Tuesday, 1 May 2018

Wifiphisher - Phishing attacks with fake WiFi clients

Wifiphisher - Automated victim-customized phishing attacks against Wi-Fi clients
About Wifiphisher
Wifiphisher logo

   Wifiphisher is a security tool that performs Wi-Fi automatic association attacks to force wireless clients to unknowingly connect to an attacker-controlled Access Point. It is a rogue Access Point framework that can be used to mount automated victim-customized phishing attacks against WiFi clients in order to obtain credentials or infect the victims with malwares. It can work as social engineering attack tool that unlike other methods it does not include any brute forcing. It is an easy way for obtaining credentials from captive portals and third party login pages (e.g. in social networks) or WPA/WPA2 pre-shared keys.


   Wifiphisher works on Kali Linux and is licensed under the GPL license.

How it works
   After achieving a man-in-the-middle position using Wi-Fi automatic association techniques (including "KARMA" and "Known Beacons" attacks), Wifiphisher by default redirects all HTTP requests to an attacker-controlled phishing page.

   From the victim's perspective, the  accesattack makes use in three phases:

   1, Victim is being deauthenticated from hers point. Wifiphisher continuously jams all of the target access point's wifi devices within range by forging “Deauthenticate” or “Disassociate” packets to disrupt existing associations.

   2, Victim joins a rogue access point. Wifiphisher sniffs the area and copies the target access point's settings. It then creates a rogue wireless access point that is modeled by the target. It also sets up a NAT/DHCP server and forwards the right ports. Consequently, because of the deauth attack and the automatic association techniques, clients will eventually start connecting to the rogue access point. After this phase, the victim is MiTMed.

   3, Victim is being served a realistic specially-customized phishing page. Wifiphisher employs a minimal web server that responds to HTTP & HTTPS requests. As soon as the victim requests a page from the Internet, wifiphisher will respond with a realistic fake page that asks for credentials or serves malwares. This page will be specifically crafted for the victim. For example, a router config-looking page will contain the brand of the victim's vendor. The tool supports community-built templates for different phishing scenarios.
Performing MiTM attack
Requirements: Following are the requirements for getting the most out of Wifiphisher:
 * Kali Linux. Although people have made Wifiphisher work on other distros, Kali Linux is the officially supported distribution, thus all new features are primarily tested on this platform.
 * One wireless network adapter that supports AP & Monitor mode and is capable of injection. For advanced mode, you need two cards; one that supports AP mode and another that supports Monitor mode. Drivers should support netlink.

Installation
   git clone https://github.com/wifiphisher/wifiphisher (Download Wifiphisher)
   cd wifiphisher
   sudo apt-get update && sudo apt-get install python-setuptools (If your Debian distributions have not installed library of Python setuptools)
   sudo python setup.py install (Install Wifiphisher)

   Alternatively, you can download the latest stable version from the Releases page.

Usage
   Run the tool by typing sudo wifiphisher or sudo python bin/wifiphisher (from inside the tool's directory).

   By running the tool without any options, it will find the right interfaces and interactively ask the user to pick the ESSID of the target network (out of a list with all the ESSIDs in the around area) as well as a phishing scenario to perform. By default, the tool will perform both Evil Twin and KARMA attacks.

   wifiphisher -aI wlan0 -jI wlan4 -p firmware-upgrade --handshake-capture handshake.pcap

   Use wlan0 for spawning the rogue Access Point and wlan4 for DoS attacks. Select the target network manually from the list and perform the "Firmware Upgrade" scenario. Verify that the captured Pre-Shared Key is correct by checking it against the handshake in the handshake.pcap file.
   Useful for manually selecting the wireless adapters. The "Firmware Upgrade" scenario is an easy way for obtaining the PSK from a password-protected network.

   wifiphisher --essid CONFERENCE_WIFI -p plugin_update -pK s3cr3tp4ssw0rd

   Automatically pick the right interfaces. Target the Wi-Fi with ESSID "CONFERENCE_WIFI" and perform the "Plugin Update" scenario. The Evil Twin will be password-protected with PSK "s3cr3tp4ssw0rd".
   Useful against networks with disclosed PSKs (e.g. in conferences). The "Plugin Update" scenario provides an easy way for getting the victims to download malicious executables (e.g. malwares containing a reverse shell payload).

   wifiphisher --noextensions --essid "FREE WI-FI" -p oauth-login -kB

   Do not load any extensions. Simply spawn an open Wi-Fi network with ESSID "FREE WI-FI" and perform the "OAuth Login" scenario. Use the "Known Beacons" Wi-Fi automatic association technique.
   Useful against victims in public areas. The "OAuth Login" scenario provides a simple way for capturing credentials from social networks, like Facebook.

