Kali Linux Theharvester an Email harvester [Tutorial 2018]

TheHarvester .py

Description: theHarvester is a tool for gathering e-mail accounts, subdomain names, virtual hosts, open ports/ banners, and employee names from different public sources (search engines, pgp key servers).

It is a really simple tool, but very effective for the early stages of a penetration test or just to know the visibility of your company in the Internet.

 Passive Information Gathring

  • google: google search engine- www.google.com·
  • googleCSE: google custom search engine·
  • google-profiles: google search engine, specific search for Google profiles·
  • bing: microsoft search engine  – www.bing.com·
  • bingapi: microsoft search engine, through the API (you need to add your Key in the discovery/bingsearch.py file)·
  • pgp: pgp key server – pgp.rediris.es·
  • linkedin: google search engine, specific search for Linkedin users·
  • vhost: Bing virtual hosts search·
  • twitter: twitter accounts related to an specific domain (uses google search)·
  • googleplus: users that works in target company (uses google search)·
  • shodan: Shodan Computer search engine, will search for ports and banner of the discovered hosts  (http://www.shodanhq.com/)

Active Information Gathering

  • DNS brute force: this plugin will run a dictionary brute force enumeration
  • DNS reverse lookup: reverse lookup of ip´s discovered in order to find hostnames
  • DNS TDL expansion: TLD dictionary brute force enumeration

Getting Started with Theharvester

In Kali Linux theharvester tool is inbuilt and can be run a simple command in terminal

#theharvester

theharvester run in kali

Theharvester Usage Options

Lot of tools are included in to theharvester package and can be used to by using switch like -d switch is used to define domain names and -l is used to limit number of the result. In the following image you can see all available switch.

theharvester example

Theharvester Usage Example

Search from email addresses from a domain (-d example.com), limiting the results to 500 (-l 500), using Google (-b google):

#theharvester -d example.com -l 500 -b google

result harvester

 

source : theharvester

MODULE 4:- Information Gathering

  1. How to use dnsenum for dns enumeration – Kali
  2. How to use dig command in Kali Linux
  3. whois Kali Linux commands with example
  4. Enumerating DNS Records through dnsenum tool in Kali Linux
  5. Email Harvesting by theharvester tool in Kali Linux
  6. Google Hacking | Open Web Information Gathering
  7. dnsmap | DNS Domain name system brute force attacks
  8. Zone Transfer using dnswalk tool
  9. Website information Gathering through Nikto tool
  10. Search Senstive Data through Metagoofil Kali Linux 2.0
  11. 8 Steps to run Maltego Kali Linux – beginner guide

Open post
Best-Computer-Courses-After-12th

Best Computer Courses After 12th you should know

The biggest challenge for the students “choose best computer courses after 12th”, because computer industry is vast. So They are worried and confused about career after completing 12th.

If you are going to join the computer course you should ask the following questions for yourself. After getting the right answer you can decide about the computer course and you can take right decision about career. Today’s right decision will define your future. Right decision will give you good future and wrong decision will give you pain for full life. So all the questions are flowing:

  1. Why should you join computer courses after 12th
  2. What are the best computer courses after 12th
  3. How do I choose computer courses for me.
  4. what are the career of possibilities after completing computer course.
  5. Why students are confused about career in IT sector?

Why students are confused about career in IT sector?

confused-about-computer-courses

As you know computer sector is very vast and it has lot of the division, subdivision and branches the examples are digital marketing, ethical hacking, graphic designing, animation, programming etc. students don’t know what is right course for them. Not only this They are getting career counseling from the nearby people, even it doesn’t matter those person are related this field or not. if they do not belong with the IT sector then how they can help you in choosing right course. Yes of course they can’t.

Counseling himself: When they see someone who have completed xyz computer course and have good salary right now, Thus students select xyz course for themselves. But this selection is not proved good in their life. First student should know about course, its features, career growth related course etc.

Why should you join computer Courses after 12th?

Very important question related your career “why should you join computer courses after 12th?’. IT industry has extremely growth in India, It is worth $117 billion in 2017. So you have chances to grow your career in IT industry. After completing a computer course you will grab those opportunity.

