Sunday, 30 October 2016

How To Hack Wifi WPA WPA2 WPS In Windows In 2 Mins Using JumpStart And Dumpper

How To Hack Wifi WPA WPA2 WPS In Windows In 2 Mins Using JumpStart And Dumpper

Today I am going to share a wonderful Hacking Method On Wifi, using this we can hack a wifi WPA/WPA2 – WPS enabled network within seconds, the easiest and best way to Hack wpa/wpa2 - wps networks
THIS IS FOR EDUCATIONAL PURPOSE ONLY, I AM NOT RESPONSIBLE FOR ANY ILLEGAL ACTIVITIES DONE BY VISITORS, THIS IS FOR ETHICAL PURPOSE ONLY
What is WPA/WPA2 :
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy).
WPA became available in 2003. The Wi-Fi Alliance intended it as an intermediate measure in anticipation of the availability of the more secure and complex WPA2. WPA2 became available in 2004 and is a common shorthand for the full IEEE 802.11i (or IEEE 802.11i-2004) standard.
A flaw in a feature added to Wi-Fi, called Wi-Fi Protected Setup, allows WPA and WPA2 security to be bypassed and effectively broken in many situations. WPA and WPA2 security implemented without using the Wi-Fi Protected Setup feature are unaffected by the security vulnerability.
WPA2 has replaced WPA. WPA2, which requires testing and certification by the Wi-Fi Alliance, implements the mandatory elements of IEEE 802.11i. In particular, it includes mandatory support for CCMP, an AES-based encryption mode with strong security. Certification began in September, 2004; from March 13, 2006, WPA2 certification is mandatory for all new devices to bear the Wi-Fi trademark.
What Is WPS :
Wi-Fi Protected Setup (WPS; originally Wi-Fi Simple Config) is a network security standard that attempts to allow users to easily secure awireless home network but could fall to brute-force attacks if one or more of the network's access points do not guard against the attack.
Limitations For Using This Hack :
1) This Hack works on Wpa/Wpa2 – Wps Unlocked Networks only
2) Does not work on Costly Routers, So cannot hack all the wifi networks Available near you.
3) Not all Networks or routers can be hacked using this method.
4) While hacking some networks it says "Wireless Configuration Failed " that means jumpstart can not hack that particular network.
Many people asked me, is there any to hack wifi Wpa and Wpa2 through Windows, So Here is the article for Hacking Wifi Wpa/Wp2 Networks Through Windows also in Few minutes
Requirements:
1) Laptop or USB wifi Adapter
2) Windows Operating System
3) Wincap
4) JumStart
5) Dumpper
6) NetFrameWork 4.5
7) Wpa/Wpa2 – WPS Networks Available with at least 8% signal
Download the Required Software’s:::
1) Wincap
2) JumpStart
3) Dumpper
4) NetFrameWork 4.5
Download and Install all the Above Given Software’s one by one, even If a single software is missing out hack cannot be successful, be careful in downloading and installing these software’s.
Now Here I Start Our Tutorial on Hacking Wifi WPA/WAP2 – WPS Networks In Windows Using JumpStart And Dumpper
Tutorial To Hack Wifi WPA/WPA 2 - WPS Networks
1) After Downloading and Installing all the Software’s Open Dumper (No need of Installing Dumper, whenever you want to hack open it )

2) Select your Network Adapter Now Click on “Scan”, There you can see all the available Wifi Networks

3) Now Move on to the “WPS” Tab

4) Select “All Networks”

5) Now Click on “Scan”
6) Select a Network That You Want Hack

7) Now Click On Start JumpStart

8) JumpStart Will Automatically Start The Process And Complete The Hack



9) Now The Hack is Completed, You are already connected to the network that you Hacked

10)Click on “Profiles” to see the Details and Passwords of the wifi Networks That You Hacked

11)Select a Network and There you can find the details and passwords of the networks that you hacked
This is the Simplest Method ever that too in windows, till now I did not post wifi hacking through windows, this is my very first post on Wifi Hacking through Windows
Normally some of the wifi networks cannot be hacked through this method, this method has many limitations.
If You are Struck anywhere please feel free to comment below, so that I can help you solve your problem
THIS IS FOR EDUCATIONAL PURPOSE ONLY, I AM NOT RESPONSIBLE FOR ANY ILLEGAL ACTIVITIES DONE BY VISITORS, THIS IS FOR ETHICAL PURPOSE ONLY

