Wireless Hacking Using Backtrack Introduction Hello and welcome to my tutorial about wireless networking. Today I’ll be teaching you how easy it is to obtain access to a wireless protected network by cracking the Wi-Fi network’s password. There are lots of questions coming from the beginners on how to get WEP/WPA/WPA2 password and accessing neighbor’s connection. I will be covering all of the aspects and ways of hacking a network and gaining access to the router. How to crack WEP Password What u need to succeed ? A compatible wireless adapter —This is the biggest requirement. You’ll need a wireless adapter that’s capable of packet injection, and chances are the one in your computer is not. A BACKTRACK CD- Download yourself a copy of the CD and burn it, or load it up in VMware to get started. A nearby WEP-enabled Wi-Fi network. The signal should be strong and ideally people are using it, connecting and disconnecting their devices f...
Links can be compared to a mystery box: you never know what lies there until you open it. A wise person should treat links with caution. One never knows the rabbit hole a link could lead to. Caution is of utmost importance. Well, as an internet user, you can’t completely steer clear of links. You see them every day, and quite frankly, they’re enticing you to click. If you ever find a link suspicious, there are a few ways to test it: Hover over hyperlinks If you are don't know a hyperlink is secure or not, then hover the mouse cursor over the text to uncover the address. Then you can click later, if the address is legitimate. Note that phishing scams links use domain names which are similar to legitimate sites. Observance is the key to catching any frauds. For example, a phishing scam targeting this website may use something like www.abc-hack-news.com , which appears similar to the real thing. It’s actually www.latesthackingnews.com . Note the differences. Hovering ov...
How to Hack Facebook accounts using Remote keylogger and prevention against this attack In this post i am going discussing about how hackers hack facebook accounts using remote keylogger . Q) What is a keylogger? A) A keylogger is a program or software which logs or track the keystrokes by the user and saves them into a file. Q) Where are keylogs saved? A) It saves the logs into a text file which is present either in windows directory or in cache memory . Q) Since it saves logs in the Pc ,do i need physical access to that computer ? A) Not necessarily ,It depends on the keylogger you are using . If you are using a remote keylogger you dont need physical access to that computer. The logger will automatically upload the logs to your **FTP SERVER** ,website,email… Download Keylogger Steps:- 1) Download and extract all files [Disable your antivirus while working with these files because it will mark these files as virus and will delete them] . 2) O...
Comments
Post a Comment