IT industry growth in India

Total 123,601 IT jobs were posted on Naukri.com in November 2017.  20,486 jobs were highly paying jobs (15-25 Lakhs/annum). Common paying scale 3-10 lakhs/annum. So Computer course is best option for you after completing 12th/BA/B.Sc./B.Tech./other.

it jobs in 2017

What are best computer courses after 12th?

  1. Website Designing – HTML5 and CSS3
  2. Website DevelopmentPHP and MYSQL, .net, java scripting etc.
  3. Graphic Designing – Photoshop, corel draw etc
  4. Digital marketing – SEO, SEM, SMM Google Analytic etc.
  5. Ethical Hacking – Cyber Security, Penetration Testing, Network Security Web security etc.
  6. Windows System and Server Administration
  7. Linux System Administration
  8. Linux Server Administration
  9. Networking Administration – CCNA
  10. Database Administration – SQL, MYSQL, Oracle, Big Data Hadoop
  11. App development –

How do I choose best computer course for me?

As you know, many computer courses are available in the marketing for example: Administration, Programming, Website designing and development, android app development, Networking, digital marketing, ethical hacking etc. Finding best computer course is not easy. I suggest choose course as per your interest requirement.
I am posting here job data related different jobs and salary in November 2017 according naukri.com.

 

IT-jobs-in-November-2017

 

 

Open post
Best keylogger Windows 10 pc

Best keylogger Windows 10 pc – Full tutorial

MODULE 8:- System Hacking

  1. How to get administrator privileges on windows 10
  2. Best keylogger Windows 10 pc – Full tutorial
  3. Keystroke logging with keystroke recorder and its types
  4. Top 10 Tools Used For Maintaining Access of Exploited System

Record keystrokes in Window 10

Want to record keystrokes are pressed by other person (USER)  in the absence of you. Or you are Manager and wanna to see activity done by employee in your company, or Want to watch over your Girl friend/boy friend’s activity on his computer. So just go my first post Keystroke logging with keystroke recorder and its types and then continue with this article.

Best Keylogger Windows 10

The recent release of Elite is a best Keylogger windows 10 and MAC. It is latest version available for download it official website http://www.elite-keylogger.net/ This version comes with following features.

  • Capture username and passwords
  • Capture screenshots
  • Protect your loved (kids) from online
  • Read instant and messages and emails
  • Track applications and printouts
  • Record all visited website
  • 100% invisible keylogger
  • Multiple report delivery methods

Download Elite Keylogger for windows 10:

Download and install  keylogger from official website http://www.elite-keylogger.net/ available for Windows and MAC OS X.

download elite keylogger

Install and use Elite Keylogger

To start installation wizard click on downloaded .exe file and check on I accept the terms of license and click Next:

installing elite keylogger

This program will be 100% invisible so you need to check show instruction on hide the program

installing elite keylogger 1

In next step create system restore point to protect any crash in future.

installing elite keylogger2

I never want to uninstall automatic select never and start install by clicking on install.

installing elite keylogger3

It will work like a virus so make whitelist for you antivirus.

installing elite keylogger 4

Unhiding Elite Keylogger windows 10 PC

To unhide Elite Keylogger, please follow these simple steps:

  1. Press WIN+R, or launch Run dialog going to Start menu -> Run
  2. Type“unhide” (this is th default unhide keyword, you should change it in Main Options
  3. Do not press Enter, or click OK! Elite Keylogger tracks the sequence and will be unhidden automatically if the keyword is only typed.
  4. Type in your unhide password (if it is the first time you launch it, it will ask you to set the unhide password, type it in and go to Step 1)
  5. If the unhide password is correct, you will be granted the access to Elite Keylogger.

unhide elite keyloger

GENERATING LOGS

After you unhide Elite Keylogger, you need to generate logs for the date you are interested in to view them. Generating logs is really simple:

  1. Go to View logs in right sidebar
  2. Select the date you would like to view the logs for in the calendar.
  3. Press the “View logs for DD mmm” button to start logs generation.

VIEWING KEYSTROKES LOG
view keystroke log
As soon as you click on the view logs the keystrokes will display by default, or To view all recorded keystrokes, please, select Keystrokes log.

This will immediately bring you to the Keystrokes log which will be shown to the left. Keystrokes in the log are combined into series according to application and time they were recorded. This log also stores information about user and window caption where the keyboard activity took place. All records are timestamped for your convenience.
VIEWING SCREENSHOTS LOG

screenshots

Second option at right sidebar is Screenshots, This will immediately bring you to the Screenshots log which will be shown to the left. Screenshots are captured according to the interval you specified in Main configuration. Log contains thumbnails to preview each screenshot, they are sorted by date in ascending order. Clicking on a preview zooms the recorded screenshot and shows it in actual size.

VIEWING WEB-ACTIVITY LOG

internet activity

This will immediately bring you to the Internet Activity log which will be shown to the left

VIEWING APPLICATIONS LOG

To view recorded applications history, please, select Applications history log, This will immediately bring you to the Applications log which will be shown to the left. Applications log contains detailed information on every application and process ever launched during the specified day.

VIEWING CLIPBOARD LOG

To view all captured Clipboard activity, please, select Clipboard log, This will immediately bring you to the Clipboard log which will be shown to the left. Elite Keylogger comes with clipboard capturing feature. Oftentimes, passwords, access codes or URLs may be too long or too difficult to type in and users prefer copying and pasting.

 

Source: http://compnetworking.about.com/od/networksecurityprivacy/g/keylogger.htm

http://en.wikipedia.org/wiki/Keystroke_logging

http://www.widestep.com/files/elite_keylogger.html

Open post

Keystroke logging with keystroke recorder and its types

MODULE 8:- System Hacking

  1. How to get administrator privileges on windows 10
  2. Best keylogger Windows 10 pc – Full tutorial
  3. Keystroke logging with keystroke recorder and its types
  4. Top 10 Tools Used For Maintaining Access of Exploited System

Keystroke logging with keystroke recorder software

Keystroke logging is a process to record keys pressed by Keyboard, and you can do this by hardware and software. keystroke recorder software records keyboards activity and store into a log file. In Company, managers use this software to track employees’s activity similar Parents use this software to secure their children from internet spam. In other hand Hacker used remote keylogger   to capture username and password, Credit card information.

Key logger:

keylogger is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press.Keystroke logging with elite keylogger

Keyloggers are used in IT organizations to troubleshoot technical problems with computers and business networks. Keyloggers can also be used by a family (or business) to monitor the network usage of people without their direct knowledge. Finally, malicious individuals may use keyloggers on public computers to steal username and passwords or credit card information.

Most keyloggers allow not only keyboard keystrokes to be captured but also are often capable of collecting screen captures from the computer. Normal keylogging programs store their data on the local hard drive, but some are programmed to automatically transmit data over the network to a remote computer or Webserver.

Keyloggers are sometimes part of malware packages downloaded onto computers without the owners’ knowledge.

Keylogger Types:

There are two types of keylogger are here hardware device keylogger or Software keylogger.

keylogger software and keylogger hardware

Software Keylogger:

These are computer programs designed to work on the target computer’s software. Working as keyloger from a technical perspective there are several categories:

  • Hypervisor-based: The keylogger can theoretically reside in a malware hypervisor running underneath the operating system, which remains untouched. It effectively becomes aVirtual-machine.
  • Kernel-based: A program on the machine obtainsroot access to hide itself in the OS and starts intercepting keystrokes that pass through the kernel. Such keyloggers reside at the kernel level and are thus difficult to detect, especially for user-mode applications who don’t have root access. They are frequently implemented as rootkits.
  • API-based: These keyloggershook keyboard APIs inside a running application. The keylogger registers for keystroke events, as if it was a normal piece of the application instead of malware. The keylogger receives an event each time the user presses or releases a key. The keylogger simply records it.
  • Form grabbing based:Form grabbing -based keyloggers log web form submissions by recording the web browsing on submit events. These happen when the user finishes filling in a form and submits it usually by clicking a button or hitting enter. This records form data before it is passed over the Internet.
  • Packet Analyzer: This involves capturing network traffic associated withHTTP Post events to retrieve unencrypted passwords. This is made more difficult when connecting via HTTPS.
  • Remote access software keyloggers

