Saturday, 18 July 2015

URL TRAFFIC MANIPULATION ATTACK




Hello Friends, Today I am going to say you about URL Traffic Manipulation, which we perform using ARP (Address Resolution Protocol) Poisoning. This is also simple wireless attack, for which we will use it KALI-LINUX. Let's Start by Discussing about them.

URL traffic manipulation is very similar to a Man In The Middle attack, in that we will route traffic destined for the Internet to pass through our machine first.

ARP poisoning is a technique that allows you to send spoofed ARP messages to a victim on the local network. We will use arpspoof command in KALI.

Let's begin the process of URL traffic manipulation.


1.Open a terminal window and execute the following command to configure IP tables that will allow our machine to route traffic:
 sudo echo 1 >> /proc/sys/net/ipv4/ip_forward  
2.Next, we launch "arpspoof" to poison traffic going from our victim's machine to the default gateway. As this is for tutorial, we will use a Windows 7 machine on my local network with an address of 192.168.10.115 (Victim's Machine). 
Arpspoof has a couple of options that we will select and they include:
 –i allows us to select our target interface. In this case, we will select wlan0.
–t allows us to specify our target.
The syntax for completing this command is arpspoof –i [interface] –t [target IP address] [destination IP address (Kali Machine IP)].
 sudo arpspoof –i wlan0 -t 192.168.10.115 192.168.10.1  
3.Next, we will execute another arpspoof command that will take traffic from the destination in the previous command (which was the default gateway) and route that traffic back to our Kali machine. In this example our IP address is 192.168.10.110
 sudo arpspoof –i wlan0 -t 192.168.10.1 192.168.10.110  

All Done..... 
We Completed ARP Poisoning with "arpspoof" to manipulate traffic on our victim's machine to ultimately route back through our Kali Linux machine. Once traffic has been rerouted, there are other attacks that you can run against the victim, including recording their keystrokes, following websites they have visited, and much more!

Follow RSS Feed to Get Hacking Stuff at your Inbox, Follow Me and Like My Page, For Updates.

Thanks,,,,
Continue reading

Wednesday, 8 July 2015

MAC SPOOFING



Hi Friends, Today I am going to teach you How MAC Address can be changed, and what are common reasons to hide your real identity. So, Let’s start with know about MAC Spoofing

MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device. The MAC address is hard-coded on a network interface controller (NIC) and cannot be changed. However, there are tools which can make an operating system believe that the NIC has the MAC address of a user's choosing. The process of masking a MAC address is known as MAC spoofing. Essentially, MAC spoofing entails changing a computer's identity, for any reason, and it is relatively easy.

MAC Address Uses: (Took From Google)

Static IP Assignment:Routers allow you to assign static IP addresses to your computers. When a device connects, it always receives a specific IP address if it has a matching MAC address
MAC Address Filtering:Networks can use MAC address filtering;only allowing devices with specific MAC addresses to connect to a network.
MAC Authentication: In someplace, 30mins Wi-Fi, 20 Wi-Fi are being Free and shared, but after that 30mins if you want to connect it again you will not be able to connect because, its already authenticated with your MAC Address. So you need to Change your MAC address, to authenticate again with that Wi-Fi
Device Identification:Many airport Wi-Fi networks and other public Wi-Fi networks use a device’s MAC address to identify it. For example, an airport Wi-Fi network might offer a free 30 minutes and then ban your MAC address from receiving more Wi-Fi. Change your MAC address and you could get more Wi-Fi. (Free, limited Wi-Fi may also be tracked using browser cookies or an account system.)
Device Tracking:Because they’re unique, MAC addresses can be used to track you. When you walk around, your smartphone scans for nearby Wi-Fi networks and broadcasts its MAC address. A company named Renew London used trash bins in the city of London to track people’s movements around the city based on their MAC addresses. Apple’s iOS 8 will use a random MAC address each time it scans for nearby Wi-Fi networks to prevent this sort of tracking.
:: HIDING MAC ADDRESS ::

FOR WINDOWS:
For Changing MAC address, there are many Freeware tools available in Market. So We are going to use a tool Technitium MAC Address Changer. 


You can check your MAC Address by opening CMD and typing command.
 ipconfig /all  
You will get the details about your wireless network. So, here your mac address is your Physical Address in CMD.

FOR LINUX:
We will use macchanger command. So let’s do it, First we need to find details of our network:
 ifconfig eth0  
You will get all details now down your network by typing
 ifconfig eth0 down  
Now it’s time to change the MAC address
 macchanger -r eth0  
Generates random mac address. Make sure you are in Root, otherwise there will be error. If you want to use specific MAC address then use
 macchanger –m XX.XX.XX.XX.XX.XX eth0  
At last make your network up again.
 ifconfig eth0 up  
FOR MAC OSX:
In the terminal use this command
 sudo ifconfig en0 xx:xx:xx:xx:xx:xx  
If you need to change the MAC address on your router, you’ll find this option in your router’s web interface.

So I hope its clear how MAC Spoofing done, Later on i will discuss attacks of Spoofing. Any Doubt ask me in Facebook, Twitter, Google+

And Like my Page in Facebook............... 
Continue reading