CHFI & Digital Forensics Tutorial [Part 1] – Basics & FTK IMAGER Lab


Hello and welcome to this new series of Student Video Tutorial. This series is basically related Digital Forensics. I will cover wide range of Digital Forensics together with Computer Hacking Forensic Investigation, CHFI.

In this video, we will see FTK IMAGER and use it for Acquiring Disk Image.

Ethical Hacking with Kali Linux [3] – Bypassing MAC Address Filter


BY : BIJAY ACHARYA http://bijayacharya.com/

Ethical Hacking with Kali Linux [3] – Bypassing MAC Address Filter

> > Welcome all, to this series of Kali Linux for Ethical Hacking. This is 3rd part, & I’ll explain process of bypassing MAC Address Filter on an AP (Access Point).

# 3 basic Process :

– Finding the AP : airmon-ng & airodump-ng

– Finding an associated client : airodump-ng

– Finally, using the Macchanger

# . . . Let’s Begin,

– Before start, make sure that you have eth0, lo, wlan0 are in action. (go to terminal, & run ifconfig)

– Let’s start to monitor on that wireless interface, run :

airmon-ng start wlan0

– After executing above command, we must get new interface mon0 (monitor mode enabled)

– Verify that both interfaces are up & running, run

airmon-ng

– Watch for wlan0 & mon0 , Run :

airodump-ng mon0

– For monitoring all the APs that Kali Linux OS can find out.

– In next step, you will get BSSID and ESSID, channel, cipher. If there is any hidden SSID, then ESSID will be format like this : <length: 0> or with no SSID. [We, saw in 2nd part, on how to uncover this hidden SSID]. But, here you can use any SSID with Open Encryption, or SSID with known password. We will use the MAC address, that was seen in part 2. i.e. 00:A1:B2:11:20:13:5T & channel ‘1’ (Assume, MAC address filter is done in this system & lets suppose it’s SSID is nhc-BJ)

– Now, we try to find out the Client & his MAC Associated with this AP (nhc-BJ). So, that we can use that MAC to bypass filter. Run;

airodump-ng -c 1 -a –bssid 00:A1:B2:11:20:13:5T mon0

(-c is for channel, channel is 1 for BSSID we are trying to connect, -a is for showing only the client associated with this BSSID)

– You will get MAC address with Station associated with that AP, and this is client’s station. (Lets assume Mac = 00:C1:52:11:20:13:7D)

– CTRL+C (press)

– Run ;

macchanger –help
(notice, -m for setting mac)

-Run ;

macchanger -m 00:C1:52:11:20:13:7D wlan0

(if Device or resource busy, then run following command)

airmon-ng stop wlan0

– Run ;

macchanger -m 00:C1:52:11:20:13:7D wlan0

(in success, you will see msg like ‘faked MAC’)

-Run ;

ifconfig wlan0 down

ifconfig wlan0 up

(now, lets see whether we can associate with SSID now or not, with this Faked MAC)

Run ;

iwconfig wlan0 essid nhc-BJ channel 1

(if not run in kali, run it in BackTrack. Or, see update version for kali)

iwconfig wlan0

(if success, Access Point will be associated)

“This series is only for educational purpose, practice this series lab in virtual/separate network, always avoid illegal activities, and if you can, then support us to fight against black hat hackers”

# Join our Facebook NHC group, to get most out of this series

http://www.facebook.com/groups/nepalesehackerscommunity

# Register in our NHC Forum Website

http://www.nhc.bijayacharya.com

# For, free video tutorial & minimum priced certificate, register my OCN (Online Course Nepal) here : http://www.ocn.bijayacharya.com(Remember, Videos are free to watch, you will pay only if you want certificate :), so that we can maintain this open source culture)

ATTACHMENTS
image005ab.png
image005ab.png (26.61 KiB) 

 

 

Ethical Hacking with Kali Linux [2] – Finding Hidden SSIDs


By : Bijay Acharya (http://bijayacharya.com/)

Ethical Hacking with Kali Linux [2] – Finding Hidden SSIDs

> > Welcome all, to this series of Kali Linux for Ethical Hacking. This is Second part, & we’ll be seeing some of the techniques of uncovering hidden SSIDs.

# Process :

– Enabling Wireless Monitoring : airmon-ng

– Discovering the APs (Access Points) : airodump-ng

– Stay calm for Association or use de-authentication : aireplay-ng Continue reading Ethical Hacking with Kali Linux [2] – Finding Hidden SSIDs

Ethical Hacking with Kali Linux [1] – Objective


Ethical Hacking with Kali Linux [1] – Objective

> > Welcome all, to this series of Kali Linux for Ethical Hacking. This is first part, & we’ll be seeing some of the intentions of this series.

# Kali Linux is special OS for Hacking & Penetration Testing Tools (for “White Hat” use).

# Basically for :

– Improving System Security
– using in authorized environment only
– for those who understant Networking Fundamentals.

# What to expect from this series ? :

– Get familiar with more than 100+ tools used for Ethical Hacking
– Building an isolated Test Networks (Physical/Virtual)
– Practice in a “Sandbox” test Network
– Running Terminal Commands via Kali Linux, used for penetration testing.
– Using NHC (Nepalese Hackers Community) throughly.