These are local software keyloggers with an added feature that allows access to the locally recorded data from a remote location. Remote communication may be achieved using one of these methods:

  • Data is uploaded to a website, database or anFTP
  • Data is periodically emailed to a pre-definedemail address.
  • Data iswirelessly transmitted by means of an attached hardware system.
  • The software enables a remote login to the local machine from the Internet or the local network, for data logs stored on the target machine to be accessed.

Hardware Keylogger:

Hardware-based keyloggers do not depend upon any software being installed as they exist at a hardware level in a computer system.
keyboard logger Hardware

  • Firmware-based:BIOS -level firmware that handles keyboard events can be modified to record these events as they are processed. Physical and/or root-level access is required to the machine, and the software loaded into the BIOS needs to be created for the specific hardware that it will be running on.
  • Keyboard hardware: Hardware keyloggers are used for keystroke logging by means of a hardware circuit that is attached somewhere in between thecomputer Keyboard and the computer, typically inline with the keyboard’s cable connector. There are also USB connectors based Hardware keyloggers as well as ones for Laptop.
  • Wireless keyboard sniffers: These passive sniffers collect packets of data being transferred from a wireless keyboard and its receiver.
  • Keyboard overlays: Criminals have been known to use keyboard overlays onATMs to capture people’s PINs. Each keypress is registered by the keyboard of the ATM as well as the criminal’s keypad that is placed over it. The device is designed to look like an integrated part of the machine so that bank customers are unaware of its presence.
  • Acoustic keyloggers:Acoustic cryptanalysis can be used to monitor the sound created by someone typing on a computer. Each key on the keyboard makes a subtly different acoustic signature when struck. It is then possible to identify which keystroke signature relates to which keyboard character via statically method such as frequency analysis.
  • Optical surveillance: A strategically placed camera, such as a hidden surveillance Camera at an ATM can allow a criminal to watch a PIN or password being entered.
  • Smartphone sensors: Researchers have demonstrated that it is possible to capture the keystrokes of nearby computer keyboards using only the commodityaccelerometer found in smartphones. The attack is made possible by placing a smartphone nearby a keyboard on the same desk. The smartphone’s accelerometer can then detect the vibrations created by typing on the keyboard, and then translate this raw accelerometer signal into readable sentences with as much as 80 percent accuracy.
Open post
ntfs alternate data streams

NTFS Alternate Data Streams For Beginner

MODULE 9:- Data Protection 

  1. How to encrypt files and folders by EFS Windows 10
  2. How to Enable bitlocker windows 10 encryption – Full Guide
  3. How to use VeraCrypt portable, Truecrypt replacement in windows 10
  4. Data, file, full disk and Hard drive encryption software Veracrypt
  5. NTFS Alternate Data Streams For Beginner
  6. Top 10 steganography tools for Windows 10

NTFS Alternate Data Streams in Window

NTFS Alternate Data Streams in Window is a method where you can hide one file data into another file data. this is alternate data streams available only on NTFS file system of window

 Scenario:  If you created a text file with name firstfile.txt in notepad and write some matter inside the file. You can see what is written inside the file anytime. Now you create another file name secondfile.txt and you make some entry in this file. Is it possible to hide second file matter into firstfile. And if someone open first file, should be unable to see hidden data into first file only first data should be visible. Answer is yes and it is happened with NTFS stream. And you can see hidden matter when you want.

Create NTFS Alternate Data Streams

The NTFS file system provides applications the ability to create alternate data streams of information. By default, all data is stored in a file’s main unnamed data stream, but by using the syntax ‘file:stream’, you are able to read and write to alternates. Not all applications are written to access alternate streams, but you can demonstrate streams very simply. First, change to a directory on a NTFS drive from within a command prompt.

