| MENU |

Monthly Archives / March 2014

Hacking

Facebook Password Hack

Hello People…… this going to be about how to get Facebook password via setting up a fake login environment for the victim to login and we able to harvest the username and password without any indication to the Facebook owner….

Facebook is a popular social site… a lot of people use it on daily basis, what they are not aware is, its hackable…, most people think its just a social site, hence, its not so important to secure it, so, they ignore…. logging into Facebook account in public network may give away your credentials and your informations… [ This really happened to me several years ago, someone got my page and posted that i’m dead! my phone rang non stop on that day… sigh ] 

In my training days,  my students would login Facebook on the training pc and start checking the update status while the training is going on, well its not a big problem, it doesn’t really distract them, but, they just keep an eye on the status updates and another eye on me.. :)….and I would warn them, that logging in using public computers is dangerous…. but… well,  they don’t really care much.

So, I decided  to reveal the easiest method to catch the username and password in a public environment. e.g Starbucks, Training Rooms, Hotels, Train Stations , Airports…. and so on….
With this information, I hope, people will be more vigilant before logging into Facebook from a public network. 

UPDATE!!! :: this method called MiTM ( Man in the Middle Attack ) means, you need to be in the middle of the victim and the Internet! 

Lets Begin: 

I’ve designed a structure to understand the steps involved. 

  1. Requirements
  2. Setup
  3. Configure SET Tool kit [ Social-Engineer Toolkit ]
  4. Configure DNS Spoofing
  5. Results

1. Requirements:

Before you begin to run this and test it on your own environment, make sure this requirements are met,

  1. A Laptop : 4GB Ram and above
  2. VMware Workstation / VMware Fusion   [ www.vmware.com ]
  3. A Switched Network ( LAN or WLAN )  [ http://en.wikipedia.org/wiki/Fully_switched_network ]
  4. Kali Linux   [ www.kali.org ]
  5. Network Protocol Knowledge : e.g IP , TCP , HTTP &  HTTPS    [ http://en.wikipedia.org/wiki/Lists_of_network_protocols ]
  6. Linux Command Knowledge [ http://www.tldp.org/LDP/intro-linux/html/ ]

2. Setup:

Setup your VM to boot Kali Linux  [ I assume you know how to setup  a Virtual Machine, if not head to this site  and learn]  then, get connected to your target network , make sure you are in the Network by performing a casual browsing. Once you are set in the target network, boot your Kali Linux VM and get the VM to be connected to the target network as well.

Then run these commands to find your IP address and the Gateway.
Debian_7-Kali

3. Configure SET Tool kit [ Social-Engineer Toolkit ]

Once you got your IP address, you need to start SET tool in Kali Linux, just run ” setoolkit ” from your terminal, SET is a tool that included inside Kali Linux to perform massive Hacking Attack, there’s a tool within that can create a fake page of www.facebook.com and it will setup a web server to run inside your computer and act as the www.facebook.com itself…. and all this is done automatically…. cool huh? 

Lets take a look at the steps to create a fake Facebook page…

setoolkit

After that, select 2 followed by 3 ….
select 2  select 3

Once you in that Menu, enter your IP address and https://www.facebook.com to the prompt to setup a clone Facebook Website running inside your Kali Linux as a Fake Facebook Page.
Debian_7-Kali 5

Once the SET tool started the fake Facebook login, Now Leave that window alone and move to next step… [ You may want to browse to your OWN ip address to verify the fake website is up and running ]

4. Setup DNS Spoofing

DNS Spoofing, is an old type attack that exist very very long time ago…. what actually they do is, an attacker will forge entry of a specific DNS host ( in our case, its www.facebook.com )  and poison the network with that forged entry, any victim that query for www.facebook.com, will be given with a  fake DNS record/answer that eventually pointing to our fake Facebook page….

So, lets take a look at the setup.

Firstly, open a new Terminal and  you need to edit this file and setup accordingly,
Debian_7-Kali 2

Then, you need to run these command to poison the whole network [ Be very careful when doing this, the whole network will be poisoned, therefore not recommended to run in a large network ]. As a part of technical view, I’ve included the before and after effects from 2 most used client computers, a MAC and Windows.