# Join our Facebook NHC group, to get most out of this series

[url]www.facebook.com/groups/nepalesehackerscommunity
[/url]
# Register in our NHC Forum Website

http://www.nhc.bijayacharya.com

# For, free video tutorial & minimum priced certificate, register my OCN (Online Course Nepal) here : http://www.ocn.bijayacharya.com(Remember, Videos are free to watch, you will pay only if you want certificate :), so that we can maintain this open source culture)

# Initial recommendation, before beginning series,

– You must have a virtual environment ready, with kali linux installed. (Confused ? go over youtube videos on how to do that, or you can find my tutorial on that in my youtube channel http://www.youtube.com/studentvideotutorial (head over ”Ethical Hacking in Nepali” Playlist, Part 4 Video)

. . . Assuming that you have gone through above process . . .

> > Updating Kali Linux Packages :

# Help & Documentation

man <command>
<command>
<command> -h
<command> -help
<command> –help

#Getting Current Advanced Package for Kali Linux (apt-get) :

Go to terminal of kali linux & run :

man apt-get (gives detail about apt-get)

apt-get -h (for help option of apt-get)

# Now, we will use ‘update’ command (…assuming you have connectivity to internet…)

Run,

apt-get update

Done ?

Run,

apt-get upgrade

. . . Depending on your net speed, it will upgrade all packages it retrieved. . .

“This series is only for educational purpose, practice this series lab in virtual/separate network, always avoid illegal activities, and if you can, then support us to fight against black hat hackers”

# Join our Facebook NHC group, to get most out of this series

http://www.facebook.com/groups/nepalesehackerscommunity

# Register in our NHC Forum Website

http://www.nhc.bijayacharya.com

# For, free video tutorial & minimum priced certificate, register my OCN (Online Course Nepal) here : http://www.ocn.bijayacharya.com(Remember, Videos are free to watch, you will pay only if you want certificate :), so that we can maintain this open source culture)

kali_linux_inspired__r__by_xdboy018-d8xd43e.jpg
kali_linux_inspired__r__by_xdboy018-d8xd43e.jpg (32.22 KiB) Viewed 66 times

OCN – Online Course Nepal


http://www.ocn.bijayacharya.com/

– OCN is established in 2016 as a leading e-learning platform for Nepali Citizens. Any one interested in learning via video tutorials & ebook are welcome here. You learn by watching our videos, and get certified with minimum rate of price.  

– OCN is founded by BIJAY ACHARYA

 OCN Services :

1) Online Free Classes ( Via Nepali Videos)

2) Certificate for videos you watched (@minimum price)

3) Ethical Hacking Workshop/Training (Max.5 Days)

4) Website Development (we can design website for you at 10% discount)

Head Office : I.T. Solution Pokhara, Nepal


“Donate us some of your amount, and help us to maintain this culture”

For more detail : +977-9846618997

Register For NEPALESE HACKERS COMMUNITY (NHC)


Register For NEPALESE HACKERS COMMUNITY (NHC)

http://nhc.bijayacharya.com/

 “Hacker”? ….How will you define the term ? ….Bad Guy ?…..Or Good Guy ?.…Well, ‘Hacker’ a single term do not give full details. …. It depends on ‘legal’ & ‘illegal’ actions…..If hacker performs ‘illegal’ actions against account or sites or system then s/he is BAD A**hole. . . . And if hacker finds a bug in system and reports to concerned sector, then hacker is damn coolest guy. . . . I’m not going to write a long dirty & lengthy words describing hackers. Hackers are categorized into BLACK, GREY, & WHITE HAT. –BIJAY ACHARYA

[In Nepali] Learn Ethical Hacking – Part 6 : Passive Reconnaissance


‪#‎update‬ ‪#‎part6‬ ‪#‎released‬
‪#‎nhc‬ ‪#‎admin‬ here

– Learn Ethical Hacking [in nepali], Part 6 video tutorial is uploaded.
https://youtu.be/ifVY2HS-9KI

– In this video, I’ll give a lab demo on ‪#‎PassiveReconnaissance‬.‪#‎Reconnaissance‬ is a process of gathering information about target system. We will see ‪#‎Netcraft‬ & ‪#‎whois‬ in action here.

– This video series is all about Ethical Hacking. So, utilize the knowledge for security purpose and do not perform illegal activities. Stay Safe.

– Register now for NHC Forum here : http://nhc.bijayacharya.com/

DuckDuckGo


image

Time to breakUP with google ?

Invented : Untraceable SMS System > > MIT


Invented : Untraceable SMS System > > MIT > > Computer Addicted

image

Src : Foss Byte

“Hack The Pentagon” & earn some cash.


A pilot program aims to help the US Defense Department beef up its networks by finding any vulnerabilities that could be exploited.

image

For full news : CNET.com

Awesome !!! Apple vs FBI (Apple Won) – 2016


image

[Updates on] : Ethical Hacking, Digital Forensics, Cyber Security

Follow

Get every new post delivered to your Inbox.

Join 933 other followers

%d bloggers like this: