Friday, 13 April 2012

Cracking WEP......

Types of Wi-Fi authentication:-
          Wi-Fi Authentication can be done by using Open authentication, WEP, WPA & WPA2 or may be some time MAC based authentication is also used. In Open authentication as per name suggest there is no authentication required it is like open for public to connect, this type of authentication is least secure. Second one is Wired Equivalency Protocol or WEP this type of authentication we use Shared Key for Authentication. A WEP key is composite of either 40bit or 128bit encryption, but still this type of authentication is not very much secured. WPA/WPA2 shared key authentication is very much secure than WEP the also use shared key authentication as WEP but the difference is in the WEP Access-Point send password to client machine in encrypted form as a challenge string then client send it back by solving the challenge string, but in the WPA/WPA2 client send the password string to the access-point and then access-point, so unlike password in not stored in client machine. In MAC-based authentication client is authenticated by using its MAC address this type of authentication is not secure or maybe I can say it is as weak authentication as open authentication.

Monday, 9 April 2012

Hacking SSL in LAN using ARP-Poisoning


Helo, everyone this time I am going to explain how to bypass SSL vpn security using arp-poising and sslstrip.
I am going to use BACKTRACK 5 and ettercap for this tutorial………..

I am going to explain this attack step by step

I have uploaded images in high resolution if you can’t see the image click on it and zoom it to see…

This type of attack is done for a specific victim and have an drawback, but still have more than 80% success rate. When we type gmail.com then your request is sent on port 80 from where it is redirected to port 443 at gmail server. In this attack we will come in the middle and then accept all request at port 80 and then redirect it to port 443.

Thursday, 8 March 2012

How to use Metasploit & Nmap

In this blog I will tell you how to use Metasploit and Nmap. Throughout the blog I will use Backtrack you can use any OS just download metasploit framework and nmap for that OS and install them.

First we need to understand basic terms
Vulnerability => a weakness which allows an attacker to break into/compromise a system`s security.
Exploit – code which allows an attacker to take advantage of a vulnerable system.
Payload- actual code which run on the system after exploitation.

Thursday, 23 February 2012

Download Torrent Using Direct download.....


Hey,
                Torrent is blocked in almost all colleges. So, this time I am going to tell you  how to download torrent files without using any torrent client like bittorent etc.
              

Monday, 28 November 2011


How to make your PC a web server for 
(Windows 7)


Have you ever thought of hosting your website using your PC as a server? Or you want to send a large file to your friend without uploading it to internet? All this is possible just by using your PC as a http:// server.

  • Make your PC http server

Now I am going to tell you how to make your PC a web server. To do that first you have to start few services in your window. To start those service follow the following steps:-
Step 1:-  go to  è control panal èuninstall & change a Program èturn windows features on and off
                Then you will see a window like this