Thursday, 3 May 2018

PixieWPS - An offline WiFi Protected Setup bruteforce utility

PixieWPS - An offline WiFi Protected Setup bruteforce utility
Overview
   PixieWPS is a tool written in C used to bruteforce offline the WPS PIN exploiting the low or non-existing entropy of some software implementations, the so-called "pixie-dust attack" discovered by Dominique Bongard in summer 2014. It is meant for educational purposes only.

   As opposed to the traditional online brute-force attack, implemented in tools like Reaver or Bully which aim to recover the pin in a few hours, this method can get the PIN in only a matter of seconds or minutes, depending on the target, if vulnerable.

   Since version 1.4, it can also recover the WPA-PSK from a complete passive capture (M1 through M7) for some devices (currently only some devices which work with --mode 3).


   It all started as a project from the community, more details can be found here:
    * Pixiewps: wps pixie dust attack tool
    * WPS Pixie Dust Attack (Offline WPS Attack)
   You can also visit the wiki.

Requirements

   sudo apt-get -y install build-essential

    * Prior versions of 1.2 require libssl-dev
    * Versions 1.4 and later make use of multi-threading and require libpthread (POSIX threads)
   OpenSSL has also been re-introduced as optional to achieve better speeds. See the Build section.

Installation
   git clone https://github.com/wiire/pixiewps (Download PixieWPS)
   sudo apt-get -y install build-essential (Requirements)
   cd pixiewps*/ && sudo make (Build)
   sudo make install (Install PixieWPS)

Usage
   To see help menu, enter this command: pixiewps -h

root@kali:~# pixiewps -h


 Pixiewps made by wiire


 Usage: pixiewps <arguments>


 Required Arguments:


    -e, --pke      : Enrollee public key

    -r, --pkr      : Registrar public key
    -s, --e-hash1  : E-Hash1
    -z, --e-hash2  : E-Hash2
    -a, --authkey  : Key used in HMAC SHA-256

 Optional Arguments:


    -n, --e-nonce  : Enrollee nonce

    -S, --dh-small : Small Diffie-Hellman keys (--pkr not needed)

    -h, --help     : Display this usage screen


Usage Example
 Enter: sudo pixiewps \

root@kali:~# sudo pixiewps \

>    -a 7f:de:11:b9:69:1c:de:26:4a:21:a4:6f:eb:3d:b8:aa:aa:d7:30:09:09:32:b8:24:43:9b:e0:91:78:e7:6f:2c \
>    -e d4:38:91:0d:4e:6e:15:fe:70:f0:97:a8:70:2a:b8:94:f5:75:74:bf:64:19:9f:92:82:9b:e0:2c:c0:a3:75:48:08:8f:63:0a:82:37:0c:b7:95:42:cf:55:ca:a5:f0:f7:6c:b2:c7:5f:0e:23:18:44:f4:2d:00:f1:da:d4:94:23:56:c7:2c:b0:f6:87:c7:77:d0:cc:11:35:cf:b7:4f:bc:44:8d:ca:35:8a:78:3d:99:7f:2b:cf:44:21:d8:e2:0f:3c:7d:a4:72:c8:03:6f:77:2a:e9:fa:c1:e9:a8:2c:74:65:99:5a:e0:a5:26:d9:23:5e:4e:ec:5a:07:07:ab:80:db:3f:5f:18:7f:fa:fa:f1:57:74:b2:8d:a9:97:a6:c6:0a:a5:e0:ec:93:09:23:67:f6:3e:ec:1f:55:32:a4:5d:73:8f:ab:91:74:cf:1d:79:85:12:c1:81:f5:ea:a6:68:9d:8e:c7:c6:be:01:dc:d9:f8:68:80:11:55:d7:44:6a \
>    -r bc:ad:54:2f:88:44:7c:12:69:ef:34:31:4a:17:1c:92:b1:d7:06:4c:73:be:9f:d3:ed:87:63:74:10:46:0f:46:8c:36:b5:d4:a0:ba:af:85:9c:b2:30:42:d7:59:43:75:5a:d7:79:96:fb:ee:7b:66:db:b7:a8:f9:22:9c:a5:d3:b8:e7:c0:c4:5c:58:34:1f:56:a8:1a:41:a8:d2:e8:f6:3e:c9:3a:93:d9:9b:59:5c:a8:e0:78:84:6c:fc:05:e8:76:a3:e6:3b:33:94:4a:a9:ff:50:fb:60:fa:97:3b:6d:cc:04:f1:5e:36:24:a9:06:7a:f8:6b:00:e9:71:9d:89:be:9c:b2:9c:1f:ca:6d:d6:4d:ab:46:3d:b3:11:1f:8d:40:f7:c8:a4:39:48:c5:ca:1b:f6:30:95:7d:d9:68:41:ef:0a:37:b2:4a:37:e4:a4:b0:dd:7e:c1:af:3e:66:ea:bf:16:0a:7a:8a:05:00:01:a4:29:77:a9:d4:81:d4:0e \
>    -s 90:5f:f5:7d:93:e5:c4:3c:62:0d:26:65:dd:59:57:d5:ba:ba:f1:b7:30:91:72:7c:54:94:38:08:1e:13:35:38 \
>    -z b0:2b:07:50:28:e7:6e:5f:fa:27:1b:31:92:85:43:cb:c5:6a:ec:73:e2:27:c3:b9:80:ec:5b:ed:88:f0:1e:ec

