January 2016

acccheck Package Description

Kali Linux Tools

Acccheck Attempts to connect to the IPC and ADMIN shares depending on which flags have been chosen, and tries a combination of usernames and passwords in the hope to identify the password to a given account via a dictionary password guessing attack. this  tool is designed as a password dictionary attack tool that targets windows authentication via the SMB protocol. It is really a wrapper script around the ‘smbclient’ binary, and as a result is dependent on it for its execution. only use -v mode on very small dictionaries, otherwise, this has the affect of slowing the scan down to the rate the system writes to standard out.

he Server Message Block (SMB) Protocol is a network file sharing protocol, and as implemented in Microsoft Windows is known as Microsoft SMB Protocol. The set of message packets that defines a particular version of the protocol is called a dialect. The Common Internet File System (CIFS) Protocol is a dialect of SMB. Both SMB and CIFS are also available on VMS, several versions of Unix, and other operating systems.

Most usage of SMB involves computers running Microsoft Windows, where it was known as “Microsoft Windows Network” before the subsequent introduction of Active Directory. Corresponding Windows services are LAN Manager Server (for the server component) and LAN Manager Workstation (for the client component)

SMB can run on top of the Session (and lower) network layers in several ways:
Directly over TCP, port 445;
Via the NetBIOS API, which in turn can run on several transports;
On UDP ports 137, 138 & TCP ports 137, 139 (NetBIOS over TCP/IP);
On several legacy protocols such as NBF (incorrectly referred to as NetBEUI).
The SMB “Inter-Process Communication” (IPC) system provides named pipes and was one of the first inter-process mechanisms commonly available to programmers that provides a means for services to inherit the authentication carried out when a client first connected to an SMB server.

The simplest way to run acccheck is as follows:
./acccheck.pl -t 10.10.10.1
This mode of execution attempts to connect to the target ADMIN share with the username ‘Administrator’ and a [BLANK] for the password.
./acccheck.pl -t 10.10.10.1 -u test -p test
This mode of execution attempts to connect to the target IPC share with the username ‘test’ and a password ‘test’.

Each -t, -u and -p flags can be substituted by -T, -U and -P, where each represents an input file rather than a single input from standard in.

E.g.
./acccheck.pl -T iplist -U userfile -P passwordfile
Only use -v mode on very small dictionaries, otherwise, this has the affect of slowing the scan down to the rate the system writes to standard out.

Any username/password combinations found are written to a file called ‘cracked’ in the working directory.

Options:
 -t [single host IP address]
 OR
 -T [file containing target ip address(es)]

Optional:
 -p [single password]
 -P [file containing passwords]
 -u [single user]
 -U [file containing usernames]
 -v [verbose mode]

Examples:
Attempt the 'Administrator' account with a [BLANK] password.
acccheck.pl -t 10.10.10.1
Attempt all passwords in 'password.txt' against the 'Administrator' account.
acccheck.pl -t 10.10.10.1 -P password.txt
Attempt all password in 'password.txt' against all users in 'users.txt'.
acccehck.pl -t 10.10.10.1 -U users.txt -P password.txt
Attempt a single password against a single user.
acccheck.pl -t 10.10.10.1 -u administrator -p password

Offensive Security has announced on January 21, 2016, that their popular penetration testing operating system, Kali Linux, is getting a rolling release edition, at the request of numerous users.
Kali Linux 2016.1 is the first version of the Kali Linux Rolling Edition
Kali rolling 2016

Kali Linux is one of the most used and powerful penetration operating system on the world
with this new update you finally can get new updated packages fast without having to wait ages
it brings you the latest and greatest penetration testing tools, as well as a fresh base synchronized with the upstream software repositories of the stable Debian GNU/Linux 9.0
Every time a new tool is updated, it’s tracked, packaged, tested and released within 24-48 hours by the Kali dev team.