Before Performing Poisoning , MAC and Windows : Both computer able to ping the real www.facebook.com, 
b4-dns-spoof-MAC b4-dnsspoof-win

Now RUN the Command to Poison the whole network with forged DNS record of www.facebook.com
Debian_7-Kali 3

 The After Effects of running the DNS Spoof a.k.a Poisoning : Both Computers now thinks our Kali Linux IP address is www.facebook.com
Af-dns-spoof-MAC Af-dnsspoof-win

Now your whole network would be poisoned with your fake DNS record…, by now if anyone is trying to access www.facebook.com, it will land on your fake FB page… the results? Next…

5. Results

This is the result of logging in Facebook via the fake Facebook login…

–THE FAKE PAGE Looks like this on the victim computer [ Windows: IE and MAC:Firefox ] :
firefox-fake-login2  ie-fake-login

I’ve tried with my own account and my friend’s account [ off course, its with her 100% permission 🙂  ]

–THE Username and PASSWORD collection in SET inside KALI Linux 
steve-pass-captured zhall-pass-captured
Obviously, I’m not going to reveal the password… yeah? 🙂 

 

–The Victim PAGE looks like this…. no Trace , no Error, no indication of this is happening? Cool huh?
firefox-fake-login3 ie-fake-login2

So… That’s the FACEBOOK password hack…. it can work with bank’s website as well, but, that’s the reason banks have dual login method, first they give you the Username prompt and then they give you the password prompt …. so, its still safe…. 🙂 

All I would suggest is, be vigilant, and DO NOT login to WEBSITES that has your information in PUBLIC network, so, the next time you visit Starbucks, just drink coffee and socialise with a human instead with Facebook! Okay? Have Fun !!! 

and there’s one more thing, you need to setup CA Server, Certificate Signing and Configure some Certificate settings and proxy redirect before this can be done…if not, the victim would know its a fake page, that would be a long tutorial to write here, so, if you are interested, Attend training, read wiki’s, google it , bing it..or buy me beer… you can get the detailed info… 🙂 

*all this DEMO was done in a Controlled environment, no DOGS or CATS were harmed during  the production of this DEMO. 
*all FACEBOOK account used in the DEMO is with 100% permission from the owner[s]. 
*Use all the information with your own risk, www.steven.com.my do not condone this demo to be used in real public environment.

Hacking

WPA/WPA2 Crack Demo – Live – Part 1

Yeah yeah…its an old topic…but something interesting….WPA/WPA2 Cracking……using Dictionary Brute Force and Brute Force using GPU and CPU. There’s many info about this outside there, unfortunately, there no single Straight Forward or Real GUIDE to reproduce those DEMO, so I’ve decided to relay this clearly… yeah… CLEARLY! and straight to the POINT!  ( hopefully it would benefit some ) 

A brief Intro: 
Wireless is currently used as part of our home/business/entertainment internet infrastructure, hence, security and securing the infrastructure is very Important, unless, you don’t mind your neighbour using your bandwidth to Download and Upload or even eavesdropping on your traffic, then, LEAVE this BLOG NOW!…  or if YOU want to secure your infrastructure, take a look at the Possibilites and work towards Secure Wireless… we called this “ Security Through Scrutiny

I’ve put in some structure to this GUIDE:

 

  • PART 1 
    1. The Understandings 
    2. The requirements
    3. The Gathering 
  • PART 2
    1. The Cracking 

So, lets begin the PART 1, 

1. The Understanding

  1. Wireless: The traveling of data in an unseen world, as water, that has no taste, no flavour, no colour, but we need it everyday, Wireless works with AIR.. or space… or whatever you would name it, as technology evolve, we need it everyday… same like Water…
  2. Data Travelling in Air, requires frequency, like our radio, therefore its requires Radio Frequency and a Channel.
  3.  Wireless technology or known as WiFi has a predefined  Channel and Frequency that created and controlled by IEEE
  4. Each Wireless infrastructure requires an AP ( Access Point ) and Wireless Client ( Laptop, SmartPhone, Tablets  and etc )
  5. To Protect the Data Exchange between Wireless AP and Client, a Security Mechanism/Protocol is created, Known as WEP , WPA , WPA2-Personal and WPA2-Enterprise
  6. Commonly used Wireless Security Protocol today in our everyday life is WPA-Personal for Home/Small Businesses and WPA-Enterprise for Enterprises.
  7. WPA/WPA2 requires min 8 Char as the shared code ( Shared Code is like a password to Access the Wireless Service ), each client required to insert the passcode in order to join a wireless access point.
  8. Each Wireless Access Point broadcast a name known as BSSID ( or SSID )
  9. A little understanding of Linux operating system and the way to use the command
  10. A little understanding of Virtualization Technology and How to Setup a Virtual Machines

And that the understanding. Please refer to all this links to get more Information about the UNDERSTANDING:
( You really need to UNDERSTAND this part, and by just reading these links, you may not Understand, that’s why we have Hand’s On Lab, Books, Trainers, Security/Wireless Certified Guys… and so on, try to use them as well…  )

