5/15/2016

The top 5 hacker forums on internet.

The top 5 hacker forums on internet.


You will be amazed to know that a large number of people have the desire to learn how to hack into websites.

With the increasing demand for information on hacking, there has been a large number of hacker forums propping up on the internet. However, with the changing trends and dynamics of the world, the only websites that continue to survive are the ones that keep up with the changing times and offer the best information on hacking.


A few of these are:

1 – Hacking Tutorial: Tech Tips and Hacking Tricks
Hacking Tutorial  has articles to offer which are “Client Side Attack Using Adobe PDF Escape EXE Social Engineering”, “Hacking Using Beef XSS Framework” and “Exploiting MS11_003 Internet Explorer Vulnerability”, which are succinct and extremely technological, but make the information extremely easy to follow by presenting it in stages. It’s not a very large blog, but it is a very effective one as you can discover a plethora of technical tricks by going through it.

2 – EvilZone Hacking Forums
Although the title, EvilZone, is not precisely the most welcoming title – the forum is simply one of the best forum on the theme of hacking. The forum has a large fan-base with over 13,042 members and over 50,000 posts (and counting), which proves that it can provide an answer to any programming question that you throw at it.

3 – Hack a Day
Hack a Day without doubt offers a remarkable store of knowledge on hacking, especially on particular subjects like cell phones, GPS or digital cameras. Over the course of a few years, Hack A Day has metamorphosed into a comparatively famous blog.
Over other sites, this specific “hacking” website is a little more hardware based. It provides information on how to hack gadgets like Game Boys or digital cameras, or on how to make new devices in order to hack into other electronics.

4 – Hack In The Box
Hack In The Box is one other website that has undergone a complete transfiguration and now looks like a Word Pressed-based forum. On a whole, Hack In The Box is a site which keeps in mind the ethical implications of hacking and stresses on safety measures and a fair way to hack. It has taken a different approach and focuses more on its content by providing readers with more news and less tips on hacking.
This makes it a less suitable forum to visit if you want technical hacking guidelines, but it is a great spot to visit for keeping up-to-date with latest hacking news.

5 – Hack This Site!
Finally we’ve come down to the coolest, free programmer instruction website where you can learn how to hack in the most easiest of ways!
The website makers offer multiple “missions,” through which you strive to understand the susceptibility of a website and then try to use your newly learned hacking skills to hack the site page.
This is the ultimate test, and if you manage to correctly hack any one of the tricky missions on this website, then you’ve certainly gained the tag of proficient hacker.

Source: http://www.hackersnewsbulletin.com/2015/02/best-hacker-forums-internet-top-5.html

5/13/2016

Using Raspberry Pi Access Point to Track Devices


Using Raspberry Pi Access Point to Track Devices


I’ve been looking recently at ways to measure population movements across a large outdoor area. There are various ways of doing this: we watch them, we ask them, or we infer. Watching is a popular option at stadia, city centres and large events. Automated footfall cameras can track movements and figure out how many people walk past a certain point in any period. Put enough cameras up and you can get a pretty good plan.
However, this merely measures numbers of people. There is no connectivity. 200 people walk past point A, 400 past point B. Does that mean 600 in total at two locations, or did some of those in point A also walk past point B?
This got me thinking about technical solutions (of course) and fairly quickly I got to wireless networks. Back in 2008, I wrote about a scheme in Portsmouth’s Gunwharf Quays to track mobile devices. At the time I think the company was using bluetooth but since then we’ve had an astounding growth in smartphone usage. Wifi is pretty much standard and – I would perhaps wager – more likely to be turned on.
Keen to see how this might be implemented, I did some research into how mobile phones discover wifi networks and found an interesting behaviour. Every few seconds or minutes, your phone will send out a signal “who’s there” to probe local wifi networks. Any active access points will respond accordingly with their network name “Hi I’m BtHub_12345”. This surprised me a little, as the device itself has to ask for wifi – I was expecting the access points to broadcast themselves and send out signals every few seconds. It seems this is to conserve battery.
Anyway, having established this, it seemed likely the device would be giving its MAC address away. To clarify, the MAC address is the hardware-level identifier for network devices. It’s a bit like a serial number, so when two devices talk to each other they address each other by their MAC address so they know who’s who. MAC addresses are supposed to be unique, so no two devices should ever have the same address.
Curious to see how easy this would be, I have started to build a Raspberry Pi device that is capable of this. It seems possible – hostapd allows the Pi to act as a wifi network access point. This forms the basis for tools such as Karma (which achieves a lot more than I need) and clearly has the capability to show probe requests
There are also some privacy issues that need to be tackled. What are the legal aspects of tracking MAC addresses? It seems that, provided the addresses are not tied to individuals, we do not need disclosure. Indeed, my aim is to aggregate data from the start. Once a path has been created, any trackable information should likely be discarded. I’ll touch on these too.

