Showing posts with label tools. Show all posts
Showing posts with label tools. Show all posts

Saturday, 29 July 2017

How To Hack Wi-Fi Password Without Cracking By Using Wifiphisher

Hack any Wi-Fi password using Wifiphisher without cracking


Disclaimer: This tutorial is for educational purpose only. Hacking Wi-Fi passwords may be illegal in your part of the world. 

One of the many queries we get from our readers is how to hack Wi-Fi password. Though there are many ways to hack Wi-Fi, today we are going to show you how to hack any WiFi password using Wifiphisher. The beauty of Wifiphisher is that it can hack WPA/WPA2 protected Wi-Fi networks without cracking.
Without much ado, here is how you should go about how to hack Wi-Fi password without cracking using Wifiphisher. Read the disclaimer above and proceed at your own risk.

What is WiFiphisher?

Wifiphisher is a security tool that mounts automated phishing attacks against WiFi networks in order to obtain secret passphrases that people use to lack their Wi-Fi networks. Basically, it is a social engineering tool unlike other methods which use brute force attacks. Wifiphisher presents a very easy way of obtaining WPA/WPA2 protected secret passwords.

How does it work?

WiFiphisher creates an evil twin AP, then de-authenticate or DoS the user from their real AP. The Wi-Fi user logs in to find the Wi-Fi needs re-authentication and that is where Wifiphisher works great. The Wifiphisher redirects the Wi-Fi user to fake AP with the same SSID.
After connecting with fake AP, the owner of the Wi-Fi network will see a legitimate looking webpage that requests him/her to input password to “Upgrade firmware.” When the user enters the password in the cloned web page, it is reported back to the hacker without the knowledge of the Wi-Fi user. User allowed further to access the internet from fake evil twin AP, so they can’t feel anything suspicious.
The Wi-Fi owner goes about surfing the internet obvious to the fact that you have hacked his/her Wi-Fi password using Wifiphisher.

Requirements to Hack Wi-Fi using Wifiphisher Hacking tool 

  • PC/laptop running on Kali LINUX
  • Download Wifiphisher from GitHub.

Step 1: Install or Update Python

First, you have to install or update “python” in Kali LINUX. Open the terminal and type below command
apt-get install python
                       

Step 2: Unpack Wifiphisher script

After installing python, you have to unpack the Wifiphisher.
kali > tar -xvzf /root/wifiphisher-1.1.tar.gz
Alternatively, you can clone the code from GitHub by typing:
kali > git clone https://github/sophron/wifiphisher.git

Step 3: Navigate to the directory

Navigate to the directory where Wifiphisher has been installed.To navigate type below command in terminal.
sudo
cd wifiphisher/
Now confirm the name of the script. To confirm the name of script, type
ls -l

Step 4: Run the Script “wifiphisher.py”

To run script type below commands in terminal and hit enter.
python wifiphisher.py
Once installed the first time you run the script, it will likely tell you that “hostapd” is not found and will prompt you to install it. Install by typing “y” for yes. It will then proceed to install hostapd.
When it has completed, once again, execute the Wifiphisher script.
kali > python wifiphisher.py
This time, it will start the web server on port 8080 and 443, then go about and discover the available Wi-Fi networks. Wifiphisher will get to work and list all the Wi-Fi networks it has discovered.

Step 5: Select AP and Get the Password

From the listed Wi-Fi networks, select your target AP.  To select target just press ctrl+c (to stop scanning) and type “num” of AP. After entering num hit enter. The Wifiphisher will show you the target APs SSID and Mac address. Now let the Wifiphisher do its magic and clone this SSID while jamming the real AP. Once this process is completed, the Wifiphisher will direct the original owner of the Wi-Fi network to the cloned page and ask them to re-authenticate their login credentials.
After connecting to evil twin AP, Wifiphisher serves a legitimate looking proxy 10.0.0.58 web page and display a message to the Wi-Fi owner that his/her firmware is being upgraded and they should enter their username and passphrase.
When the user enters their password, it will be passed to you through the Wifiphisher open terminal. Thus Wifiphisher does its job without cracking or even letting the Wi-Fi user know he/she has been hacked.


Friday, 9 June 2017

Moto G4 and Moto G5 ABOOT Vulnerability Grants a Root Shell, Patched in May's Security Update

Moto G4 and Moto G5 ABOOT Vulnerability Grants a Root Shell, Patched in May's Security Update



It seems that the Android Bootloader on select Motorola devices is vulnerable to a kernel command-line injection attack. This initroot attack was first discovered by Aleph Research just last month when they announced it for the Nexus 6 smartphone. They assumed this attack was possible on other Motorola devices but hadn’t done any additional tests at the time. They were then contacted by a few people within the community and they were able to affirm their suspicion.

It was suggested to them that both the Moto G4 as well as the Moto G5 were both vulnerable to this kernel command-line injection attack. They went out and acquired these two devices and have since confirmed that the Android Bootloader (ABOOT) on these devices were indeed vulnerable to this same attack that they announced just last month (CVE-2016-10277). The only differences were that it required they port initroot to these two devices.

They did this by finding the SCRATCH_ADDR values used by the bootloaders, and then creating malicious initramfs archives. This whole process allows the attacker to inject a parameter (named initrd) which is able to force the Linux kernel to populate initramfs into rootfs from a specified physical address. They attack also allows an attacker to abuse the download function in ABOOT to put a malicious initramfs at a known physical address.
With a successful attack on the Moto G4, Moto G5 and the Nexus 6 (with other Motorola devices possibly being vulnerable as well), the attacker is able to gain an unrestricted root shell. The team at Aleph Research were able to complete both of these attacks on the latest OTA updates that were made available to them. Hower, Google has since fixed this in May’s security update and a patch even made its way into the mainline kernel