Next, Open terminal and type following command

echo “This is data of first file > firstfile.txt

you have just created a file named firstfile.txt.

Next, run following command to write strem.

echo “This is second data stream” > firstfile:scondfile

alternate data streams

You’ve just created a stream named ‘secondfile’ that is associated with the file ‘firstfile’. Note that when you look at the first file you will find only enter text when opened in any text editor. To see your hidden stream run following command.

more < firstfile:secondfile

retreieving data from hidden file

Delete NTFS Alternate Data Streams from the file

NT does not come with any tools that let you see which NTFS files have streams associated with them,  and cant be deleted this stream. So you have need some extra software to download software https://technet.microsoft.com/en-us/sysinternals/bb897440.aspx

Download software and extract zip file you will get a excitable file with stream.exe name run the following command to see hidden stream and delete stream
remove alternate data streams

More detail: http://blogs.technet.com/b/askcore/archive/2013/03/24/alternate-data-streams-in-ntfs.aspx

Open post
Unshadow the file and dump Linux password

How to Unshadow the file and dump Linux password

Hello friends, welcome again!

In the last post I told about Understanding Linux system security for Users After reading this post you have knowledge about Linux file system, and where username and password are stored in Linux? where you can dump this password? when you dump password, it will be in plain text or encrypted format? so for finding the password, walkthrough this post Unshadow the file and dump Linux password

Unshadow the file and dump password in encrypted format

In this tutorial I am going to show you demo on Ubuntu 14.04 machine to unshadow the files and dump the linux hashes with help of unshadow command. First, boot Ubuntu 14.04 machine with Kali Linux. Next, It is necessary to mount the Linux filesystem for dumping data from /etc/shadow and /etc/passwd files. After boot machine with Kali Linux OS Here is great automatic mounting utility in kali linux, you don’t need to mount manually anymore. You just click on linux filesystem under place menu Linux partition will be mounted automatic. Go into Place>filesystem

Linux system will be automatic mount on /media directory with a specific mounting value. Next, If you want to see mounting point value write the following commad

#ls /media

Go into Ubuntu file system by excuting following command

#cd /media/mounting value/

#cd etc

Copy both file shadow and passwd on Desktop

#cp shadow /root/Desktop

#cp passwd /root/Desktop

Unshadow Utility:

The unshadow tool combines the passwd and shadow files into one file So john can use this file to crack the password hashes.

Use unshadow utility in kali linux to unshadow the password hashes, and dump into new file named unshadow. It is not necessary you can put any name whatever you want but important is to merge both file passwd and shadow into unshadow file

#cd /root/Desktop

#ls

#unshadow passwd shadow > unshadow

#ls

Next step is cracking the password hashes with help of john the ripper

#john unshadow

John will detect automatic hashes type if you don’t provide formate type.

Dump Linux hashes and crack with John in Kali Linux Offline mode Video Tutorial

https://www.youtube.com/watch?v=_SvH36bLtFQ

Open post
Understanding Linux system security

Understanding Linux system security for Users

Know about Linux system security

One of the most important Linux system security feature are passwords today. Most of server administrator and users use password to secure their system to get access by others. In Linux (RHEL/DEBIAN) these passwords are saved in passwd and shadow files in /etc directory. In deep description about passwd and shadow both file’s data encrypted.

Most distro uses one way encryption called DES (Data Encryption Standard) to encrypt passwords saved into /etc/passwd and /etc/shadow files. When you attempt the login the username and password, the password encrypted again and compare with saved password, if match found then you are allowed to access otherwise decline by the system.

Understanding /etc/passwd File:

This file contain the required information which used at time of user login. This is text file contains a list of user accounts for System. This contain the following entry in each line each field is separated by : so you can understand easily.

