Category Archives: Uncategorized

[In Nepali] Learn Ethical Hacking – Part 7 – Scanning + NMAP Lab


In this video, I will give some theory of Scanning. After that, I will provide a lab demo on Kali Linux Nmap Command Lines.

Ethical Hacking with Kali Linux [4] – Breaking WPA2 Wireless.


By : Bijay Acharya http://bijayacharya.com/

> > Welcome all, to this series of Kali Linux for Ethical Hacking. This is 4th part, & I’ll explain process of Breaking Wireless WPA2.

# Tools that will be used :

airmon-ng
airodump-ng
aireplay-ng
aircrack

# . . . Let’s Begin,

– Before start, make sure that you have eth0, lo, wlan0 are in action. (go to terminal, & run ifconfig)

– Let’s start to monitor on that wireless interface, run :

READ ALL HERE

Ethical Hacking with Kali Linux [3] – Bypassing MAC Address Filter


BY : BIJAY ACHARYA http://bijayacharya.com/

Ethical Hacking with Kali Linux [3] – Bypassing MAC Address Filter

> > Welcome all, to this series of Kali Linux for Ethical Hacking. This is 3rd part, & I’ll explain process of bypassing MAC Address Filter on an AP (Access Point).

# 3 basic Process :

– Finding the AP : airmon-ng & airodump-ng

– Finding an associated client : airodump-ng

– Finally, using the Macchanger

# . . . Let’s Begin,

– Before start, make sure that you have eth0, lo, wlan0 are in action. (go to terminal, & run ifconfig)

– Let’s start to monitor on that wireless interface, run :

airmon-ng start wlan0

– After executing above command, we must get new interface mon0 (monitor mode enabled)

– Verify that both interfaces are up & running, run

airmon-ng

– Watch for wlan0 & mon0 , Run :

airodump-ng mon0

– For monitoring all the APs that Kali Linux OS can find out.

– In next step, you will get BSSID and ESSID, channel, cipher. If there is any hidden SSID, then ESSID will be format like this : <length: 0> or with no SSID. [We, saw in 2nd part, on how to uncover this hidden SSID]. But, here you can use any SSID with Open Encryption, or SSID with known password. We will use the MAC address, that was seen in part 2. i.e. 00:A1:B2:11:20:13:5T & channel ‘1’ (Assume, MAC address filter is done in this system & lets suppose it’s SSID is nhc-BJ)

– Now, we try to find out the Client & his MAC Associated with this AP (nhc-BJ). So, that we can use that MAC to bypass filter. Run;

airodump-ng -c 1 -a –bssid 00:A1:B2:11:20:13:5T mon0

(-c is for channel, channel is 1 for BSSID we are trying to connect, -a is for showing only the client associated with this BSSID)

– You will get MAC address with Station associated with that AP, and this is client’s station. (Lets assume Mac = 00:C1:52:11:20:13:7D)

– CTRL+C (press)

– Run ;

macchanger –help
(notice, -m for setting mac)

-Run ;

macchanger -m 00:C1:52:11:20:13:7D wlan0

(if Device or resource busy, then run following command)

airmon-ng stop wlan0

– Run ;

macchanger -m 00:C1:52:11:20:13:7D wlan0

(in success, you will see msg like ‘faked MAC’)

-Run ;

ifconfig wlan0 down

ifconfig wlan0 up

(now, lets see whether we can associate with SSID now or not, with this Faked MAC)

Run ;

iwconfig wlan0 essid nhc-BJ channel 1

(if not run in kali, run it in BackTrack. Or, see update version for kali)

iwconfig wlan0

(if success, Access Point will be associated)

“This series is only for educational purpose, practice this series lab in virtual/separate network, always avoid illegal activities, and if you can, then support us to fight against black hat hackers”

# Join our Facebook NHC group, to get most out of this series

http://www.facebook.com/groups/nepalesehackerscommunity

# Register in our NHC Forum Website

http://www.nhc.bijayacharya.com

# For, free video tutorial & minimum priced certificate, register my OCN (Online Course Nepal) here : http://www.ocn.bijayacharya.com(Remember, Videos are free to watch, you will pay only if you want certificate :), so that we can maintain this open source culture)

ATTACHMENTS
image005ab.png
image005ab.png (26.61 KiB) 

 

 

Ethical Hacking with Kali Linux [2] – Finding Hidden SSIDs


By : Bijay Acharya (http://bijayacharya.com/)

Ethical Hacking with Kali Linux [2] – Finding Hidden SSIDs

> > Welcome all, to this series of Kali Linux for Ethical Hacking. This is Second part, & we’ll be seeing some of the techniques of uncovering hidden SSIDs.

# Process :

– Enabling Wireless Monitoring : airmon-ng

– Discovering the APs (Access Points) : airodump-ng

– Stay calm for Association or use de-authentication : aireplay-ng Continue reading Ethical Hacking with Kali Linux [2] – Finding Hidden SSIDs

Ethical Hacking with Kali Linux [1] – Objective


Ethical Hacking with Kali Linux [1] – Objective

> > Welcome all, to this series of Kali Linux for Ethical Hacking. This is first part, & we’ll be seeing some of the intentions of this series.