The new rolling system has been tested over a period of 5 months and it appears to be stable
To get a better understanding of the changes that this brings to Kali, a clearer picture of how rolling releases work is needed. Rather than Kali basing itself off standard Debian releases (such as Debian 7, 8, 9) and going through the cyclic phases of “new, mainstream, outdated”, the Kali rolling release feeds continuously from Debian testing, ensuring a constant flow of the latest package versions.

kali linux  requirements :
system requirements:
At least 10GB hard disk space
512MB Ram for i386 and amd64 architectures and this is the minimum just to start it up !
A bootable CD-DVD Drive or a USB stick and you can simply use only the ISO file to install it on vmware .

How to update to Kali linux 2016.1

1) Backup your data
2) Download Kali linux and burn the new ISO from kali linux download
3) Format the partition and do a fresh install of the new distro

open a terminal window as root and issue the following commands:
cat << EOF > /etc/apt/sources.list
deb http://http.kali.org/kali kali-rolling main non-free contrib
EOF

apt-get update
apt-get dist-upgrade # get a coffee, or 10.
reboot
Please note that the sana repository EOL is planned to be on 15th April 2016. After that date there won’t be future updates, so it is advisable to migrate to Kali linux 2016.1 as soon as possible.


how to install Kali linux on VMware

1) Download kali linux iso
2) If you have 64bit CPU download 64bit copy, if not sure download 32 bit and it will work on both
3) After downloading the file go to vmware
4 ) Create new machine
    1}Linux  > Debian 7.x
    2}select a maximum disk size for Kali > select at least 30 GB’s as Kali tends to expand over time. i install it many time for testing over and over and it even work with 10GB so its up to you and how much space you are going to give !
After you’ve entered your desired value change the next option to Store virtual disk as a single file and click Next. ( sorting it as a single file will make the reading and writing much faster
5) Select Memory
after click on next ,
click on Customize hardware
Select Memory in the left pane of the window, and slide the slider on the right side to at least 512 MB
6)Click Finish and run your new VMware Check this Video for next Steps


kali linux vm
VMware Tools simply and easy install
As of Sept 2015, VMware recommends using the distribution-specific open-vm-tools instead of the VMware Tools package for guest machines.
Kali linux was tested and works correctly with open-vm-tools.
To install them, simply open a new terminal window as root and issue the following commands:
Youtube Video : Install VMware Tools on Kali Linux
apt-get update
apt-get install open-vm-tools-desktop -y
reboot
if you have any problem when you try to install VMware tools on kali linux maybe it's cause  your source file need to be fixed !
if so check this post Fix Kali Linux sources.list Repositories
and if you had any error let me know by comment ,

Supported platforms:
Kali Linux is distributed in 32- and 64-bit images for use on hosts based on the x86 instruction set and as an image for the ARM architecture for use on the BeagleBoard computer and on Samsung's ARM Chromebook

tools are arranged into 13 categories:
01- Information Gathering
02- Vulnerability Analysis
03- Wireless Attacks
04- Web Application
05- Exploitation Tools
06- Forensic Tools
07- Stress Testing
08- Sniffing & Spoofing
09- Password Attacks
10- Maintaining Access
11- Reverse Engineering
12- Hardware Hacking
13- Reporting Tools

kali linux default user : root
kali linux default password : toor

Nmap is one of the most important tools for every Network security
Nmap it's the best  network security scanner tool over the last 10 years on all major Operating Systems. more about nmap at the end of the post !
aNmap-Android-Network-Scanner

So far it was available in windows, linux and Mac OS X and now it's available at android platform
It is compiled from real Nmap source code by some developers to support android devices.
the developers who code it to work with android called it ANmap

ANmap is an android tool that you can use on a network to determine available hosts, services, operating system versions, types of packet filters/firewalls and other characteristics.

to get ANmap work with full features your device must be rooted , keep in mind rooting your device breaks ups vendor (reseller) guarantees
so if you root your device to run ANmap on it be very careful to which application you give access to run as super user!

