Tuesday, July 24, 2012

PowerLine Networking

PowerLine Networking a new concept of Network solution for Home and Small Offices.



Its an amazing upcoming technology, with which you will no longer need to lay down costly CAT5/5E cables and Switches to set your PCs and other networked devices such as Smart TV's, Mobile phones, Laptops in LAN to share resources such as Internet, Files, Printers etc.

With this technology, you only have to plug-in a Power Line Adapters (atleast 2 in number) to a Standard Wall Electrical Socket to 2 different rooms or area, tadaaa!!!!!! you are done! the adapters will find each other via Electrical Wires carrying 110V-230V Voltage !! which were already there for years!


What Is A Powerline Network?
Your home already has a network of wires in it that connect every room in the house. These are the wires that provide each room with electricity. Normally, these wires are used for only that task, but it is possible to turn them into a way of conveying data like any other wire.

>> This is exactly what a powerline network does. Power line Networking can be used in a home to interconnect home computers and peripherals, and home entertainment devices that have an Ethernet port.


>> The Powerline adapter sets plug into power outlets and establish an Ethernet connection using the existing electrical wiring in the home. (Power strips with filtering may absorb the power line signal).


>> This allows devices to share video and data without the inconvenience of running dedicated network cables.


>> Doing this has no effect on the normal function of the electrical wires, either – all your power outlets will continue to work normally


Advantages of a PowerLine networking:

 

>> It's inexpensive.
>> It uses existing electrical wiring.

>> Every room of a typical house has several electrical outlets.

>> It's easy to install.

>> A printer, or any other device that doesn't need to be directly connected to a computer.

>> Sniffing can be avoided to some extent in a dedicated link.


Monday, July 23, 2012

NFC(Near Field Communication)

What is NFC(Near Field Communication) is all about ?


Near field communication (NFC) is a set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into close proximity, usually no more than a few centimeters. Present and anticipated applications include contact-less transactions, data exchange, and simplified setup of more complex communications such as Wi-Fi. Communication is also possible between an NFC device and an un-powered NFC chip, called a "tag".

NFC standards cover communications protocols and data exchange formats, and are based on existing radio-frequency identification (RFID) standards including ISO/IEC 14443 and FeliCa. The standards include ISO/IEC 18092 and those defined by the NFC Forum, which was founded in 2004 by Nokia, Philips and Sony, and now has more than 160 members. The Forum also promotes NFC and certifies device compliance.
NFC builds upon Radio-frequency identification (RFID) systems by allowing two-way communication between endpoints, where earlier systems such as contact-less smart cards were one-way only. Since un-powered NFC "tags" can also be read by NFC devices, it is also capable of replacing earlier one-way applications.

Bluetooth and WiFi connections


NFC offers a low-speed connection with extremely simple setup, and could be used to bootstrap more capable wireless connections. It could, for example, replace the pairing step of establishing Bluetooth connections or the configuration of Wi-Fi networks.


Social Networking


NFC can be used in social networking situations, such as sharing contacts, photos, videos or files and entering multiplayer mobile games.

Gadgets which support NFC Technology

BlackBerry Bold 9790, 9900, 9930, 9350,9360, 9370, 9380
Google Nexus S, Q, 7
HTC Incredible
HTC One X
LG Optimus Elite
LG Optimus L5, L7
Motorola Droid Razr
Nokia 700, 701, 603, C7, N9
Samsung Galaxy Note, S2,S3

Saturday, July 7, 2012

How to Create Picture Password in Windows 8

Aim of Tutorial: To Create Picture-Password in Windows 8 Operating System.

A Picture-Password is a new feature in Windows8 with an aim to secure Windows Login. This feature is more suitable for Touch Screens than a desktop system.


You can Setup a Picture-Password by following the snapshots given below:







 




~Have Fun !~
Note: The path of gestures shown in fig. is only for understanding, it will be hidden from the user.

Friday, July 6, 2012

How to sniff Passwords in Wired/Wireless LAN Using Ettercap-Gtk. Man in the Middle Attack caused by ARP poisioning.

Aim of Tutorial : To sniff passwords from all the users in LAN by ARP Poisioning in Linux Backtrack5.

 
Ettercap:
Ettercap is a tool for network protocol analysis and security auditing. It has the ability to intercept traffic on a network, capture passwords, and conduct active eavesdropping against common protocols.

For this exercise I will be using ARP Poisoning to sniff the LAN for passwords that use SSL (Hotmail, Gmail, Etc.)

ARP:
“Address Resolution Protocol”: As defined by Wikipedia: ARP is a computer networking protocol for determining a network host's link layer or hardware address when only its Internet Layer (IP) or Network Layer address is known. This function is critical in local area networking as well as for routing internetworking traffic across gateways (routers) based on IP addresses when the next-hop router must be determined.
So in normal terms ARP is the way that we get a MAC address of a Host or Node from the IP address.

ARP Spoofing:
This is the technique we will use to attack a wired or a wireless network. ARP Spoofing allows the attacker to sniff data frames from the LAN, then gives you the ability to modify the traffic (good for redirecting to your own computer to download an exploit to victim), or stop the traffic from entering the network, or a specific computer (good for local DOS Attacks on a Local Area Network).

The idea behind the attack is to send a fake (AKA “Spoofed”) ARP message to the LAN. Any traffic on the network meant for that IP address that you attacked (whole network if you want) will be sent to the attacker. The attacker (you) can choose to forward the traffic to the actual gateway (Passive Sniffing) or modify the data before forwarding it (Man in the Middle).

How we will do it for this exercise:

1.> Edit a file:

We first have to edit one file (Don’t worry, we just have to delete two # signs to “uncomment” them).

The file we will be editing is called etter.conf and it can be found under the etc folder. (Full Path = /etc/etter.conf) with this command in terminal :-
                           gedit /etc/etter.conf

We need to change the part under the “redir_command_on/off” section.

MAKE SURE YOU ONLY UNCOMMENT THE TWO LINES UNDER “if you use iptables

The Linux subsection will look like this when done:
Code:
#---------------
#     Linux
#---------------

# if you use ipchains:
   #redir_command_on = "ipchains -A input -i %iface -p tcp -s 0/0 -d 0/0 %port -j REDIRECT %rport"
   #redir_command_off = "ipchains -D input -i %iface -p tcp -s 0/0 -d 0/0 %port -j REDIRECT %rport"

# if you use iptables:
   redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
   redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"

Notice how there are no Hash (#) signs in front of the last two lines.

2.> Run Ettercap:

Now we can start Ettercap-GTK (This is a pretty version of the shell program, it gives us a nice GUI to play with). Ettercap-GTK can be found under: Menu -> Backtrack -> Privilege Escalation -> Spoofing -> Ettercap-GTK

3.> Setting up Sniffing:


Sniff -> Unified Sniffing

Eth0 -> OK ………………………..(This runs Sniffing on your first Ethernet card)

Hosts -> Scan for hosts ………… (Scans the network for targets)

Hosts -> Hosts List ………………….(Opens your hosts list



4.> Targeting the Hosts on the gateway:-


Now, you have all the computers on the network on the host list. If you want to only scan one computer (its better and quicker for us to just do the one) then click on the default gateway first, and click the target 1 button.

 After you do the default gateway, then click your computer you are attacking and make it “Target 2” by selecting it and clicking the “target 2” button.

5.> After setting up the sniffing:

Mitm -> ARP poisoning -> Select “Sniff remote connections” Hit OK

Start -> Start Sniffing

Your done! Now you are sniffing the computer for passwords onto certain websites that use SSL for their security. When you are done go to: Start -> Stop Sniffing, and then go to Mitm -> Stop mitm attack(s)


Note: If in case you wish to check whether the ARP poisoning was successful or not you can select Plugins from the menu bar and select, Check Poisson plugin, It takes a little while to show the message " Poisoning was successful :)"



Thursday, July 5, 2012

Hack Windows Admin / User passwords using Linux Bactrack4

Want to hack your sister's or Brother's account or your boss's secret files at office ?? here's its one of the methods to do so.
Not only the username and pass words but also you can disable the "syskey" they have applied even before the windows users ask you for the password.



>> Boot backtrack 4 OS dvd or using pendrive.

>> Press >> Start button >> Backtrack >> Privelege Escalation >> Password attacks >> "chntpw".

This will open a "shell" or a command prompt in windows language.
>> At the last line, You should see "root@bt:~#" as command line.

>> At this line you should type the whole path of the SAM file located on Windows as follows:

chntpw -i /mnt/hda1/Windows/System32/config/SAM




>> If this doesnt work, then you should first locate the drive in which your windows is installed, for example, My windows is installed in "hda1" so i have written "hda1" in the above line. Also you should note the exact capital letters for "Windows" and "Sytem32" used.