   To see the help section, enter this command: wifiphisher -h

Screenshots
Targeting an access point
A successful attack
Fake router configuration page
Fake OAuth Login Page
Fake web-based network manager
Help needed
   If you are a Python developer or a web designer you can help us improve wifiphisher. Feel free to take a look at the bug tracker for some tasks to do.

   If you don't know how to code, you can help us by proposing improvements or reporting bugs. Please have a look at the Bug Reporting Guidelines and the FAQ document beforehand. Note that the tool does not aim to be script-kiddie friendly. Make sure you do understand how the tool works before opening an issue.

Credits: The script is based on an idea from Dan McInerney back in 2015. A full list of contributors lies here.

License: Wifiphisher is licensed under the GPL license. See LICENSE for more information.

Project Status
   Wifiphisher's current version is 1.4. You can download the latest release from here. Otherwise you can get the latest development version by cloning this repository.

Disclaimer
   Usage of Wifiphisher for attacking infrastructures without prior mutual consistency can be considered as an illegal activity. It is the final user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program.

Note
   Be aware of sites pretending to be related with the Wifiphisher Project. They may be delivering malware.

    For Wifiphisher news, follow us on Twitter or like us on Facebook.

Enable Google AMP (Accelerated Mobile Pages) on Blogger Blogs with this Easy Gauide

Hi Guys Welcome In My Blog And Today I Teach you A Simple Trick To Enable Google AMP (Accelerated Mobile Pages) on Your Blogger Blogs.

So Let's Get Started.

If you have a working blogger blog or a website without AMP support Follow This Steps.

  1. First Go-to Blogger.com And login into your Account.
  2. And Navigat to theme Section And click on edit HTML And search <head> Tag in you HTML 


First You Need To Know That After Enabling AMP On Your Blogger Blogs You Get Many AMP Errors In Your Search Console
Enable Google AMP (Accelerated Mobile Pages) on Blogger Blogs with this Easy Gauide

Monday, 30 April 2018

[WARHOX] How to install kali linux on vmware in hindi / How to install kali linux 2018.1/ easy way


DISCLAIMER: This Channel DOES NOT Promote or encourage Any illegal activities , all contents provided by This Channel is meant for EDUCATIONAL PURPOSE only .

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

-------------------------------------------------------------
download vmware & virtual machine

download hear


download kali linux image file

hear website

https://www.offensive-security.com/

how to install step by step hear video


Guest Posting

Guest blogging is a method used by bloggers to increase blog traffic where bloggers write posts to be published on other bloggers' blogs. Guest posts and guest posting is where a writer who owns his or her own blog creates a unique and original post on another blog or site with a mention of the author and usually their blog at the bottom of the article. Guest posting can help build brand awareness with a different audience and help drive new traffic to your site. 


Beware that many websites use guest blogging as a way to build links to their website. If the primary reason for having a guest post published is to insert links back to another website, this is frowned upon by search engines. In fact, Google often penalizes sites that use guest posting for SEO link building purposes and asks that sites nofollow links going back to the guest author's site.

Guest blogging is also a great way to establish yourself as an authority figure within your market and build relationships with other bloggers and experts within your field. It's an opportunity to take your expertise and share it with others, as well as an opportunity to increase traffic to both parties’ blogs. Since guest blogging should be a two-way street, when hopping on the bandwagon, you should also consider featuring posts developed by guest bloggers. Featuring guest posts will also expose your audience to a new perspective and fresh new content. 

With the right kind of content on the top blogs, you can do all three of these things. If you are trying to accomplish either Number 1 or Number 2, then you will want to find blogs that have a good sized and engaged audience. If you are just trying to accomplish Number 3, then you need to pinpoint blogs with strong root domain authority. You can check this for free using the SEOmoz toolbar. Knowing your goals in advance will help you in determining which blogs will be the best for you to submit guest posts to.