Download ANmap apk from here

How To Use aNmap:
after downloading and running the app you will see a window requesting full access to all device features
click grant 
just Grant root access, and you will see the main page of aNmap:

note if your phone if not rooted you wont see that window.

after getting into the main page of anmap you can use all the features of aNmap if you have a rooted phone
to use it
1-Enter the IP address of the target in the top-right box.
2-Then tap on "nmap" button.
It will start scanning the target server and display the open ports and other characteristics 

If you want to use Anmap only command line interface (without gui).
Download compiled nmap with data files in this tar ball or this zip archive and keep it in one folder.
Than connect to localhost via ConnectBot, untar and start scanning:
$ tar -xvf nmap-5.51-1.tar
$ su
# ./nmap 127.0.0.1
Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon (also known by his pseudonym Fyodor Vaskovich) used to discover hosts and services on a computer network, thus creating a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the responses.

it can be used to discover services running on Internet connected systems. Like any tool it could potentially be used for black hat hacking, as a precursor to attempts to gain unauthorized access to computer systems. it is more often[citation needed] used by security and systems administration to assess networks for vulnerabilities.

System administrators can use it to search for unauthorized servers, or for computers that do not conform to security standards.

Nmap is related to vulnerability assessment tools such as Nessus, which test for common vulnerabilities in open ports. The included NSE scripts that are packaged with modern versions of Nmap are able to perform vulnerability checks against discovered services.

why Nmap is ported to android ?
why not ! Nmap is used everyday by thousands of network professionals to keep their systems secure. Nmap's documentation describes itself as a "network exploration tool and security scanner," and it has excelled at these complex capabilities. Nmap tracks down the Wild West town's citizens, identifies each person, and checks them over for potential security gaps. All of these scans are configured, launched, and recorded using nmap's built-in capabilities. With nmap, the Wild West's network becomes a safer and more comfortable place to live.

and Android is one of the most used mobile operating system all over the world almost everyone now have mobile phone and most of them are using android as the open source operating system.
android is more like linux you can use it in  a simple  way and you can make it do almost everything you need
a network administrator would really enjoy using nmap on his phone maybe it can't do all the job but for sure it will do a good part of it , i mean the first step !

why this app is not being updated ?
i wish i could find the answer for that question but as i said this app still can do the first part of the job
Make sure to Check  Intercepter-NG v2.0 for Android


Automated Evil Twin Attack: infernal-twin
Evil twin is a term for a fake WiFi access point, it appears to be a legitimate one offered on the premises, but it has been set up to snoop "spy"  on your wireless communications.
An evil twin is also called wifiphisher it's the wireless version of the phishing scam that hackers use to hack online accounts
The attacker fools wireless users to make them connect to a tainted hotspot by posing as a legitimate provider.
wifi phisher


This type of fake wifi attack may be used to steal the passwords of the users by either snooping the communication link or by phishing, which involves setting up a fraudulent web site and luring people there in a simple word it's wifi phisher

This tool was created to help the auditors and penetration testers to perform wireless security assessment in a quick manner and easing complex attack vectors.

it is an automatic wifi hacking tool, it's a Python suite created to aid penetration testers during wireless assessments,  many of the common attacks can be done automatically by using this tool
which can get complicated and hard to manage when executed manually.
FeaturesWhat this tool will do
1-WPA2 hacking
2-WEP Hacking
3-WPA2 Enterprise hacking
4-Wireless Social Engineering
5-SSL Strip
6-Evil Access Point Creation
7-Infernal Wireless
8-Report generation
9-PDF Report
10-HTML Report
11-Note taking function
12-Data is saved into Database
13-Network mapping
14-MiTM
15-Probe Request
1-Set up monitoring interface
2-Set up DB
3-Scan wireless network in the range
4-Connect to the network selected SSID
5-Obtain login page of authentication
6-Modify the login page with attacker
controlled php script to obtain the credentials
7-Set up Apache Server and serve fake login page
8-Give a victim an IP
9-Set up NAT table
10-Dump the traffic
11-Perform Deauthentication Attack

how Evil Twin attack work ?

Author Name

{picture#YOUR_PROFILE_PICTURE_URL} YOUR_PROFILE_DESCRIPTION {facebook#https://www.facebook.com/wTsXDev} {twitter#https://twitter.com/wTsDev} {google#https://plus.google.com/u/0/+AnonSalame} {pinterest#https://www.pinterest.com/Thexwts/} {youtube#https://www.youtube.com/channel/UCg2fUa8Yp-aWDCJYQTVHmBg}

Contact Form

Name

Email *

Message *

Powered by Blogger.