Showing posts with label Backtrack/Linux. Show all posts
Showing posts with label Backtrack/Linux. Show all posts

Saturday, February 22, 2014

How To Hack Wifi With Aircrack-ng Full Tutorial


How To Hack Wifi With Aircrack-ng Full Tutorial
Wifi hacking full method hack wifi with aircrack-ng backtrack 5 r3 For More backtrack tutorials click here

Description:
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools.

In fact, Aircrack-ng is a set of tools for auditing wireless networks.

Download & Watch Full Wifi Hacking Tutorial

If You Want Private Help Click Here


If You Like My Post Please Share Like & Subscribe For More Tutorials






Tuesday, December 17, 2013

DNSENUM TUTORIAL - DNS INFORMATION GATHERING TOOL | KYB TUTORIAL 2

Hey Friends, we are back with Know your Backtrack i.e. KYB Tutorial 2. Today we will learn about another information gathering tool DNSENUM. The purpose of Dnsenum is to gather as much information as possible about a domain. Basically its an perl script and it performs below operations:

1) Get the host’s addresse (A record).
2) Get the namservers (threaded).
3) Get the MX record (threaded).
4) Perform axfr queries on nameservers and get BIND versions(threaded).
5) Get extra names and subdomains via Google scraping (Google query = “allinurl: -www site:domain”).
6) Brute force subdomains from file, can also perform recursion on subdomain that have NS records (all threaded).
7) Calculate C class domain network ranges and perform whois queries on them (threaded).
8) Perform reverse lookups on net ranges ( C class or/and whois net ranges) (threaded).
9) Write to domain_ips.txt file ip-blocks.



DNSENUM TUTORIAL - DNS INFORMATION GATHERING TOOL | KYB TUTORIAL 2

DNSENUM Tutorial - KYB 2


So let's start with a basic example, suppose we want to gather DNS information of domain say hackingloops.com then how we will proceed:

1. To start DNSENUM, First start the backtrack then follow below path:


Backtrack >> Information Gathering >> Network Analysis >> DNS Analysis >> dnsenum

Now terminal will open with DNSENUM script loaded with list of all sub commands that we can use with DNSENUM.

2. Now to gather DNS information of hackingloops type below command in terminal :
./dnsenum.pl hackingloops.com

Below are screenshots
DNSENUM Tutorial
DNSENUM Tutorial : How to use DNSENUM

DNSENUM Tutorial

Continued

 So we can see by just giving simple command we have name servers, mail servers, host address and much more things. The results vary from website to website and scope enhances when there are sub domains in the target website.

We can also use DNSENUM to scrap the sub domains of a website from Google. For doing this we need to type below command :

./dnsenum.pl -p 1 -s 1 example.com

Scrapping will not work on those websites which do not have sub domains and for those websites which has restricted wild card scrapping.


That's all for today frens. Hope this helps, you can practice multiple combinations and sub commands mentioned below to extract juicy information regarding DNS's for any domain.

COMMANDS ENCYCLOPEDIA :
GENERAL OPTIONS:
  –dnsserver  Use this DNS server for A, NS and MX queries.
  –enum  Shortcut option equivalent to –threads 5 -s 20 -w.
  -h, –help  Print this help message.
  –noreverse  Skip the reverse lookup operations.
  –private  Show and save private ips at the end of the file domain_ips.txt.
  –subfile  Write all valid subdomains to this file.
  -t, –timeout  The tcp and udp timeout values in seconds (default: 10s).
  –threads  The number of threads that will perform different queries.
  -v, –verbose  Be verbose: show all the progress and all the error messages.                        

GOOGLE SCRAPING OPTIONS:
  -p, –pages  The number of google search pages to process when scraping names, 
   the default is 20 pages, the -s switch must be specified.
  -s, –scrap  The maximum number of subdomains that will be scraped from Google.

BRUTE FORCE OPTIONS:
  -f, –file  Read subdomains from this file to perform brute force.
  -u, –update Update the file specified with the -f switch with valid subdomains.

 a (all)  Update using all results.

 g  Update using only google scraping results.
  r  Update using only reverse lookup results.
  z  Update using only zonetransfer results.
  -r, –recursion Recursion on subdomains, brute force all discovred subdomains that have an NS record.

WHOIS NETRANGE OPTIONS:
-d, –delay  The maximum value of seconds to wait between whois queries, the value is defined randomly, default: 3s.
  -w, –whois  Perform the whois queries on c class network ranges.
   