  1. http://en.wikipedia.org/wiki/IEEE_802.11
  2. http://en.wikipedia.org/wiki/Wireless_security
  3. http://en.wikipedia.org/wiki/List_of_WLAN_channel
  4. http://www.tldp.org/LDP/intro-linux/html/
  5. http://en.wikipedia.org/wiki/Comparison_of_platform_virtualization_software


2. The Requirements

A. Hardware:

    • A Laptop with at least 4GB RAM or more
    • A Wireless Card that supports “Packet Injection” (usb)
    • USB Port

The WIRELESS Card i used for this DEMO : 

alfa1     image-2
Add to the Wireless card, a good powerful antenna would be an added advantage…

B. Software:

    • Any O.S that is capable of running Linux as Virtual Machines
    • VMWare Workstation [ Windows ] or VMWare Fusion [ recommended to reproduce the DEMO ]   —> http://vmware.com
    • Kali Linux 64bit latest release    —>  http://www.kali.org

3. The Gathering

Well, if you are still reading this, then, I assume, you do know what is virtualisation and how to setup and etc…, so, we take a straight deep dive to the Gathering Part inside kali linux, if you still stuck in setting up, drop a comment, if i’m free, I’ll help.

 

Firstly, start the KALI Linux VM, then attach the USB wireless device and make sure the Kali Linux detect it…. run this following commands to verify the setup…
Debian_7-Kali

if the card is detected, then, run check to see is there any process that can cause trouble, if there is, kill it!
Debian_7-Kali 2

Then, Next would be, Check again and Start the wireless card in monitor mode
Debian_7-Kali 3

Then, perform a Air Dump, means DUMP all available DATA travelling in the air to your console….
Debian_7-Kali 4 

The result of the dump should look like this, from there, pick you target and write down the  target information, e.g : BSSID & Channel 
Debian_7-Kali 5

Then, stop the AIR DUMP and Start over again the dump, but this time using the Target information and set the command to Collect the DATA in a text files defined by option  [ -w ] 
Debian_7-Kali 6

Following, while its collecting DATA from the DUMP, proceed to next step, 
Debian_7-Kali 7

Next, start a new console and perform DoS [  Denial of Service ] to force all the client connected to perform a reconnection, when the reconnection happens, a WPA HANDSHAKE will take place, the whole gathering is depends on the WPA HANDSHAKE… follow this…. 
Debian_7-Kali 8

and then, go back to view the gathering of WPA HANDSHAKE, 
Debian_7-Kali 9

If you see the WPA HANDSHAKE, you may stop all you activity and proceed to part 2….. Well… based on the comments and likes I get in this article, I would construct the part 2, in Part 2, I will DEMO on how to Crack the HANDSHAKE using Dictionary, GPU and CPU… See you guys in next round…. Have Fun “Gathering” 

*all this DEMO was done in a Controlled environment, no DOGS or CATS were harmed during  the production of this DEMO. 
*all the  gathered NETWORK belongs to Steven.Com.My,  WE do NOT crack others NETWORK,  unless we have a Written permission to do so. 

Computers

Learning PHP / CSS / HTML

Well, I’m a technical trainer, but never a programmer, actual fact is, I learned programming & my major was Programming, gone the days where I compile c programming in my head… well, to maintain that I still do shell programming…. via unix/Linux… interesting, but requires depth understanding of admin commands before you can shell script… now, I’m learning more & more about php/CSS/HTML… and every time is see the code snippets … I get a my head spinning at 10000 rpm… but… hey, it’s a good thing & nice to learn new things… for the beginners, I strongly encourage you guys to browse these links….. example, setting up php… and so on…

W3school

easy php

php net

… more to come… chillax

Common

posting from Iphone…

it’s does work! sweet! but lack of editor WYSIWYG…. 🙁 no best free editor… gotta stick with the default one…. Continue Reading

Common

Never a web blogger

Hello world, again…… That reminds me of my first programming….. Hello world…. Lolz. Well, actually am not a big time blogger, don’t really know what to blog about, well, now am trying to be more a blogger… Trying to contribute something to the internet world…. Hopefully it’s comes by good…. Wish me luck people! 🙂

Computers

My Tech…

My Tech Systems…. its getting older… but, still performing…

 

 

Common

Finally a Better Editor…

After searching and researching, I found a good editor. its cool, and good, its called TinyMCE, i remembered I used something like that in Joomla… Oh Joomla… too much security bugs…. any way…. lets try some of it…. 

Still, the Image insert require you to type in the complete URL…. sigh… More research…. 🙁

Food

Teh Tarik

that’s my Teh Tarik….

20140302-012918.jpg