[*] ES-1: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00

[*] ES-2: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
[*] PSK1: d4:eb:0c:2a:38:15:e1:a0:3d:70:db:74:31:eb:53:a3
[*] PSK2: d3:b7:e6:23:f3:1d:22:0a:23:ea:07:bb:7f:76:65:8b
[+] WPS pin: 04847533

[*] Time taken: 0 s


8 Ball Pool Mod v3.13.5 By Game Killer

8 Ball Pool - UNLIMITED MONEY


👇FEATURES OF THIS HACK👇

(1) UNLIMITED MONEY

(2) UNLIMITED FORCE ON ALL CUE

(3) UNLIMITED GUIDELINE MOD

(4) UPDATED VERSION

(5) GAME KILLER MOD ENABLE

(6) *NO ROOT*

(7) Etc...

FRIENDS MY ALL MODS ARE FREE SO PLEASE SUPPORT MY CHANNEL AND HELP ME TO GET MORE SUBSCRIBES




Fill The Captcha


To Luarn How To Hack Any Games Subscribe Hack Now Channel


[WARHOX] TOP 5 MOST USEFULL TRICKS



tricks #5

"google orbit"

"google epic"

"google space"

"PACMAN"

"google in 1998"


Google is awesome. Yes, there have been questions raised about its new privacy policy and creepy Safari tracking and frankly, it just knows way too much about everyone who has ever created a Google account. But let’s put that aside for a moment and focus on all its cool quirks, shall we?
They’re built into practically every Google product — if you look hard enough, you’ll find that entering the right search term or typing a code can make Google collapse, spin or create fictional characters. Here are 15 easter eggs (hidden, entertaining things developers build into a website or program) for you to discover the next time you’re Googling.





Wednesday, 2 May 2018

Kali Linux 2018.2 Release

Kali Linux 2018.2 Release
This Kali release is the first to include the Linux 4.15 kernel, which includes the x86 and x64 fixes for the much-hyped Spectre and Meltdown vulnerabilities. It also includes much better support for AMD GPUs and support for AMD Secure Encrypted Virtualization, which allows for encrypting virtual machine memory such that even the hypervisor can’t access it.

