Posts

Showing posts from June, 2020

our logo

Image

Kali Linux - Wireless Attacks (Educational Purposes Only)

Image
In this chapter, we will learn how to use Wi-Fi cracking tools that Kali Linux has incorporated. However, it is important that the wireless card that you has a support monitoring mode. Fern Wifi Cracker Fern Wifi cracker is one of the tools that Kali has to crack wireless. Before opening Fern, we should turn the wireless card into monitoring mode. To do this, Type  “airmon-ng start wlan-0”  in the terminal. Now, open Fern Wireless Cracker. Step 1  − Applications → Click “Wireless Attacks” → “Fern Wireless Cracker”. Step 2  − Select the Wireless card as shown in the following screenshot. Step 3  − Click “Scan for Access Points”. Step 4  − After finishing the scan, it will show all the wireless networks found. In this case, only “WPA networks” was found. Step 5  − Click WPA networks as shown in the above screenshot. It shows all the wireless found. Generally, in WPA networks, it performs Dictionary attacks as such. Step 6  − Click “Browse” and find the wordlist to use for attack. Step 7

Kali Linux - Vulnerability Analyses Tools (Educational Purposes Only)

Image
In this chapter, we will learn how to use some of the tools that help us exploit devices or applications in order to gain access. Cisco Tools Kali has some tools that can be used to exploit Cisco router. One such tool is  Cisco-torch  which is used for mass scanning, fingerprinting, and exploitation. Let’s open the Terminal console by clicking the left pane. Then, type  “cisco-torch –parameter IP of host”  and if there is nothing found to exploit, then the following result will be shown. To see what are the parameters that can be used, type  “cisco-torch ?” Cisco Auditing Tool It is a PERL script, which scans Cisco routers for common vulnerabilities. To use it, again open the terminal on the left pane as shown in the previous section and type  “CAT –h hostname or IP” . You can add the port parameter  “-p”  as shown in the following screenshot, which in this case is 23 to brute-force it. Cisco Global Exploiter Cisco Global Exploiter (CGE) is an advanced, simple, and fast security testin

Kali Linux - Information Gathering Tools (Educational Purposes Only)

Image
In this chapter, we will discuss the information gathering tools of Kali Linux. NMAP and ZenMAP NMAP and ZenMAP are useful tools for the scanning phase of Ethical Hacking in Kali Linux. NMAP and ZenMAP are practically the same tool, however NMAP uses command line while ZenMAP has a GUI. NMAP is a free utility tool for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. NMAP uses raw IP packets in novel ways to determine which hosts are available on the network, what services (application name and version) those hosts are offering, which operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, etc. Now, let’s go step by step and learn how to use NMAP and ZenMAP. Step 1  − To open, go to Applications → 01-Information Gathering → nmap or zenmap. Step 2  − The next step is to detect th