REVERSE LOOKUP OPTIONS:

  -e, –exclude  Exclude PTR records that match the regexp expression from reverse lookup results, useful on invalid hostnames.

OUTPUT OPTIONS:

  -o –output  Output in XML format. Can be imported in MagicTree

HOW TO INSTALL NESSUS ON BACKTRACK 5 - ENABLE NESSUS ON BACKTRACK

HOW TO INSTALL NESSUS ON BACKTRACK 5 - ENABLE NESSUS ON BACKTRACK

Nessus 4.4.1 now comes pre-installed on BackTrack 5 and requires that the user activate the installation. Before you activate Nessus on your BackTrack 5 installation, be certain you have installed Nessus either to the hard drive on the computer you plan to use or inside of a virtual machine that you plan to keep on the same host system. If you activate Nessus on a bootable USB thumb drive, DVD or a virtual machine and move it to a new host system, the Nessus activation code will no longer be valid. The Nessus activation ties itself to the physical system on which it is installed. If you do decide to move the virtual machine to a new system, or jump around to different systems using a bootable USB thumb drive or DVD, you will have to re-activate Nessus. If you are using a Nessus ProfessionalFeed, you are allowed to reset your activation by clearing the current connection between a host and an activation code. By logging into the Tenable Customer Support Portal and going to "Activation Codes", you can reset the activation code-to-host pairing. ProfessionalFeed users are currently limited to one reset every 30 days. HomeFeed users will need to re-register Nessus when moving between physical hosts.
Install and activate Nessus on Backtrack 5r3

Step 1 - Obtaining An Activation Code

Once you have Nessus installed on BackTrack 5, you will need to obtain a Nessus activation code.  If you are using Nessus at home or wish to evaluate Nessus, you can register a HomeFeed. It’s important to note that the HomeFeed is limited to 16 IP addresses per scan (whereas the ProfessionalFeed allows you to scan an unlimited number of IP addresses). The ProfessionalFeed also gives you access to features such as Configuration and Sensitive Data Auditing, SCADA plugins, Nessus Technical Support and access to the Tenable Customer Portal.
Step 2 - Activating Nessus
Be certain that your BackTrack 5 installation has access to the Internet and activate Nessus using your newly obtained activation code as follows:

Activating Nessus

Activating Nessus


As shown above, this will also initially download the appropriate plugins based on which feed you've chosen.

Step 3 - Creating A User Account

Now you will create the initial user account that will be used to login to the Nessus Web Interface:

Add user in nessus

Adding User in Nessus

After you've entered a username, the nessus-adduser program asks you if the user account should have admin privileges or not. It is recommended that the initial user account have admin privileges so you can use the Nessus Web Interface to create subsequent accounts. The only difference between a Nessus admin user and a regular user is the ability to create user accounts.

Step 4 - Starting Nessus

Starting Nessus on Backtrack
Starting Nessus on Backtrack
Step 5 - Accessing the Nessus Web Interface

Once Nessus has been initially started, it will begin to index and compile all of the plugins. This can take some time, depending on the speed of your system. If Nessus is still processing plugins, you may see the following screen when accessing the web interface:

Initializing Nessus

Initializing Nessus

The web interface can be accessed with your browser by making an HTTPS connection to TCP port 8834 (e.g. https://localhost:8834/). If you are using a browser local to the BackTrack 5 distribution, such as the supplied version of Firefox, be certain that you enable Flash and JavaScript for this site (Flash is required to access the Nessus Web Interface, and JavaScript is required to view some of the reports). You can also access the Nessus Web Interface remotely by using the IP address assigned to BackTrack 5 (e.g. https://192.168.1.250:8834/).


That's all friends, now enjoy Nessus over Backtrack.

Thursday, December 5, 2013

Backtrack 5 R3 32/64 Bit

Backtrack 5 R3 32/64 Bit Free Download Full Version

Download Backtrack 5 R3 32/64 Bit Full Version Mediafire link backtrack 5 r3 Full Version Download With Torrent From Mediafire Link Backtrack 5 R3 Full Version For Professional Hackers.