Tracking Devices via Raspberry Pi (Part Two)
In the last post I described how it could be possible to build a simple tracking device using a Raspberry Pi acting as a wireless network access point. In this post, I try it out for real. This isn’t a detailed technical run-down, just the basics.
IMG_20140325_105251












It seems to get this working you’ll need just a Raspberry Pi (Model B has extra USB + LAN so is easier to configure) and a USB Wireless dongle. I started off with the Nano-USB TP-Link WN725N but this isn’t supported by the default drivers. I managed to get it working thanks tothis thread on the Pi forums, which describes recompiling direct from Realtek’s website.

However, it seems that the Realtek drivers don’t have the necessary hooks for responding to probe requests. My guess is this is usually handled at a lower level and hostapd merely makes use of callbacks to customise the handling of these requests. I didn’t really fancy rewriting large chunks of code to support it, so I opted for Plan B, which is an Edimax 7711USn (the big white thing in the picture).
   The Edimax does seem to work with the default nl80211 drivers and sure enough, when I fired up debug mode, the probe requests came through.

   By default, the probe requests only appear with some really high debug level (makes sense – they’re usually not that useful) and running in this mode would surely generate a whole load of debug messages I wouldn’t need. The second snag is that there is no timestamp with these messages.
   So, next step was to recompile hostapd with some customisations. At this stage, I merely wanted proof-of-concept so I moved the probe request notifications up to INFO level and added a timestamp using some existing functions. I then ran the program for a little while et voila, the requests started coming in. The screenshot below shows the requests being made (MAC address partially obscured) and the timestamp (a second counter).

probereq

These requests will be coming from all sorts of wifi-enabled devices: my phone, my laptop, phones of passers-by. The key thing is that I did nothing to these devices to enable this – they automatically scan for wifi networks and this device is merely visualising it.
In little under forty minutes there were 1720 probe requests from sixteen separate devices. I’d call that a proven concept.
All in, the Raspberry Pi setup cost around thirty pounds. This is for a single device. My original plan was to see how this could be used for tracing paths through a space, such as a city or stadium. For this to work, one would need many more devices, both to triangulate the devices and to provide blanket wifi coverage.
The theory is: with enough of these devices in the right place it should be possible with reasonable accuracy to work out where people are, and where they go. At thirty quid* a pop, this needn’t be a hugely expensive task.
As it turns out, this is precisely the sort of work going on both in the commercial and development world:
CreepyDOL is a networked tracking tool – sniffs network traffic and tracks users. As the name suggests, the powers ‘in the wrong hands’ are creepy indeed.
Wifi tracking of the kind I describe has been in use for a couple of years now, and it’s already used to track customers in supermarkets.
Sure enough, just as I was working on my project, The Register published an article about how Asda and EE in the UK are using wifi to achieve precisely this.

There are quite obvious privacy implications to all of this. MAC addresses are unique and, even if we can’t directly identify someone from them, it may be possible to get their identity from all the clues available (such as where they shop, where they dwell, and by sniffing wifi traffic). Privacy is a huge concern and any technique such as this – even if used with the best intentions and no direct logging – must still be dealt with with care. Last year, it was widely reported that wifi trackers were embedded in some of London’s bins. Officials ordered the company to stop amid privacy concerns, and – despite the company’s protestations that all is anonymous – it has clearly hit a nerve with privacy advocates. There may well be no attempt whatsoever to track individuals, but a poorly executed plan will be met with harsh criticism irrespective of the actual risks.
I have a couple more articles planned to follow up these points – any comments are most welcome.

* There are, of course, all kinds of additional costs: You probably want a case, decent power, and public liability insurance. The Raspberry Pi is also not likely to be a great choice in the long run, for reasons which I hope to pick up later.

Source: https://www.yetanotherblog.com/2014/03/25/using-raspberry-pi-access-point-to-track-devices/

How To Hack Wifi WPA WPA2 WPS In Windows In 2 Mins Using JumpStart And Dumpper

How To Hack Wifi WPA WPA2 WPS In Windows In 2 Mins Using JumpStart And Dumpper


Hello Friends Welcome To Hacking Dream


Today I am going to share a wonderful hack on Wifi, using this we can hack a wifi WPA/WPA2 – WPS within seconds, the easiest and best way to Hack wpa networks.




THIS IS FOR EDUCATIONAL PURPOSE ONLY,I AM NOT RESPONSIBLE FOR ANY ILLEGAL ACTIVITIES DONE BY VISITORS, THIS IS FOR ETHICAL PURPOSE ONLY




What is WPA/WPA2 :

Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy).
WPA became available in 2003. The Wi-Fi Alliance intended it as an intermediate measure in anticipation of the availability of the more secure and complex WPA2. WPA2 became available in 2004 and is a common shorthand for the full IEEE 802.11i (or IEEE 802.11i-2004) standard.
A flaw in a feature added to Wi-Fi, called Wi-Fi Protected Setup, allows WPA and WPA2 security to be bypassed and effectively broken in many situations. WPA and WPA2 security implemented without using the Wi-Fi Protected Setup feature are unaffected by the security vulnerability.

WPA2 has replaced WPA. WPA2, which requires testing and certification by the Wi-Fi Alliance, implements the mandatory elements of IEEE 802.11i. In particular, it includes mandatory support for CCMP, an AES-based encryption mode with strong security. Certification began in September, 2004; from March 13, 2006, WPA2 certification is mandatory for all new devices to bear the Wi-Fi trademark.

