Posts Tagged ‘hacking’

How to hack WiFi protected spots?

wi-fi

wi-fi

If you are wondering how to have FREE internet service by using your neighbor’s internet connection, don’t you worry now. Instead of spending prepaid loads over and over again into your broadband kits, why not use this very hacking tool to crack your neighbor’s WiFi password?

Requirements:

  • Linux Operating System particularly Ubuntu 10.04 version
  • Software “Python” specifically version 2.4.5 or version 2.5.2

Tools you may use:

  • aircrack-ng (v1.1) suite. Get it via ubuntu terminal and type “apt-get install aircrack-ng”
  • python-tk module. Use terminal via  “apt-get install python-tk”
  • mac changer. Get it via terminal by typing “apt-get install macchanger”
  • wifite.py. Download at http://wifite.googlecode.com/svn/trunk/wifite.py

After installing the tools above, you may try one by one by going to your ubuntu applications and look for these tools. You can customize each by using few arguments to automate your WiFi cracking process.

In my experience, I have tested the wifite + python + ubuntu 10.04 to be working. I have cracked the WiFi password of one of the hotels in manila when I attended seminars a year ago.

AMD Blog Site Hacked

AMD

Advanced Micro Devices is the latest major company to be victimized by hackers, shutting down its blog site Aug. 19 after a group calling itself r00tbeer apparently defaced the site and stole a database containing information of AMD staff.

The attackers reportedly announced the hack on its Twitter account after putting their logo and a link to the Twitter account on the site.

The chip maker has since shut down the site, initially saying it was being taken offline for “routine maintenance,” then posting a message that said its blog site “is temporarily unavailable. We apologize for the inconvenience. This area will be back online as soon as possible.”

Read the FULL story HERE.

Another Hack into Spy Cameras

mjpg1

Hi! Please read first my first article about SpyCam hacking before going into this article.

By the way, thanks to console cowboy. Here we go again, another information of a camera named TrendNet cameras which are vulnerable for network hacking. Yes, it was just the same scenario in which a camera’s firmware is intentionally left by the manufacturer unupdated so as people around the world could access it online.

Okay, so much for the introduction. This TrendNet camera’s root access for viewing has the URL path “/anony/mjpg.cgi”. And with this information, we just use google again by keying in the keyword inurl: “/anony/mjpg.cgi”.  Now, look for the result w/ a static IP address instead of a domain. Be patient on looking of all the searches. Here’s some on the list:

Are you having hard time looking for such results? Maybe it’s time to visit Shodan and search there “netcam” and you’ll have dozens of results. Enjoy! Until next time for hacking. 😉 You may try the IP addresses as shown above the screenshot.

 

Find a Port to Hack

portscan

What is a port scanner?

A port scanner is a handy tool that scans a computer looking for active ports. With this utility, a potential “hacker” can figure out what services are available on a targeted computer from the responses the port scanner receives. Take a look at the list below for reference.
Starting Scan.

Target Host: http://www.yourcompany.com
TCP Port :7 (echo)
TCP Port :9 (discard)
TCP Port :13 (daytime)
TCP Port :19 (chargen)
TCP Port :21 (ftp)
TCP Port :23 (telnet)
TCP Port :25 (smtp)
TCP Port :37 (time)
TCP Port :53 (domain)
TCP Port :79 (finger)
TCP Port :80 (www)
TCP Port :110 (pop)
TCP Port :111 (sunrpc)
Finished.

Scanning for open ports is done in two ways. The first is to scan a single IP address for open ports. The second is to scan
a range of IP address to find open ports.

Try to think about this like calling a single phone-number of say 555-4321 and asking for every extension available. In relation to scanning, the phone-number is equivalent to the IP address and the extensions to open ports.

Scanning a range of IP address is like calling every number between 555-0000 to 555-9999 and asking for every extension available at every number.

Hacking Bluetooth Devices

bthack

If you are planning to gain a deeper understanding of Bluetooth security, you will need a good set of tools with which to work. By familiarizing yourself with the following tools, you will not only gain a knowledge of the vulnerabilities inherent in Bluetooth-enabled devices, but you will also get a glimpse at how an attacker might exploit them.