# Kali Linux is special OS for Hacking & Penetration Testing Tools (for “White Hat” use).

# Basically for :

– Improving System Security
– using in authorized environment only
– for those who understant Networking Fundamentals.

# What to expect from this series ? :

– Get familiar with more than 100+ tools used for Ethical Hacking
– Building an isolated Test Networks (Physical/Virtual)
– Practice in a “Sandbox” test Network
– Running Terminal Commands via Kali Linux, used for penetration testing.
– Using NHC (Nepalese Hackers Community) throughly.

# Join our Facebook NHC group, to get most out of this series

[url]www.facebook.com/groups/nepalesehackerscommunity
[/url]
# Register in our NHC Forum Website

http://www.nhc.bijayacharya.com

# For, free video tutorial & minimum priced certificate, register my OCN (Online Course Nepal) here : http://www.ocn.bijayacharya.com(Remember, Videos are free to watch, you will pay only if you want certificate :), so that we can maintain this open source culture)

# Initial recommendation, before beginning series,

– You must have a virtual environment ready, with kali linux installed. (Confused ? go over youtube videos on how to do that, or you can find my tutorial on that in my youtube channel http://www.youtube.com/studentvideotutorial (head over ”Ethical Hacking in Nepali” Playlist, Part 4 Video)

. . . Assuming that you have gone through above process . . .

> > Updating Kali Linux Packages :

# Help & Documentation

man <command>
<command>
<command> -h
<command> -help
<command> –help

#Getting Current Advanced Package for Kali Linux (apt-get) :

Go to terminal of kali linux & run :

man apt-get (gives detail about apt-get)

apt-get -h (for help option of apt-get)

# Now, we will use ‘update’ command (…assuming you have connectivity to internet…)

Run,

apt-get update

Done ?

Run,

apt-get upgrade

. . . Depending on your net speed, it will upgrade all packages it retrieved. . .

“This series is only for educational purpose, practice this series lab in virtual/separate network, always avoid illegal activities, and if you can, then support us to fight against black hat hackers”

# Join our Facebook NHC group, to get most out of this series

http://www.facebook.com/groups/nepalesehackerscommunity

# Register in our NHC Forum Website

http://www.nhc.bijayacharya.com

# For, free video tutorial & minimum priced certificate, register my OCN (Online Course Nepal) here : http://www.ocn.bijayacharya.com(Remember, Videos are free to watch, you will pay only if you want certificate :), so that we can maintain this open source culture)

kali_linux_inspired__r__by_xdboy018-d8xd43e.jpg
kali_linux_inspired__r__by_xdboy018-d8xd43e.jpg (32.22 KiB) Viewed 66 times

Register For NEPALESE HACKERS COMMUNITY (NHC)


Register For NEPALESE HACKERS COMMUNITY (NHC)

http://nhc.bijayacharya.com/

 “Hacker”? ….How will you define the term ? ….Bad Guy ?…..Or Good Guy ?.…Well, ‘Hacker’ a single term do not give full details. …. It depends on ‘legal’ & ‘illegal’ actions…..If hacker performs ‘illegal’ actions against account or sites or system then s/he is BAD A**hole. . . . And if hacker finds a bug in system and reports to concerned sector, then hacker is damn coolest guy. . . . I’m not going to write a long dirty & lengthy words describing hackers. Hackers are categorized into BLACK, GREY, & WHITE HAT. –BIJAY ACHARYA

Encryption Is Not Enough !, Research & Conclusion (Part 1)


By : BIJAY ACHARYA
Hello World ! Well, welcome in my post. This will be in series, and this is first part. Throughout the series, I will share my research and findings with you. And that will be on topic, Encryption Is Not Enough. We will see, how Encryption is broken & what countermeasures should be implemented to secure it.

 

Image via traxarmstrong.com

Let’s begin, Why do we encrypt ?
-We encrypt, simply for privacy & secrecy
-We encrypt, in pro term : for Confidentiality & Integrity. Well, these are basics for encryption.

CHFI Exam Study Guide (Part 1) – Reporting Detected Cyber Crimes, ETI Theory of Investigation, Contents of Forensic Report, CHFI Exam Questions


Download Link
Our free CHFI exam study guide covers topics such as Windows Forensics, Cyber Crime, Digital Evidence and Data Acquisition and Duplication, to name a few. Begin refreshing your memory with our interactive study guide today, so you can be on your way to becoming a certified Computer Hacking and Forensics investigator. Let’s begin. 

Subscribe : SVT
Follow : BJ
Like : Ethical Hacking News & Update

Full Article HERE

CHFI & Digital Forensics Tutorial [Part 1] – Basics & FTK IMAGER Lab


Hello and welcome to this new series of Student Video Tutorial. This series is basically related Digital Forensics. I will cover wide range of Digital Forensics together with Computer Hacking Forensic Investigation, CHFI.

In this video, we will see FTK IMAGER and use it for Acquiring Disk Image.

[In Nepali] Learn Ethical Hacking – Part 1 – Tools Requirements