Easier Metasploit Script Access

   If you spend any significant amount of time writing exploits, you are undoubtedly familiar with the various Metasploit scripts that are available, such as pattern_create, pattern_offset, nasm_shell, etc. You are likely also aware that all of these helpful scripts are tucked away under /usr/share/metasploit-framework/tools/exploit/, which makes them more than a little difficult to make use of. Fortunately, as of metasploit-framework_4.16.34-0kali2, you can now make use of all these scripts directly as we have included links to all of them in the PATH, each of them prepended with msf-.

root@kali:~# msf-
msf-egghunter          msf-java_deserializer  msf-nasm_shell
msf-exe2vba            msf-jsobfu             msf-pattern_create
msf-exe2vbs            msf-makeiplist         msf-pattern_offset
msf-find_badchars      msf-md5_lookup         msf-pdf2xdp
msf-halflm_second      msf-metasm_shell       msf-virustotal
msf-hmac_sha1_crack    msf-msf_irb_shell

root@kali:~# msf-pattern_create -l 50 -s ABC,123
A1A2A3B1B2B3C1C2C3A1A2A3B1B2B3C1C2C3A1A2A3B1B2B3C1


Package Updates

   In addition to the above changes, there have been updates to a number of applications including Bloodhound, Reaver, PixieWPS, Burp Suite, Hashcat, and more. Since there are far too many packages to include in a default ISO, to see the full list of changes, we encourage you to review the Kali Changelog.

Download Kali Linux 2018.2

   If you would like to check out this latest and greatest Kali release, you can find download links for ISOs and Torrents on the Kali Downloads page along with links to the Offensive Security virtual machine and ARM images, which have also been updated to 2018.2. If you already have a Kali installation you’re happy with, you can easily upgrade in place as follows.

   root@kali:~# apt update && apt full-upgrade

   As always, if you encounter any bugs at all, we implore you to open a report on our bug tracker. We can’t fix what we don’t know about.


What's new in Kali Linux 2018.2 ?
   New Tool Requests: Ropper v1.10.10 - Display info about files in different formats & find gadgets to build ROPs chains (sbrun)

   Tools Upgrade:
    * Bloodhound v1.5.1 (sbrun)
    * OWASP JoomScan Project update (sbrun)
    * Update ExploitDB-Papers (g0tmi1k)
    * Update ExploitDB-Bin-Sploits (g0tmi1k)
    * hashcat v4.0.0 available (sbrun)
    * Update SecLists v1.3 (g0tmi1k)
    * burpsuite 1.7.32 available (sbrun)
    * Upgrade Burpsuite to 1.7.30 (sbrun)
    * reaver v1.6.4 released (muts)
    * pixiewps v1.4.2 released (sbrun)

   Kali Package Bug
    * Dradis fails to run (sbrun) - resolved
    * jsql injection not working even update new version - resolved
    * Gnome NetworkManager OpenVPN immediately disconnecting (rhertzog) - resolved
    * inetsim pem key file is owned by root user - resolved
    * PROBLEM WITH INSTALLING XPLICO ON KALI LINUX (sbrun) - resolved
    * btscanner crashes with the "b" (brute force scan) option (sbrun) - resolved
    * arachni doesn't run with using sudo anymore - resolved

   General Bug: Kali desktop theme background doesn't work for 2560x1600 resolutions (sbrun) - resolved

   Kali Package Improvement
    * Make msfdb more verbose (g0tmi1k)
    * Update Usage Examples of wpscan (g0tmi1k)
    * Add Kali.Training to Firefox Bookmark (sbrun)
    * Make openvas-* more verbose (g0tmi1k)
    * Make beef-xss start/stop more verbose & menu updates (g0tmi1k)
    * Make xplico start/stop more verbose & menu updates (g0tmi1k)
    * Make dradis start/stop more verbose & menu updates (g0tmi1k)
    * Responder - Add ./Tools/* into $PATH (sbrun)

    * metasploit framework's pattern_create and offset (Add to $PATH) (g0tmi1k)

Read more
 * Kali Linux 2017.3 Release
 * Parrot Security OS 3.11 Release


Fix PUBG Mobile Error Code 154140712


Hey Guys Welcome in My Blog And Today I Fix PUBG Mobile Error Code 154140712 

So Lets Get Started.

  • The main problem Of this error code is that
  • Tencent Games Did not Release In Some country's and some time PUBG mobile version Did not ditect your real region and they show you this Error.
To Solve This Error use a VPN connection in your phone with a valid region And i recommende OPERA VPN for this solution install it it's free available on play store.

And Watch This Video Gauide.


Fix PUBG Mobile Error Code 154140712