Thursday 27 June 2013

WiFi Slax Wireless Hacking Live CD 3.1

 WiFi Slax Wireless Hacking Live CD 3.1



WiFi Slax Wireless Hacking Live CD 3.1*

WiFi Slax Wireless Hacking Live CD 3.1*


WiFi Slax Wireless Hacking Live CD 3.1 | 635 Mb


Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, "It doesn't matter if you use 128 bit WEP keys, you are vulnerable!"
WEP Hacking - The Next Generation
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of "strong"encryption while a 128 bit key has 104. The IV is placed in encrypted frame's header, and is transmitted in plain text.

Traditionally, cracking WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets? a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.

Basic Directions:
1)Boot from cd
2)Get the wep key
3)Write it down
4)Reboot into windows
5)Connect using wep key

download
part 1
part 2
part 3

Hacking Software: SpyBoss KeyLogger Pro 4.2.3

 Hacking Software: SpyBoss KeyLogger Pro 4.2.3



Spy Boss Key Logger Pro 4.2.3  4.19 Mb



SpyBoss KeyLogger Pro 4.2.3 pal certainly all familiar with the words keylogger which is one of the most prominent hackers weapon and of course 100% works well to record all keyboard activity on the victim's computer. With all the activity keylogger keyboard work will be recorded automatically with no known casualties so hackers can take over all the data about our own personal accounts such as facebook, email, banking and other accounts.


SpyBoss KeyLogger Pro 4.2.3 Features:

    Secretly Monitor with this feature is certainly shared by every software keylogger, which monitors all activities or activities performed by the keyboard to steal the victim's information secretly.
    Password Protection
    this feature allows you to give the password on this keylogger software so that no one else can access or launch this software.
    Stealth Mode
    here's the best feature of this software. With this feature, you can hide this software for no one knows if you're using this leading software.
    Encrypted Data Files
    all data that has been stored will be encrypted with a secure, so if someone finds your log files, they still will not be able to read it. The log file can only be read using this software.
    Email Log Files
    with this you can send the log files from anywhere on the computer that has installed this keylogger to your email address.
    Record Usernames And Passwords
    with this feature you can steal usernames and passwords of the victim when they open a site like facebook, email, twitter and other sites that use the login / sign-ins.

download

Ethical Hacking Video Training 2.31 GB

 Ethical Hacking Video Training 2.31 GB



Ethical Hacking Video Training 2010 | (2.31Gb)


Ethical Hacking Video Training 2010 | (2.31Gb)






Ethical Hacking Video Training
Size: 2.31GB


VTC Ethical Hacking & Penetration

15 Step to Hacking Windows Using Evilgrade 2.0 on Backtrack 5

 15 Step to Hacking Windows Using Evilgrade 2.0 on Backtrack 5



What is Evilgrade?
Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates. It comes with pre-made binaries (agents), a working default configuration for fast pentests, and has it's own WebServer and DNSServer modules. Easy to set up new settings, and has an autoconfiguration when new binary agents are set.


From : http://www.infobytesec.com Requirement :


1. Evilgrade


2. Backtrack 5


Step By Step :


1. Extract Evilgrade then run it using the command below


tar xvfz isr-evilgrade-2.0.0.tar.gz cd isr-evilgrade-2.0.0.tar.gz/ ./evilgrade

Secure Sockets Layer (SSL) - An Introduction





Secure Sockets Layer (SSL) - An Introduction 



 

In the OSI model a reference model for effective communication we find a layer named transport layer. Just like a physical layer (where viruses attack normally) transport layer also need some sort of security because transport layer is responsible for transmission of data.
So what actually makes transport layer to make the transmission secure and to protect the data from any intruder.

Have you ever noticed that when you visit some website it starts with http:// and whenever you visit some sort of money transfer and other important websites you find https:// point is clear https means a secure communication it means that your data that transfer from this connection secure by using some cryptography techniques.

SSL or secure sockets layer are cryptographic protocols that provide secure communication over the Internet. So what actually a cryptography is " Cryptography is a science of secrete communication".
SSL uses two keys to encrypt data − a public key known to everyone and a private or secret key known only to the recipient of the message.  

HTTP VS HTTPS 






The above picture shows that when ALICE sends the confidential information over insecure channel that there is a chance to sniff this confidential information (it might be a credit card information or may be your password etc). So the point is that an attacker can easily sniff this data and can easily read, understand and use for illegal activities because the data transfer in plain text regardless of any encryption it is simply a HTTP connection. 





Now consider the second picture when an user send some sort of information over secure channel means if someone using HTTPS than the data first encrypt by using cryptography technique than it sends over channel, so in this case if someone sniff this data than he/she not able to understand it. 

The above broad picture has clearly shows that HTTPS is secure, but how HTTPS is secure? Because it uses secure sockets layer (SSL). A website can implement HTTPS by purchasing an SSL Certificate.

Where there's a will there's a way. By following this amazing quote some researcher has discovered some ways to crack/hack SSL certificate too. To hack SSL certificate we will post an article later on.