Before you get started, make sure you are clear about what you are looking to get out of the guest blogging experience. This will help you find businesses that you may be interested in blogging for and also give you an idea of some guest bloggers you would like invite to post on your business’s blog.

Research is essential to guest blogging; with that in mind, focus on finding writers within your niche and your market. Also, be sure that your writers are coming from a respected business or background. You should also agree with what they are saying and have it align with your personas interests. Guest blogging is great but it can easily turn into a domino effect when the content doesn't align with your business, personas or your tone of voice.

Blogging as a guest is a great way to increase your site rank in Google searches because of the links that exist back to your site from the blog you are appearing on. The way Google sees it; if other people are interested in your site it must be interesting. So when individuals comment, share, like or link to your blog it moves up in Google’s PageRank, which means it’s more likely to pop up when someone Google searches a relevant topic.

Here we offer a service of publishing your articles in site DA+50 with dofollow links. Please check the list of guest post links below:


Sunday, 29 April 2018

Fluxion - The number 1 WiFi Cracking Tool

Fluxion - The number 1 WiFi Cracker
Fluxion is a remake of linset by vk496 with less bugs and enhanced functionality.
See Fluxion site: https://fluxionnetwork.github.io/fluxion/


Fluxion is the future of MITM WPA attacks
   Fluxion is a security auditing and Social-Engineering research tool. It is a remake of linset by vk496 with (hopefully) less bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack. It's compatible with the latest release of Kali (rolling). Fluxion's attacks' setup is mostly manual, but experimental auto-mode handles some of the attacks' setup parameters. Read the FAQ before requesting issues.

   If you need quick help, fluxion is also avaible on gitter. You can talk with us on Gitter or on Discord.

Screenshot (On Kali Linux 2018.1)


Installation

   Read here before you do the following steps:

   
git clone https://github.com/FluxionNetwork/fluxion (Download Fluxion)
   cd fluxion
   sudo bash ./fluxion.sh (Run Fluxion)

📜 Changelog: Fluxion gets weekly updates with new features, improvements, and bugfixes. Be sure to check out the changelog here.

How to contribute
   All contributions are welcome! Code, documentation, graphics, or even design suggestions are welcome; use GitHub to its fullest. Submit pull requests, contribute tutorials or other wiki content -- whatever you have to offer, it'll be appreciated but please follow the style guide.

How it works ?
 * Scan for a target wireless network.
 * Launch the Handshake Snooper attack.
 * Capture a handshake (necessary for password verification).
 * Launch Captive Portal attack.
 * Spawns a rogue (fake) AP, imitating the original access point.
 * Spawns a DNS server, redirecting all requests to the attacker's host running the captive portal.
 * Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key.
 * Spawns a jammer, deauthenticating all clients from original AP and lureing them to the rogue AP.
 * All authentication attempts at the captive portal are checked against the handshake file captured earlier.
 * The attack will automatically terminate once a correct key has been submitted.
 * The key will be logged and clients will be allowed to reconnect to the target access point.
 * For a guide to the Captive Portal attack, read the Captive Portal attack guide

Requirements
   A Linux-based operating system. GitHackTools recommend Parrot Security OS or Kali Linux. Kali Linux & Parrot Security OS support the latest Aircrack-ng versions. An external wifi card is recommended.

Credits
 * l3op - contributor
 * dlinkproto - contributor
 * vk496 - developer of linset
 * Derv82 - @Wifite/2
 * Princeofguilty - @webpages and @buteforce
 * Photos for wiki @http://www.kalitutorials.net
 * Ons Ali @wallpaper
 * PappleTec @sites
 * MPX4132 - Fluxion V3

Disclaimer
   Authors do not own the logos under the /attacks/Captive Portal/sites/ directory. Copyright Disclaimer Under Section 107 of the
Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research.

   The usage of Fluxion for attacking infrastructures without prior mutual consent could be considered an illegal activity, and is highly discouraged by its authors/developers. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program.

Note
 * Beware of sites pretending to be related with the Fluxion Project. These may be delivering malware.
 * Fluxion DOES NOT WORK on Linux Subsystem For Windows 10, because the subsystem doesn't allow access to network interfaces. Any Issue regarding the same would be Closed Immediately

Links
 * Fluxion website: https://fluxionnetwork.github.io/fluxion/
 * Discord: https://discordapp.com/invite/G43gptk
 * Gitter: https://gitter.im/FluxionNetwork/Lobby