Saturday, 29 October 2016

How to Turn Off Your PC Using Your Smartphone

How to Turn Off Your PC Using Your Smartphone

Do you want to turn off your PC at your home and save some electricity. Or may be try to shutdown your PC from outside just because it looks cool. Read this post and know how can you do this trick in your PC.
READ  How to Control your Window 10 PC from your Android Mobile
Well, if you walked away from your computer and remembered that you want to turn it off, you can actually do it from your phone!
First, you’ll need to download an free app called Unified Remote on your android phone , and you’ll need to download it’s server to your PC from this Official  website right here.
Developer: Unified Intents
Price: Free 
  • Unified Remote Screenshot
  • Unified Remote Screenshot
  • Unified Remote Screenshot
  • Unified Remote Screenshot
  • Unified Remote Screenshot
  • Unified Remote Screenshot
  • Unified Remote Screenshot
  • Unified Remote Screenshot
  • Unified Remote Screenshot
  • Unified Remote Screenshot
  • Unified Remote Screenshot
  • Unified Remote Screenshot
  • Unified Remote Screenshot
  • Unified Remote Screenshot
  • Unified Remote Screenshot
  • Unified Remote Screenshot
  • Unified Remote Screenshot
Go through the installation process on your PC. Once finished, make sure the server app is running on your PC, and then open up the app on your phone. It’ll scan for a server on your local network, and once it finds it, it’ll let you control your PC.
When you start to think about all the things that could go wrong when browsing the Internet, the web starts to look like a pretty scary place.
Before using this app make sure your mobile and pc in same wifi network.
Know how to setup Unified Remote app from this article.
READ  Turn Your Android Mobile into Mouse and Keyboard
Now, the way the app works is with a bunch of different remotes. There are remotes that’ll let you control your PC as if it was a mouse and keyboard, but turning off the PC with that would be difficult if you aren’t in the room. The remote we want is called Power. Click that, and then click Shutdown or Restart to turn your PC off.
Unified Remote Power
Unified Remote Power
Ever wish you could turn your computer on or off remotely or on a schedule or other triggers? Imagine how much time and energy you could save! Time to get familiar with Wake On LAN!
Bonus: With the help of this app you can turn your android mobile into mouse and keyboard. So you can actually control your PC from android mobile.
You can also control VLC Media Player in Windows from this App. Read this article and know how can you control VLC media player from using your android smartphone.
READ  How to Remotely Control VLC Media Player from your Android
Do you know of any other cool ways to turn your PC off remotely? Let us know in the comments!

Crack WPA/WPA2 Wifi Password Without Dictionary/Brute Fore Attack using Fluxion

Crack WPA/WPA2 Wifi Password Without Dictionary/Brute Fore Attack using Fluxion

Crack WPA/WPA2 Wifi Password Without Dictionary/Brute Fore Attack using Fluxion

Fluxion, A Key To Pentesting/Hacking Your WPA/WPA2 Security Without Brute Force
Fluxion script has been available for a while and is most apt for security researchers and pentesters to test their network security by hacking WPA/WPA2 security without brute forcing it. Fluxion is based on another script called linset. Fluxion is not much different from Linset but makes use of certain improvements, bug fixes, and additional features. Fluxion works by using something like a man in the middle attack/ evil twin attack to get WPA password instead of going the bruteforce/dictionary route.
Fluxion is compatible with the latest release of Kali (Rolling). Latest builds (stable) and (beta) here. Kindly read the Fluxion Wiki to get the full tutorial.
Disclaimer : Use this tool only on networks you own. Hacking networks that you don’t own may be illegal in your country
How it works:
Step 1: Scan the networks.
Step 2: Capture a handshake (can’t be used without a valid handshake, it’s necessary to verify the password)
Step 3: Use WEB Interface *
Step 4: Launch a FakeAP instance to imitate the original access point
Step 5: Spawns a MDK3 process, which deauthenticates all users connected to the target network, so they can be lured to connect to the FakeAP and enter the WPA password.
Step 6: A fake DNS server is launched in order to capture all DNS requests and redirect them to the host running the script
Step 7: A captive portal is launched in order to serve a page, which prompts the user to enter their WPA password
Step 8: Each submitted password is verified by the handshake captured earlier
Step 9: The attack will automatically terminate, as soon as a correct password is submitted
Requirements:
  • Linux operating system
  • Kali Linux 2 or Kali 2016.1 rolling or
  • Kali 2 & 2016 support the latest Aircrack-ng versions
  • External Wi-Fi card is recommended
Read Full Detailed Article here
Related Video
It depends on the victim.This method don’t crack the password. This is a phishing method.When you capture wpa handshake, you block victim’s wifi and create a new wifi spot without protection with the same name. Then the victim must connect in this wifi. When the victim connected in your new wifi, will be displayed a login page. Then the victim will write his password.

