Posts

Showing posts from November, 2021

IP Tracer using termux

Image
What is IP-Tracer ? IP-Tracer is used to track an ip address. IP-Tracer is developed for Termux and Linux based systems. you can easily retrieve ip address information using IP-Tracer. IP-Tracer use ip-api to track ip address. How to install IP-Tracer ? apt update apt install git -y git clone https://github.com/rajkumardusad/IP-Tracer.git cd IP-Tracer chmod +x install sh install or ./install How to use IP-Tracer trace -m to track your own ip address. trace -t target-ip to track other's ip address for example ip-tracer -t 127.0.0.1 trace for more information. OR ip-tracer -m to track your own ip address. ip-tracer -t target-ip to track other's ip address for example ip-tracer -t 127.0.0.1 ip-tracer for more information.

Continuous DoSing a Wireless AP

Image
In previous tutorials for my Wi-Fi Hacking series, I have shown you how to crack WEP and WPA2 passwords, break a WPS PIN, and create Evil Twin and Rogue access points. In this continuation of the series, let's look at slightly different approach to attacking wireless. (If you are new to hacking Wi-Fi, make sure you check out the getting started guide before attempting any of the tasks mentioned above.) Our Cyber War Scenario ​Your side, the good guys, of course, are about to launch an attack against the bad guys. Your mission is to knock out all of the wireless communication from their field command and control center so that your army can attack without any notifications being sent via Wi-Fi. Of course, in this scenario, we are only knocking out Wi-Fi communication. The bad guys could certainly still communicate by cellular phone, by wired communication, by satellite, etc., but those are the tasks of your compatriots. Your single task is to knock out their Wi-Fi communication inde...

Evading Wireless Authentication with ICMPTX

In previous Wi-Fi hacking tutorials, I have shown you ways to create an Evil Twin, to DoS a wireless AP, and to crack WEP and WPA2 passwords, but in this tutorial, I will show you something a little bit different. In many restaurants, hotels, airports, airplanes, and cafes, they have open authentication on the wireless AP, but once you connect to the AP, you are sent to a proxy that asks you for your credentials. This is very common in many commercial establishments around the world. To obtain the necessary credentials, there is usually charge associated with it. What if you didn't have a credit card, or forgot your credit card, and needed to access the internet? You still may be able to, if the server accepts ICMP (ping) and you are patient. In addition, imagine a scenario where you need to stealthily retrieve a file, send a message, or retrieve a message, in say, a cyber espionage or cyber warfare situation, while barely leaving a trace of your activity. This may be your method o...

OSINT Tool in Termux

Image
The Instagram OSINT Tool gets a range of information from an Instagram account that you normally wouldn't be able to get from just looking at their profile The information includes: [ profile ] : user id, followers / following, number of uploads, profile img URL, business enum, external URL, joined Recently, etc [ tags & mentions ] : most used hashtags and mentioned accounts [ email ] : if any email is used any where it'll be displayed [ posts ] : accessability caption, location, timestamp, caption, picture url, etc ( yet not working correctly with posts instagram marks as 'sensitive cotent' ) How To Install apt update && upgrade -y Pkg install git pkg install python3 git clone https://github.com/th3unkn0n/osi.ig.git && cd osi.ig python3 -m pip install -r requirements.txt Usage python3 main.py -u username

OWASP Top 10 Vulnerabilities 2021

Image
" The Open Web Application Security Project " ( OWASP ) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications and APIs that can be trusted. What's changed in the Top 10 for 2021 There are three new categories, four categories with naming and scoping changes, and some consolidation in the Top 10 for 2021. We've changed names when necessary to focus on the root cause over the symptom. Broken Access Control Access control enforces policy such that users cannot act outside of their intended permissions. Failures typically lead to unauthorized information disclosure, modification, or destruction of all data or performing a business function outside the user's limits. Common access control vulnerabilities include: Violation of the principle of least privilege or deny by default, where access should only be granted for particular capabilities, roles, or users, but is available to anyone. Bypassing access control checks b...

Capturing Traffic Of Android Device Using BURP SUITE

Image
Step 1: Setting up " Burp Suite ". Go to the " P roxy " tab then the options tab. Add a new listener on all interfaces on whatever port you'd like. Here, I choose " 8080 ": Step 2: Setup Genymotion Desktop virtual device Launch your device.   Drag'n drop the " .cer " file you generated to the device display.                           Go to " Android Wifi " settings "( Settings > Network & Internet )". click on the network that it's currently connected to.   Click and hold on it and click Modify Network.   Click the " Advanced Options " drop down menu and " set Proxy " to " Manual ":   For " Hostname ", enter the " IP address " of the " Local Machine " that is running burp suite.   For Proxy port, enter the port that burp is listening on (here, we have set 8080).                             Now click Install from SD card...

Hacking Android Using SPYNOTE

Image
Requirement: Android Device Windows 10 SpyNote Java  Step 1:  " Download" and "Execute SpyNote" (spynote.us is taken down by Department of Homeland Security) https://mega.nz/file/CYAR3A7b#t1qt7VVGObrGsVCA6ts9yU5pDdKw4HbVJd9Rsx-g7PQ Step  2:  " Provide " the " Port number " and " Java Path " if asked or leave everything as default. Step 3: " Navigate " to " Tools Menu " and " Select Payload ". Fill in the reverse " IP " and other app details. Here in this step you can configure the properties of the Payload If you plan to merge this payload with any legit application then browse that application here. Step 4: " Now Click " on " Build ", it will trigger " apktool " and the " apk " will be " Created "  . Step  5:  Now " Copy " the " apk file " to the " Android Device " using any " Medium " like file " Sha...

Fake Facebook Phishing Page

Image
Capturing username and password using phishing page Legal disclaimer: Usage of phishing for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program S tep  1:  Install " Xampp " and " Start " the " Apache Service ". Step  2:  " Open facebook.com " and " Copy " the " Source Code " (ctrl + U) into a " Notepad File ". Search for " Action= " in the code and " replace " the " URL " following it with " capture.php " (only first 2 occurances needs to be changed) Save it as " index.html " Step 3:  " Create " a new " php file " and write the following code in it: <?php // Redirect header("Location:https://www.facebook.com/login/device-based/regul...