>>Hit "enter" after the line, to see this window which is interactive to user showing several options like this:



1.>> Edit user data and password.
2.>> Syskey status and change it. etc.

>> At the last line you see "What to do? [1]->"
then just type the menu number in front of the desired hack, for example "1" and hit "enter". You should see this menu now:

>>> Type in the username which you wish to edit.
and select the menu options for it.

For example, type "josh" and select the menu no. from the list below:



1.>> Clear user password.
2.>> Edit user password.
3.>> Promote user.
and many more.



>> After doing the task select "quit" and boot back to windows with administrator rights or to see user's data inside windows.

Sunday, July 1, 2012

Hacking Wi-Fi WEP - Key Protected Networks Using Bactrack 4, 5

Aim Of Tutorial: Hacking Wi-fi Network secured with WEP key Encryption





Hi everyone, Today am here to how you a very simple and effective way to hack Wi-Fi network secured with WEP key.



Please follow the steps given below accurately:-

1.> Boot Backtrack 5 in normal Text-Mode (1st Choice) when booting menu appears, then enter startx for starting GUI interface of BT5.

2.> Open a Terminal, type the following commands:-

airmon-ng start wlan0
 
This command will list the available WLAN (Wi-Fi card available in System) and also
Show the another name of the same Wi-Fi card such as mon0.
We will now onwards use the mon0 interface name in all the following commands.
The Wi-Fi card is now in monitor mode.
 
3.> Now in the Same Terminal window, Type: 
 
airodump-ng mon0
 
This will list all the Wireless LAN networks Available nearby, 
To Stop the scanning after noticing the target Wi-Fi network, Press cntrl+c
  
4.>Copy the MAC-ID or BSSID of the target network. For example,00:11:22:33:44:55,
 also note down the channel number ( my case was 3).
 
Now type the following Command in the Terminal,
 
 airodump-ng -c 3 -w wep  --bssid  00:11:22:33:44:55 mon0
 
5.> Open a New Terminal, and type:

              aireplay-ng -1 0 -a 00:11:22:33:44:55 mon0
 
 (if you see under #Data, you will notice its increasing slowly)
To Speed this #data value,
 
6.> Again Open a new Terminal and type:
 
        aireplay-ng -3 –b 00:11:22:33:44:55 mon0

--> wait till data reaches 30,000
7.> In capturing window, Press cntrl+C to top capturing data.
 
8.> Use the following command to list the Directory of saved captured Files. 

Dir
9.> Then, Type:
   
Aircrack-ng wep-01.cap
 
to crack the Wi-Fi password by mentioning the capture file (wep-01.cap).
 
10.> Now you jut have to wait, until the WEP-Key is Found.
 
11.> Please note that, some routers only Show HEX digits of the WEP key
To use this key in Windows to log on to a Wireless Network, Do not include
the Colons (:) between the HEX Pairs.
 
For Example, If you got the Key like 1A:2B:3C:4D:5F, then in windows while
connecting to the hacked Wi-Fi Network, use 1A2B3C4D5F (w/O colon sign).
!! Enjoy !! 


Best Configuration for a Continous Downloads Freak !! "Downloading PC"

Aim: To make a 24/7 Running Downloads/Uploads PC which consumes less power.

Motherboard : Intel Desktop Board D425KT with Embedded Intel Atom Single Core Processor at 1.8GHz ------------------------------------> Rs.3500

2GB DDR3 800 Corsair Value RAM          ------------> Rs.750

Iball/Circle nano cabinet (Mini/Micro ITX)  --------> Rs.1800

500gb Hard-Disk WD/Seagate               ---------> Rs.3500

Belkin USB Wi-Fi Adaptor                   ----------> Rs.650  (optional, if you want this box to be at some other location in your house) 
D-link DIR-600L Wireless N150 Router ----------> Rs.1500

Total ------------------------------>Rs.11,700 (with wireless connection)

 

Note:-
 
You can use this configuration with your existing PC's monitor by setting up Team viewer via LAN connection, and then accessing it via Screen sharing.
  • It is required that you have Router/Switch to share internet connection with this new PC.
  • Obviously you can use your old Cabinet to setup all the components too.
  • Connections can be made Wired or Wireless via Router.