How To Hack Into A Computer Which Is Connect On LAN

How To Hack Into A Computer Which Is Connect On LAN


Enter Into A Computer Connected on LAN



     This tutorial is only for educational purpose and do this at your own risk. Using this against a network that does not belong to you may result in legal implications based on the law under the owners jurisdiction.
What do I need ?
  • Windows Os
  • Cain And Abel

Step 1:- Finding the target
So first off we need to find a computer or the computer to hack into. So if your
plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and
Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local sub net. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross.


Another window will pop up, make sure “All host in my subnet” is selected, and then
click ok.
It should begin to scan.



Then IP’s, computer names, and mac addresses will show up
Now remember the IP address of the computer you are going to be breaking into.
If you can’t tell whether the IP address is a computer, router, modem, etc, that’s ok.
During the next step we will begin our trial and error.
Step 2:- Trial and error
Now, we don’t know if we have our designated target, or if we have a computer or
printer, or whatever else is on the LAN or WAN.
If you did get the IP of the target though, I still recommend reading through this
section, for it could be helpful later on.
Click on the start menu and go to run, type in cmd, and click ok.
This should bring up the command prompt.
From here we will do most of the hacking.
Now I will be referring to certain commands that need to be inputted into the
command prompt.
I will put these commands in quotes, but do not put the quotes in the code when you
type it into the prompt.
I am only doing this to avoid confusion.
Let’s get back to the hacking.
Type in “ping (IP address of the target).” For example in this tutorial, “ping
192.168.1.103.”
This will tell us if the target is online.
If it worked, it will look something like this (note, I have colored out private
information):

IF it didn’t work, meaning that the target is not online, it will look something like this:

If the target is not online, either switch to a different target, or try another time.
If the target is online, then we can proceed.

Step 4:- Gathering the information
Now, input this command “nbtstat –a (IP address of target).” An example would be
nbtstat –a 192.168.1.103.”
This will show us if there is file sharing enabled, and if there is, it will give us the:
currently logged on user, workgroup, and computer name.

Step 5:- Getting In
Finally it’s time.
By now we know: that our target is online, our target has file sharing, and our target’s
computer name.
So it’s time to break in.
We will now locate the shared drives, folders, files, or printers. Type in “net view 
(IP Address of Target)”
An example for this tutorial would be: “net view 192.168.1.103

We have our just found our share name. In this case, under the share name is “C,”
meaning that the only shared thing on the computer is C. Then to the right, under
Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C
DISK can sometimes be an entire person’s hard drive.


As you can see, for my hack I have already used “K,” so I used “G” instead.
You may also do the same for multiple hacks.
If it worked, it will say “The command completed successfully.
If not, you will have to go retrace you steps.
Now open up “my computer” under the start menu, and your newly created network
drive should be there.


Now, if you disconnect from the WAN or LAN, you will not be able to access this
drive, hence the name Network Drive.
The drive will not be deleted after you disconnect though, but you won’t be able to
access it until you reconnect to the network.
So if you are doing this for the content of the drive, I recommend dragging the files
and folders inside of the drive onto your computer,
because you never know if the target changes the sharing setting.

Congratulations! You’re DONE!
-Commands used in this tutorial:
PING
NBTSTAT -a (IP Address of Target)
NET VIEW (IP Address of Target)
NET USE K: (IP Address of Target)(SHARENAME)
-Program used in this tutorial:
Cain and Abel