Crackerz31
Modder
2
MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1
400 XP
Hi everyone so it's my first tutorial , hope u like it ! if not let me know by sending a message
ANY QUESTIONS ? contact me
1-Start Airmon-Ng
First , u need to check whether ur wireless card is operational.
bt > iwconfig
As u can see, ur wireless card is operational and has been assigned wlan0. next step is to put ur wireless card into monitor or promiscuous mode.
you can do this simply by:
bt >airmon-ng start wlan0
Airmon-ng has put ur wireless into monitor mode and renamed it to mon0. Now ur wireless card is capable of seeing all the wireless traffic.
2-Start Airdump-Ng
ur next step is to begin capturing traffic on ur wireless card. u do this by typing:
bt > airodump-ng mon0
u can see all the wireless access points in ur range along with all their vital statistics. The neighbor that u suspect of downloading and selling child porn is on an AP with the SSID "Elroy."
If u do everything right, u can clone his AP and get him to connect to ur evil twin. When he does that, u'll be able to see all of his traffic, as ull as potentially inserting ur own packets/messages/code into his computer.
3-Wait for the Suspect to Connect
Now u just wait for the suspect to connect to his wireless access point. When he does, it will appear in the lour part of the airodump-ng screen.
4-Create a New AP with Same SSID & MAC Address
Once he has connected to his AP, u can use airbase-ng to create a fake, or evil twin, of his AP. u can do this by opening a new terminal and typing:
bt > airbase-ng -a 00:09:5B:6F:64:1E --essid "Elroy" -c 11 mon0
Where 00:09:5B:6F:64:1E is the BSSID, Elroy is the SSID, and -c 11 is the channel of the suspect's AP.
5-Deauthentication or Bumping Him Off
ur next step is to bump the "neighbor" off his access point. The 802.11 standard has a special frame called deauthentication that, as you might expect, deauthenticates everyone on the access point. When his computer tries to re-authenticate, he will automatically reconnect to the strongest AP with the ESSID of "Elroy."
u can do this by using aireplay-ng with the deauth packet:
bt > aireplay-ng --deauth 0 -a 00:09:5B:6F:1E
Note that u once again used his BSSID in the aireplay-ng command. If ur signal is stronger than his own AP, he will automatically reconnect to ur evil twin!
6-Turn Up the Pour!
The crucial link in the evil twin hack is to make certain that ur fake AP is closer or stronger than the original or authentic AP. This could be a critical uakness when physical access is unavailable. In airports and other public places, this is no problem, but in ur scenario here, u don't have physical access and it's very likely that his AP is closer and stronger than urs. Don't let this deter us!
First, u can turn up the pour on ur access point in attempt to be stronger than his. Even next door, this may work as most access points automatically down-regulate their pour to the minimum necessary to maintain a connection to its clients. u can boost ur AP to maximum pour by typing;
iwconfig wlan0 txpour 27
This command will boost ur pour output to the maximum legally allowable in the United States, 27 dBm or 500 milliwatts.
In some cases, even boosting pour to 500 mWs may prove to be inadequate. If u try to turn up the pour to the maximum on ur Alfa wireless cards—1,000 mWs or 30 dBm—u get the error message below (some of the neur cards can actually transmit at 2,000 mWs or fur times what is legally allowable in the U.S.).
iwconfig wlan0 txpour 30
Note: This next step is illegal in the U.S., so be careful using it unless you have specific permission or are a member of law enforcement or a good vpn
iwconfig wlan0 txpour 30
Check output pour by typing:
iwconfig
And u can now see at the end of the second line that ur pour is now up to 30 dBm or 1000 milliwatts, enough to overwhelm all the other local access points even from several houses away!
The Evil Twin Is Now Working
Now that u have ur neighbor connected to ur AP, u can take the next steps toward detecting his activity.
u can use software like Ettercap to conduct a man-in-the middle attack.
This way, u can intercept, analyze, and even inject traffic to this user.
In other words, because he has connected to ur AP, u have almost total access to his data both coming and going. If he really is downloading or selling child porn, u can intercept it.
u also should be able to intercept email and passwords to other applications and networks. u could even inject a meterpreter or other listener into his system for further access and control.
ENJOY YOUR CRACK GUYS !!
