Pages

Tampilkan postingan dengan label hacking. Tampilkan semua postingan
Tampilkan postingan dengan label hacking. Tampilkan semua postingan

Selasa, 27 April 2010

Wireless Hacking Live - FBI Version ISO


Wireless Hacking Live - FBI Version ISO


Wireless Hacking Live - FBI Version ISO | 635Mb


This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).
- Live CD with all the tools you need to hack a WLAN / wireless Access point - Linux Live-CD - OS runs from CD - 635 mb - .iso
- also used by the FBI.

WEP Hacking - The Next Generation

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104. The IV is placed in encrypted frames header, and is transmitted in plain text.

Traditionally, cracking WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets-a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, It does'nt matter if you use 128 bit WEP keys, you are vulnerable!

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.

WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.

A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104.

The IV is placed in encrypted frames header, and is transmitted in plain text.

Traditionally, cracking WEP keys has been a slow and boring process.

An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.

After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.

Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.

This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.

How to use?

1) Boot from cd
2) Get the wep key
3) Write it down
4) Reboot into windows
5) Connect using wep key


DOWNLOAD

http://hotfile.com/dl/39728647/6e97091/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part1.rar.html
http://hotfile.com/dl/39728689/92e6e39/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part2.rar.html
http://hotfile.com/dl/39728723/0e12b37/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part3.rar.html
http://hotfile.com/dl/39728765/e80f7e5/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part4.rar.html
http://hotfile.com/dl/39728804/7d38e63/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part5.rar.html
http://hotfile.com/dl/39728835/c60360c/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part6.rar.html
http://hotfile.com/dl/39728860/a49d724/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part7.rar.html

Torrent Mirror: Wireless Hacking Live - FBI Version ISO

More Mirrors: Wireless Hacking Live - FBI Version ISO
read more...

Jumat, 16 April 2010

Hacking Modem Speedy dan Penanganannya

Hacking Modem Speedy dan Penanganannya tutorial hackingSebenarnya sudah lama sekali telkom mengadakan diskon besar-besaran untuk meraih pelanggan sebanyak-banyaknya. Udah dulu promosinya. :D

Sama dengan bug-bug yang lainnya, konfigurasi default akan membuat pihak luar yang tidak diinginkan seperti cracker dengan mudah mengeksploitasi secara besar-besaran sehingga memanen username dan password menjadi sesuatu yang memungkinkan sekali untuk dilakukan. Contoh bug yang buruk, yaitu username default dan password yang default.

Sebelum ngejabarin masalah teknisnya, berikut alat-alat yang diperlukan :

Browser Internet ( mau yang banyak bugnya, maupun yang sedikit bugnya )

Website dengan log system flat file ( diambil dari artikelnya Anggi J. )

Aplikasi Instant Messaging, ex : Yahoo Messenger ( Social Engineering )

Internet Password Asterisk Reveal

( http://www.nsauditor.com/freeware/downloads/IEAstRecover.exe )

Langkah Pertama

Silahkan anda baca artikelhttp://www.ilmuwebsite.com/detil_php_tutorial/2/_Membuat_System_LOG_dengan_FLAT_FILE/
, cara memasang log system flat file. Digunakan untuk mendapatkan alamat ip dari sang korban.

Langkah Ke Dua

Inti dari artikel ini adalah pencarian user yang akan dijadikan korban. Anda bisa menggunakan aplikasi IRC ataupun instant messaging yang lainnya. Alangkah baiknya anda menggunakan aplikasi IRC, seperti mIRC ataupun yang lainnya, karena fasilitas whois yang ada didalamnya mempermudah kita untuk segera mengetahui IP sang korban, tapi pada beberapa kasus, adakalanya user yang advanced menggunakan anonymous proxy yang tentunya menyembunyikan IP asli miliknya. Sehingga perlu teknik social engineering yang lebih ampuh lagi. Berikut ada sedikit percakapan antara seseorang sebagai intruder dengan sang korban menggunakan aplikasi yahoo messenger :

Mamang (intruder) : dah liat situs ini belom, ilmuwebsite.com ???

Sang_korban : apaan tuh ?

Mamang (intruder ) : situs keren punya orang keren, ngebahas tentang berbagai artikel mengenai kekerenan. Coba deh liat.

Sang_korban : coba, gw liat dulu. # kena!!

