <a href="http://www.owasp.org/index.php/Top_10_2007-A4">Insecure Direct Object Reference</a><br /><br />A5 - <a href="http://www.owasp.org/index.php/Top_10_2007-A5">Cross Site Request Forgery (CSRF)</a><br /><br />A6 - <a href="http://www.owasp.org/index.php/Top_10_2007-A6">Information Leakage and Improper Error Handling</a><br /><br />A7 - <a href="http://www.owasp.org/index.php/Top_10_2007-A7">Broken Authentication and Session Management</a><br /><br />A8 - <a href="http://www.owasp.org/index.php/Top_10_2007-A8">Insecure Cryptographic Storage</a><br /><br />A9 - <a href="http://www.owasp.org/index.php/Top_10_2007-A9">Insecure Communications</a><br /><br />A10 - <a href="http://www.owasp.org/index.php/Top_10_2007-A10">Failure to Restrict URL Access</a>Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com0tag:blogger.com,1999:blog-3052586372860056283.post-6977555490408930822009-06-08T03:25:00.000-05:002009-06-08T03:27:43.691-05:00Windows SMB Relay Exploit<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/-wrMF6RcfSo&hl=en&fs=1&"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/-wrMF6RcfSo&hl=en&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object><br /><br />A live demonstration of obtaining admin access on a Windows XP SP3 Machine. Exploits a flaw in Windows Server Message Block (SMB) which provides shared access to files and folders on network. Hacker utilizes Metasploits Framework to run the exploit.It works by relaying a SMB authentication request to another host which provides Metasploit with a authenticated SMB session, and if the user is an administrator, Metasploits will be able to execute code on the target computer and can even get a reverse shell.Hacker forces the target computer to perform a SMB authentication attempt by using a Ettercap Filter.For authentication target computer is forwarded to Metasploit.Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com0tag:blogger.com,1999:blog-3052586372860056283.post-41200057428505739212009-06-05T09:29:00.003-05:002009-06-05T09:40:26.160-05:00Remote shell with a Word document<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/BcY4qWRkhF0&hl=en&fs=1&"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/BcY4qWRkhF0&hl=en&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object><br /><br /><br />Using a Metasploit payload on Backtrack 4 to create a macro enabled Microsoft Word document which on executing opens a remote shell.Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com2tag:blogger.com,1999:blog-3052586372860056283.post-25618162627138475862009-06-04T08:20:00.003-05:002009-06-04T08:35:26.856-05:00Honey Pots<div style="width: 425px; text-align: left;" id="__ss_931573"><a style="margin: 12px 0pt 3px; font-family: Helvetica,Arial,Sans-serif; font-style: normal; font-variant: normal; font-weight: normal; font-size: 14px; line-height: normal; font-size-adjust: none; font-stretch: normal; display: block; text-decoration: underline;" href="http://www.slideshare.net/iradarji/honey-pot-presentation?type=powerpoint" title="Honey Pot">Honey Pot</a><object style="margin: 0px;" width="425" height="355"><param name="movie" value="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=honeypot-1232384893195723-2&stripped_title=honey-pot-presentation"><param name="allowFullScreen" value="true"><param name="allowScriptAccess" value="always"><embed src="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=honeypot-1232384893195723-2&stripped_title=honey-pot-presentation" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="355"></embed></object><div style="font-size: 11px; font-family: tahoma,arial; height: 26px; padding-top: 2px;">View more <a style="text-decoration: underline;" href="http://www.slideshare.net/">OpenOffice presentations</a> from <a style="text-decoration: underline;" href="http://www.slideshare.net/iradarji">iradarji</a>.</div></div><br /><br />Honeypots are the machines used for intrusion detection.It's basically a trap for hackers and seems to contain wealth of information in which hackers are interested in.<br /><br />These computors are configured with lots of monitoring tools which keeps an eye on each and every step of hackers which helps in studying their mind set later on. Softwares installed on these computers are dual purpose.At first glance they are inviting in nature, intruders gets attracted to them and on the other hand it helps in intelligence gathering.Once the hacker breaks into the system,later studies of these machines by security administrators helps in finding the ways which attacker used to break into these systems and helps in blocking those intrusion techniques.<br /><br />More details on Honey Pots can be found <a href="http://www.sans.org/resources/idfaq/honeypot3.php">here</a>Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com0tag:blogger.com,1999:blog-3052586372860056283.post-12422196255732015592009-05-27T06:11:00.002-05:002009-05-27T06:16:50.144-05:00PHP Remote File Inclusion<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/h8E07TnDCOI&hl=en&fs=1"><param name="allowFullScreen" value="true"><param name="allowscriptaccess" value="always"><embed src="http://www.youtube.com/v/h8E07TnDCOI&hl=en&fs=1" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object><br /><br /><br />Remote File Inclusion is a technique used to attack websites from a remote computer.RFI allow malicious users to run their own PHP code on a vulnerable website.This allows the attacker to use and run any remote file just by editing the URL. Like a webshell can display the files and folders on the server and can add,edit or delete files and folders,send spams and even get hold of root.