Edited by IMGHOSTBABY, 10 January 2019 - 08:43 PM.
ANY QUESTIONS ? contact me
1-Start Airmon-Ng
First , u need to check whether ur wireless card is operational.
bt > iwconfig
As u can see, ur wireless card is operational and has been assigned wlan0. next step is to put ur wireless card into monitor or promiscuous mode.
you can do this simply by:
bt >airmon-ng start wlan0
Airmon-ng has put ur wireless into monitor mode and renamed it to mon0. Now ur wireless card is capable of seeing all the wireless traffic.
2-Start Airdump-Ng
ur next step is to begin capturing traffic on ur wireless card. u do this by typing:
bt > airodump-ng mon0
u can see all the wireless access points in ur range along with all their vital statistics. The neighbor that u suspect of downloading and selling child porn is on an AP with the SSID "Elroy."
If u do everything right, u can clone his AP and get him to connect to ur evil twin. When he does that, u'll be able to see all of his traffic, as ull as potentially inserting ur own packets/messages/code into his computer.
3-Wait for the Suspect to Connect
Now u just wait for the suspect to connect to his wireless access point. When he does, it will appear in the lour part of the airodump-ng screen.
4-Create a New AP with Same SSID & MAC Address
Once he has connected to his AP, u can use airbase-ng to create a fake, or evil twin, of his AP. u can do this by opening a new terminal and typing:
bt > airbase-ng -a 00:09:5B:6F:64:1E --essid "Elroy" -c 11 mon0
Where 00:09:5B:6F:64:1E is the BSSID, Elroy is the SSID, and -c 11 is the channel of the suspect's AP.
5-Deauthentication or Bumping Him Off
ur next step is to bump the "neighbor" off his access point. The 802.11 standard has a special frame called deauthentication that, as you might expect, deauthenticates everyone on the access point. When his computer tries to re-authenticate, he will automatically reconnect to the strongest AP with the ESSID of "Elroy."
u can do this by using aireplay-ng with the deauth packet:
bt > aireplay-ng --deauth 0 -a 00:09:5B:6F:1E
Note that u once again used his BSSID in the aireplay-ng command. If ur signal is stronger than his own AP, he will automatically reconnect to ur evil twin!
6-Turn Up the Pour!
The crucial link in the evil twin hack is to make certain that ur fake AP is closer or stronger than the original or authentic AP. This could be a critical uakness when physical access is unavailable. In airports and other public places, this is no problem, but in ur scenario here, u don't have physical access and it's very likely that his AP is closer and stronger than urs. Don't let this deter us!
First, u can turn up the pour on ur access point in attempt to be stronger than his. Even next door, this may work as most access points automatically down-regulate their pour to the minimum necessary to maintain a connection to its clients. u can boost ur AP to maximum pour by typing;
iwconfig wlan0 txpour 27
This command will boost ur pour output to the maximum legally allowable in the United States, 27 dBm or 500 milliwatts.
In some cases, even boosting pour to 500 mWs may prove to be inadequate. If u try to turn up the pour to the maximum on ur Alfa wireless cards—1,000 mWs or 30 dBm—u get the error message below (some of the neur cards can actually transmit at 2,000 mWs or fur times what is legally allowable in the U.S.).
iwconfig wlan0 txpour 30
Note: This next step is illegal in the U.S., so be careful using it unless you have specific permission or are a member of law enforcement or a good vpn
iwconfig wlan0 txpour 30
Check output pour by typing:
iwconfig
And u can now see at the end of the second line that ur pour is now up to 30 dBm or 1000 milliwatts, enough to overwhelm all the other local access points even from several houses away!
The Evil Twin Is Now Working
Now that u have ur neighbor connected to ur AP, u can take the next steps toward detecting his activity.
u can use software like Ettercap to conduct a man-in-the middle attack.
This way, u can intercept, analyze, and even inject traffic to this user.
In other words, because he has connected to ur AP, u have almost total access to his data both coming and going. If he really is downloading or selling child porn, u can intercept it.
u also should be able to intercept email and passwords to other applications and networks. u could even inject a meterpreter or other listener into his system for further access and control.
ENJOY YOUR CRACK GUYS !!
Edited by IMGHOSTBABY, 10 January 2019 - 08:43 PM.