 What Is WPS :

Wi-Fi Protected Setup (WPS; originally Wi-Fi Simple Config) is a network security standard that attempts to allow users to easily secure awireless home network but could fall to brute-force attacks if one or more of the network's access points do not guard against the attack.


Limitations For Using This Hack :


1)     This Hack works on Wpa/Wpa2 – Wps Unlocked Networks only
2)    Does not work on Costly Routers, So cannot hack all the wifi networks Available near you.
3) Not all Networks or routers can be hacked using this method.
4) While hacking some networks it says "Wireless Configuration Failed " that means jumpstart can not hack that particular network.

Many people asked me, is there any to hack wifi Wpa and Wpa2 through Windows, So Here is the article for Hacking Wifi Wpa/Wp2 Networks Through Windows also in Few minutes

Requirements:


1)     Laptop or USB wifi Adapter
2)     Windows Operating System
3)     Wincap
4)     JumStart
5)     Dumpper
6)     NetFrameWork 4.5
7)     Wpa/Wpa2 – WPS Networks Available with at least 8% signal

Links to Download the Required Software’s


Wincap – Direct Download    One Drive

JumpStart –  Direct Download   One Drive

Dumpper – Direct Download     One Drive

NetFrameWork 4.5 – Direct Download 

Download and Install all the Above Given Software’s one by one, even If a single software is missing out hack cannot be successful, be careful in downloading and installing these software’s.


Now Here I Start Our Tutorial on Hacking Wifi WPA/WAP2 – WPS Networks  In Windows Using JumpStart And Dumpper


Tutorial To Hack Wifi WPA/WPA 2 - WPS Networks



1)     After Downloading and Installing all the Software’s Open Dumper (No need of Installing Dumper, whenever you want to hack open it )



2)      Select your Network Adapter Now Click on “Scan”, There you can see all the available Wifi Networks



3)     Now Move on to the “WPS” Tab


4)     Select “All Networks”


5)     Now Click on “Scan”


6)     Select a Network That You Want Hack



7)     Now Click On Start JumpStart



8)     JumpStart Will Automatically Start The Process And Complete The Hack



9)     Now The Hack is Completed, You are already connected to the network that you Hacked





10)Click on “Profiles” to see the Details and Passwords of the wifi Networks That You Hacked



11)Select  a Network and There you can find  the details and passwords of the networks that you hacked





12)There is another method to see the password of the network that you hacked



13)Right click on the Networks and select “Open Network and Sharing Center”



14)Now click on the “Connection: Network Name”



15)Then the Properties of the Connected Network Will Appear, Now select “Wireless Properties”




16)Now move to “Security” Tab



17)Mark On “Show Characters” and the Password of the Wifi Network is Shown
                         This is how a Wifi WPA/WPA2-WPS Network is hacked. 

                     
            


This is the Simplest Method ever that too in windows, till now I did not post wifi hacking through windows, this is my very first post on Wifi Hacking through Windows, all my other Wifi Hacking articles are hacking through Kali Linux

Here is the link to Check all my Wifi Hacking Methods In Kali Linux
Normally some of the wifi networks cannot be hacked through this method, this method has many limitations. So I want to show you all a very Perfect Easy way of hacking Wifi WPA/WPA2 – WPS (Locked And Unlocked). My Next Article Is on Hacking Wifi WPA/WPA2 So Don’t Miss It

Subscribe To Our Low Volume Newsletter, so that you will not miss my Ultimate Hacking Method, Enter Your Name And Email Below, so that I can send you Email on my Next Post. Enjoy Hacking, Have a Great Time Hacking.



Frequently Asked Questions:


1) Does This method actually work?? 

Ans: Yes, it works, but not on all kinds of networks and routers. As i mentioned in the above article using jumpstart you can hack only wifi routers secured with wpa/wpa2 - wps enabled


2) Jumpstart it shows Wireless configuration failed!..what could be the reason for it not to be successful? 

Ans: Same answer as above, because it is not programmed to hack advanced routers. To put it into simple words, router is much more stronger than the attack 


3) Hacking With JumpStart Failed, how should i hack this particular network now ??

Ans:  By trying this method, many people might think that hacking is very easy, by using software we will be able to hack any kind of software, but its not true. Hacking is not easy at all. There are many other methods to hack wifi, but not a lot of methods though windows. This is the very basic method of hacking. we need to go into a little advanced methods of wifi hacking to hack the security system of present day routers


In case Jumpstart Failed to hack the router try the following (Hacking With Linux)


for wpa/wap2 - WPS Enabled ---->>>  Hacking wifi using reaver in Kali Linux
For Brute Force Attack ---->>>> Hacking Wifi Using Wordlist
All methods and Types of Wifi hacking --->>> Click Here (select any method and try it, i am sure you can hack any kind of network using these methods)

Source: http://www.hackingdream.net/2015/05/hack-wifi-wpa-wpa2-wps-in-windows-in-2.html