This hack highlights the essential tools, mostly for the Linux platform, that can be used to search out and hack Bluetooth-enabled devices.

Discovering Bluetooth Devices

BlueScanner – BlueScanner searches out for Bluetooth-enabled devices. It will try to extract as much information as possible for each newly discovered device.

BlueSniff – BlueSniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices.

BTBrowser – Bluetooth Browser is a J2ME application that can Browse and explore the technical specification of surrounding Bluetooth-enabled devices. You can browse device information and all supported profiles and service records of each device. BTBrowser works on phones that supports JSR-82 – the Java Bluetooth specification.

BTCrawler -BTCrawler is a scanner for Windows Mobile based devices. It scans for other devices in range and performs service query. It implements the BlueJacking and BlueSnarfing attacks.

Hacking Bluetooth Devices

BlueBugger -BlueBugger exploits the BlueBug vulnerability. BlueBug is the name of a set of Bluetooth security holes found in some Bluetooth-enabled mobile phones. By exploiting those vulnerabilities, one can gain an unauthorized access to the phone-book, calls lists and other private information.

CIHWB – Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Currently it only support some Bluetooth exploits and tools like BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft Bluetooth stack.

Bluediving – Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode.

Transient Bluetooth Environment Auditor – T-BEAR is a security-auditing platform for Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and various cracking tools.

Bluesnarfer – Bluesnarfer will download the phone-book of any mobile device vulnerable to Bluesnarfing. Bluesnarfing is a serious security flow discovered in several Bluetooth-enabled mobile phones. If a mobile phone is vulnerable, it is possible to connect to the phone without alerting the owner, and gain access to restricted portions of the stored data.

BTcrack – BTCrack is a Bluetooth Pass phrase (PIN) cracking tool. BTCrack aims to reconstruct the Passkey and the Link key from captured Pairing exchanges.

Blooover II – Blooover II is a J2ME-based auditing tool. It is intended to serve as an auditing tool to check whether a mobile phone is vulnerable.

BlueTest – BlueTest is a Perl script designed to do data extraction from vulnerable Bluetooth-enabled devices.

BTAudit – BTAudit is a set of programs and scripts for auditing Bluetooth-enabled devices.

I have not familiar with all of these tools, not even half of them tell you the truth, but if you need to know where to download any of these tools either message me or google them. If you need an explanation on how one works or how to make it work, message me with any question you need to ask, ill tell you from what i know and i will research it and give you the best explanation possible.

How to Bypass BIOS Password?

bioshack

This depends on what BIOS the machine has. Common BIOS’s include AMI, Award, IBM and Phoenix. Numerous other BIOS’s do exist, but these are the most common.

Some BIOS’s allow you to require a password be entered before the system will boot. Some BIOS’s allow you to require a password to be entered before the BIOS setup may be accessed.

Every BIOS must store this password information somewhere. If you are able to access the machine after it has been booted successfully, you may be able to view the password. You must know the memory address where the password is stored, and the format in which the password is stored. Or, you must have a program that knows these things.

The most common BIOS password attack programs are for Ami BIOS. Some password attack programs will return the AMI BIOS password in plain text, some will return it in ASCII codes, some will return it in scan codes. This appears to be dependent not just on the password attacker, but also on the version of Ami BIOS.

To obtain Ami BIOS password attackers, ftp to oak.oakland.edu/simtel/msdos/sysutil/.

If you cannot access the machine after if has been powered up, it is still possible to get past the password. The password is stored in CMOS memory that is maintained while the PC is powered off by a small battery, which is attached to the motherboard. If you remove this battery, all CMOS information will be lost. You will need to re-enter the correct CMOS setup information to use the machine. The machines owner or user will most likely be alarmed when it is discovered that the BIOS password has been deleted.

On some motherboards, the battery is soldered to the motherboard, making it difficult to remove. If this is the case, you have another alternative. Somewhere on the motherboard you should find a jumper that will clear the BIOS password. If you have the motherboard documentation, you will know where that jumper is. If not, the jumper may be labeled on the motherboard. If you are not fortunate enough for either of these to be the case, you may be able to guess which jumper is the correct jumper. This jumper is usually standing alone near the battery.

1 2 3

Content Protected Using Blog Protector By: PcDrome. & GeekyCube.