Friday, November 15, 2013

Project IP-Digger v2.0 released by Team Xnonymoux (Mr,Me)


IP Digger is a free pentesting tool for finding the Vulnerable websites on the Particular IP Address Given By the Attacker :) . As it is the first tool of the Freak Coderz first =))
It works perfectly on Backtrack 5 r3 :)) 
+++++++++++++++++++++++++++++++++++++++++++++
Project Name :- IP-Digger v2.0 
+++++++++++++++++++++++++++++++++++++++++++++

IP-Digger is for the Hackers or we can pentesters or the web admins who want to find the vulnerable websites if they have the Shared hosting. This tool can minimize the risk of getting hacked by finding the Several Vulnerable websites.
For Hackers it is a great tool for finding the vulnerable website in their Target and exploit it and then Easily defacing :)
Tool Name :- IP-Digger v2.0 The Disaster
Coded by :- (HHA) Emi Haxor ( Pakistani Hackers )
Features of IP - Digger
1) ADVANCE SQLI Vulnerable Website Finder
2) ADVANCEXSS Vulnerable Website Finder
3) ADVANCELFI Vulnerable Website Finder
4) ADVANCERFI Vulnerable Website Finder
5) ADVANCE Admin Panels
6) ADVANCE Upload Vulnerability sites finder
7) ASP SERVER BASED SCRIPT ADDED
 Joomla and Wordpress website finder
9 BUgs LeeCher section added
Download Link :-
-------------------------------------
--------------------------------------------
Everyones suggestions will be appreciated :)
=======
Regards
=======
+++++++
Mr,Me
+++++++

Monday, November 11, 2013

How to Install Flash Player v11 on Backtrack Linux 5r3

Backtrack Linux is one of the most used Operating System by Hackers and some of very important Hacking tools on Backtrack requires Flash player to run example Nessus etc.. Flash player usually works correctly over 32 bit Linux but there are lot of issues while installing Flash player on 64 bit. We all know that recently all processors support 64 bit operating system reason is simple efficient processing, higher ram support and long ALU's and much more. Today i am teach you how to install Flash Player v11.x.x on Backtrack Linux 5r3 or any 64 bit Linux GNOME. As we all know 64 bit versions of software's are still not perfect to use, reason for 64 bit versions to work perfectly on PC or laptop machines it requires all processors and motherboard buses to support 64 bit and practically its not still the case because technology is still too costly and only high end Laptops supports it. None of Laptop manufacturer and assembling companies gives peoples assurance that 64 bit Operating Systems will run perfectly without software glitches. So for better performance, its still considered that we should install 32 bit versions of all such conflicting software's for example Flashplayer, Shockwave player etc. Lets learn how to install 32 bit Flash player over Backtrack Linux 5r3.


How to Install Flash Player v11 on Backtrack Linux 5r3

=================================================================================
Backtrack Linux comes with pre installed Flash player version but that does not works correctly, so in order to correct this issue first of all we need to remove the existing copy of the Flash player installed on Firefox. 

Step 1 : Open the terminal in the Backtrack Linux and run the below commands in the terminal in order to remove the pre installed Flash Player.


aptitude purge flashplugin-nonfree flashplugin-installer gnash gnash-common mozilla-plugin-gnash swfdec-mozilla

rm -f /usr/lib/firefox/plugins/libflashplayer.so

rm -f /usr/lib/mozilla/plugins/libflashplayer.so

rm -f /usr/lib/mozilla/plugins/flashplugin-alternative.so

rm -f /usr/lib/mozilla/plugins/npwrapper*flash*so

rm -f ~/.mozilla/plugins/*flash*so


Note aptitude purge command will remove files, dependencies, and configurations, while the latter removes files and dependencies. This removes the existing Flash Player.

Step 2 : In this step, Kill all the instances of Firefox over the Backtrack Linux. We can kill all the instances of Firefox by running below command in terminal:

killall -9 /opt/firefox/firefox-bin

Step 3 : In this step we will install latest Flash player over Backtrack Linux. We are using wget in terminal here, but if Adobe changes the download link, please change the command accordingly, or just download the Flash installer from their website. We will be using wget in the following:

wget fpdownload.macromedia.com/pub/flashplayer/updaters/11/flashplayer_11_plugin_debug.i386.tar.gz
Now run the below commands in the terminal to install:

tar xvzf install_flash_player_11_linux.i386.tar.gz

mkdir ~/.mozilla/plugins

mv libflashplayer.so ~/.mozilla/plugins/

Then just delete everything else that got extracted. You should be good to go, and Nessus should be running fine. 

That's all! Now enjoy all the software's over Backtrack Linux that requires Flash Player. 

Hope you all enjoyed! If you face any issues contact us by writing comments below.
=================================================================================