Daily Archives: July 29, 2015

Cracking WPA with oclHashcat GPU on Windows

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

This tutorial shows you how to crack the WPA/WPA2 wireless network key using oclHashcat on Windows with the power of GPU’s. My older Radeon 7670M video card does an average of 20kh (20.000 attempts) per second where a AMD HD7970 videocard can do 142kh (142.000 attempts) per second and 8 x NVidea Titan X […]

By |July 29th, 2015|Papers|

How to hack UPC wireless networks and other WLAN

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorials we will show you how to hack UPC wireless networks with the default password which is a common thing for many UPC customers. The first step is to create a password list which contains all possible combinations of 8 capital letters. We will be using Maskprocessor in Kali Linux to […]

By |July 29th, 2015|Papers|

Finding WPS enabled Wifi Networks

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Kali Linux Wash is a tool to find WPS enabled routers in your area. A lot of routers support Wifi Protected Setup (WPS) and it’s likely enabled by default by your internet service provider or by the router manufacturer. Like UPnP, it is an insecure feature that makes your wireless network more […]

By |July 29th, 2015|Papers|

Pixie Dust Attack WPS in Kali Linux with Reaver

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we are going to do a pixie dust attack using Reaver, Aircrack-NG and Pixiewps. Pixie Dust attack is an offline attack which exploits a WPS vulnerability. The tool, Pixiewps, is written in C and works with a modified version of Reaver. When a wireless router is vulnerable […]

By |July 29th, 2015|Papers|

How to hack Wireless Router

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we will show you how to hack a TP link WR841N router wireless network with the default wifi password using Kali Linux. Wireless routers use the default WPS PIN as wifi password out of the box. We will try the following techniques to hack a TP link router […]

By |July 29th, 2015|Papers|

Open Port Scanning and OS Detection with Nmap

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we are going to use Nmap in Kali Linux to scan for open ports scan and we will be using OS detection. Nmap stands for Network Mapper and is an open source tool for network exploration and security auditing which comes standard with Kali Linux but is also available for Windows, […]

By |July 29th, 2015|Papers|

Scanning a network for live hosts with Nmap

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we are going to use Nmap in Kali Linux to scan the network for live hosts. You can use the command ifconfig to determine which IP range you will be scanning for live hosts. We will be using a ping scan on a range of possible live hosts […]

By |July 29th, 2015|Papers|

How to enumerate webserver directories with Nmap

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we will be using Nmap on Kali Linux to enumerate webserver directories from popular web applications. We will be using the Nmap plugin http-enum.nse for this purpose. The first step in web application penetration testing is scanning webserver directories for popular web applications. Many applications have known […]

By |July 29th, 2015|Papers|

Heartbleed SSL bug Scanning using Nmap

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

This tutorial shows you how to scan a target for the well known Heartbleed SSL Bug using Nmap on Kali Linux. The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library and was introduced in 31 December on 2011 and released in March 2012. This weakness […]

By |July 29th, 2015|Papers|

Scanning for SMB vulnerabilities using Nmap

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we will be using a Nmap script to scan for SMB vulnerabilities. The Nmap Scripting Engine (NSE) is on of Nmap’s most powerful and flexible features. The frontpage on Samba.org describes Samba as:
Since 1992, Samba has provided secure, stable and fast file and print services for all clients using the SMB/CIFS protocol, […]

By |July 29th, 2015|Papers|