Mamang ) intruder ) : gimana keren kan ? eh, gw off dulu yah. C U

Situs ilmuwebsite.com tersebut, merupakan sebuah contoh situs yang anda gunakan untuk merecord ip sang korban. Anda bisa memasang log system flat file pada situs milik anda. Dengan mengusahakan sang korban tertarik untuk mengunjungi situs yang telah dipasang log system flat file.

Contoh IP yang sudah dilog dalam flat file,

Waktu: Fri, 06 Jul 2007 12:47:04 +0700 | IP asli: 125.161.2.85 | Browser: Mozilla/4.0 (compatible; MSIE 5.5; Windows 98; Win 9x 4.90) | URL: / | Referrer: | Proxy: | Koneksi:

Langkah Ketiga

Setelah mendapatkan alamat ip sang korban, yang perlu anda lakukan adalah membuka browser, kemudian pada address bar isi dengan alamat ip yang telah anda dapatkan, sebagai contoh yang saya dapatkan adalah http://125.160.#.# isikan username denganadmin dan passwordnya admin. Jika anda beruntung, anda akan langsung dihadapkan kepada halaman username ADSL dan tentunya password yang asterisk. Untuk membuka password yang asterisk, anda cukup menggunakan Internet Password Asterisk Reveal.

Penanganan

Sebenarnya dengan mengganti password yang default pun itu sudah bisa mencegah teknik seperti ini. Dan intinya password yang kuatlah yang susah untuk dimanfaatkan. Password yang kuat ini memiliki lebih dari 8 digit, dan merupakan gabungan dari angka huruf dan special character. Ex: ilmVw3851te –> bentuk lain dari ilmuwebsite

Sayangnya, telkom telah menerapkan system yang unique, sehingga account speedy tidak bisa digunakan pada jaringan telepon yang berbeda. Dan tentunya anda tidak bisa men-take over account yang sudah didapatkan. Mohon Maaf, artikel ini hanya sebagai contoh pembelajaran.

Default password untuk setiap modem :

http://www.elitehackers.info/defaultpasslist.php

read more...

Kamis, 08 April 2010


45 Hacker Tools

45 Hacker Tools | 5.6 Mb

Windows
[Encryption] Inkjar 1.1
[Encryption] Ecrypter Personal 1.5m
[Networking] ZeroNetHistory 2005 1.00.0065.009
[Passwords] Cocos 3.4
[Passwords] Extra Password Eudemon 6.6
[Various] Mobile Safe Patrol Pro 2.0.7
[Programming] CompuSec PC Security Suite 5.2
[Encryption] Kryptofile 1.0
[Encryption] xmlsec1-1.2.12
[Programming] Gili Exe Lock 1.5
More.....
read more...


Top 10 Vital Hacking Software and Tools

Top 10 Vital Hacking Software and Tools | 23.7 Mb

The collection contains the most necessary programs and utilities for the hacker. All is presented in a convenient environment with background music.

Contains a following software:
- Cain and Abel (sniffer)
- John the Ripper (powerful brootforce)
- NetStumbler (allows to define radius of action of network WiFi - in real time for the diagram it is possible to see size of a useful signal)
- Nmap (one of the best network scanner)
- Putty (a quite good telnet the client)
- SuperScan (powerful scanner TCP of ports, pinger and hostname resolver)
- Hping (allows to generate special ICMP/UDP/TCP packages and to look through answers ping a host in style of the usual utility ping)
- Lcp (audit and restoration of passwords Windows NT / 2000 / XP / 2003)
- Nikto (perl the scanner broken Web a server, with support SSL)
- Kismet (sniffer a wireless network 802.11 and the decoder of packages)

read more...

WiFi Hack AIO 2010


WiFi Hack AIO 2010 | 172 Mb


read more...

sponsor



http://bengawan.org/
Indonesian Freebie Web and Graphic Designer Resources


Get cash from your website. Sign up as affiliate.

Lijit Search Wijit


free statistics
free counter

Label

Biografi (3) Driver PC (2) games online (2) Grafic (2) hacking (5) magazine (2) movies (5) News (2) Pc Games (12) program (14) program/software (42) Puisi (2) Puisi/ lirik lagu (1) Religius (1) Sport (3) Tip dan Trik (26)

Visitors

free counters

Live traffic Map

Stumble This Fav This With Technorati Add To Del.icio.us Digg This Add To Reddit Add To Facebook Add To Yahoo