<br /><br />More details on PHP Webshell are <a href="http://blog.xgineer.com/a-php-web-shell/">here</a>.Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com0tag:blogger.com,1999:blog-3052586372860056283.post-17476915543648274442009-05-23T03:44:00.002-05:002009-05-23T03:50:01.983-05:00Top Ten Web Hacking Techniques<div style="width: 425px; text-align: left;" id="__ss_1459469"><object style="margin: 0px;" width="425" height="344"><param name="movie" value="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=rsa04212009-090519113345-phpapp02&stripped_title=top-ten-web-hacking-techniques-2008"><param name="allowFullScreen" value="true"><param name="allowScriptAccess" value="always"><embed src="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=rsa04212009-090519113345-phpapp02&stripped_title=top-ten-web-hacking-techniques-2008" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object></div><br /><br />Top Ten Web Hacking Techniques 2008 by Jeremiah Grossman,Founder & Chief Technology Officer of WhiteHat Security.Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com0tag:blogger.com,1999:blog-3052586372860056283.post-48884215283312281572009-05-21T00:12:00.002-05:002009-05-21T00:20:52.713-05:00Aircrack-ng<object width="424" height="344"><param name="movie" value="http://www.youtube.com/v/odR2WPm7Ip8&hl=en&fs=1"><param name="allowFullScreen" value="true"><param name="allowscriptaccess" value="always"><embed src="http://www.youtube.com/v/odR2WPm7Ip8&hl=en&fs=1" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object><br /><br />This is a demonstration of hacking wireless access points networks with Aircrack-NG.Before running airodump we need to find an adaptor driver which can be downloaded from the <a href="http://www.aircrack-ng.org/doku.php?id=compatibility_drivers">here</a>.<br /><br />Please note few points regarding wireless as mentioned below -<br /><br />Channels are the channel your Access Point is Broadcasting on.<br />ESSID is the Name of your wireless network.<br />BSSID is the MAC address of your Access Point.<br /><br />We will have to put the wireless card in monitor mode before capturing the data.Complete step by step documentation can be found <a href="http://www.thetazzone.com/tutorial-crack-wep-with-aircrack-inject-packets-windows/">here</a>.Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com0tag:blogger.com,1999:blog-3052586372860056283.post-55375954449456071022009-05-18T05:57:00.003-05:002009-05-18T06:02:34.350-05:00SSH Hacking<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/Tu-aIL-uMaU&hl=en&fs=1"><param name="allowFullScreen" value="true"><param name="allowscriptaccess" value="always"><embed src="http://www.youtube.com/v/Tu-aIL-uMaU&hl=en&fs=1" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object><br /><br />A Dictionary attack is launched against SSH using a Shell Script to crack Passwords.Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com3tag:blogger.com,1999:blog-3052586372860056283.post-22107682573953768212009-05-15T05:22:00.002-05:002009-05-15T05:26:50.391-05:00Using NetCat as a Backdoor<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/aPmf_3wjQGg&hl=en&fs=1"><param name="allowFullScreen" value="true"><param name="allowscriptaccess" value="always"><embed src="http://www.youtube.com/v/aPmf_3wjQGg&hl=en&fs=1" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="442" height="344"></embed></object><br /><br />In this video a windows RPC exploit is used with the help of Metasploit on Backtrack.After exploiting the RPC vulnerability in windows,hacker uploads Netcat tool to regain access when ever he wants.Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com0tag:blogger.com,1999:blog-3052586372860056283.post-58667173756299965622009-05-14T00:57:00.002-05:002009-05-14T01:03:08.873-05:00Metasploit Autopwn tool<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/VXmE0QycUd8&hl=en&fs=1"><param name="allowFullScreen" value="true"><param name="allowscriptaccess" value="always"><embed src="http://www.youtube.com/v/VXmE0QycUd8&hl=en&fs=1" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object><br /><br />This Video shows MetaSploit Autopwn tool in action.After identifying a victim's machine using port scanning techniques,Just run the Metasploit framework and connect to sqlite database.Again run a port scan on victim's machine so that the result is saved in the database.Then run the Autopwn tool against the port scan result,Autopwn will automatically run all the exploits against the open port.When the attack completes successfully, we get open sessions. Job Done !!!!<br /><br />This can also be achived by running Autopwn exploits against the result saved by Nessus in NBE format.Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com0tag:blogger.com,1999:blog-3052586372860056283.post-46674366254357476072009-05-13T02:07:00.003-05:002009-05-13T02:14:10.783-05:00Dump Cleartext Passwords From Windows Memory<object height="344" width="425"><param name="movie" value="http://www.youtube.com/v/6Ag22RsghjY&hl=en&fs=1"><param name="allowFullScreen" value="true"><param name="allowscriptaccess" value="always"><embed src="http://www.youtube.com/v/6Ag22RsghjY&hl=en&fs=1" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" height="344" width="425"></embed></object><span><br /><br /><br />This video shows how you can dump the cleartext passwords from a memory dump of a Windows system by using a tool called MDD. </span>Cybexinhttp://www.blogger.com/profile/16687844711382493433noreply@blogger.com1