  1. Username : it is used when user logs in.
  1. Password: An x character indicates that password is encrypted and stored in /etc/shadow file.
  2. User ID (UID): Each user must be assigned a unique user ID (UID). UID 0 (zero) is reserved for root.
  3. Group ID (GID): The primary group ID (stored in /etc/group file)
  4. User ID Info: This field allow you to add extra information about the users such as user’s full name, phone number etc.
  5. Home directory: This is path of user’s home directory
  6. Command/shell: this is  path of a command or shell (/bin/bash)

passwd file

Understanding etc/shadow File:

This file stores passwords in encrypted format for user’s account. And also contain additional properties related passwords. It contains the following field and every field is sperated with a colon (:) character.

  1. User name : It is users login name
  2. Password: It is users encrypted password.
  3. Last password change: This contained the information when last password changed.
  4. Minimum: The minimum number of days required between password changes.
  5. Maximum: The password validity for maximum numbers of Days.
  6. Warn : The number of days before password is to expire that user is warned that his/her password must be changed
  7. Inactive : The number of days after password expires that account is disabled
  8. Expire : days since, that account is disabled

shadow file

 

Open post
Administrator password hashes from SAM database

Find Window password hashes from SAM database

What is Password Hashes and SAM Database?

SAM is stand for Security Account Manager. SAM database is a part of  windows Operating system consist user name and password in encrypted format called password hashes. SAM file is exist under C:/Windows/System32/config in Window 7/8/8.1/10. If User want to logon on the machine, user name and password should be match for authentication entered by user. If user put wrong username and password, authentication being failed. The encryption algorithm is NTLM2 used. The main purpose of SAM to save the computer and data by unauthorized person like hacker’s. But it is not completely work against a professional hacker. Here I am going to show you how hacker dump these encrypted password hashes from database and find out the password by cracking these hashes.

Boot Window machine with Kali Linux?

As I know you are learner here, so you have two option to make exercise on this topic. First create and install window (xp/7/8/8.1/10) machine on Virtual box, it is pretty easy and no harm for base computer. Another method is Do practice on base machine installed window OS already, in this condition you have to boot window machine by Kali Linux live Persistent DVD/Flash Drive.

When penetester boots Window machine with Kali Linux live then can use window file system without any interruption, As described above SAM are saved in the location C:/Windows/system32/config.  So we have main task to go to this location and find out the SAM database. After booting system with Kali Linux you should follow the given instruction to find out the password.

Step1: First step mount the window system partition

click on Place> Filesystem.

Mount window partitoin on Kali Linux

When you clicked on file system window partition will be mounted automatically on /media directory. Open the terminal and type following command to reach in location where SAM database saved.

#cd /media/Mounting Point value/Windows/System32/config

In above mounting value will be changed according the system you can see this value by executing following command

#ls /media

Step2: Relieve bootkey.

#bkhive SYSTEM /root/Desktop/system.txt
bkhive and bootkey

System.txt is a file where bootkey is stored and /root/Desktop is location to save system.txt file.

Step 3: Dump the password hashes

Password hashes is retrieved with combination of bootkey and SAM database, This process is completed with the help of samdump2 utility found in kali linux by default. Command is giving following

#samdump2 SAM /root/Desktop/system.txt > /root/Desktop/hashes.txt
samdump2 to get administrator password hashes

In implemented command SAM database and system.txt filed has been merged and created new file name hashes.txt. To see the password hashes dumped into hashes.txt file use given command

#cat /root/Desktop/hashes.txt

Change directory to /root/Desktop by using following command

#cd /root/Desktop

Step 4: John the Ripper a password cracking tool

After reaching the directory to crack hashes use excute john by given command

#john –formate=nt2 –users=vijay hashes.txt

john and ripper example to crack the password hashes

Open post

Dictionary attack tool thc-hydra tutorial for beginner

A very fast network login cracker with dictionary attack tool which support many different services.

Dictionary attack tool thc-hydra Description:

According to official website of thc-hydra, One of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system and different online services.

Note: THIS TOOL IS FOR LEGAL PURPOSES ONLY!

There are already several login hacker tools available, however none does Either support more than one protocol to attack or support panellized Connects.

Protocols supported by thc-hydra

Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP,  HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-PROXY, HTTPS-FORM-GET,  HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP,  MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, Oracle SID, Oracle, PC-Anywhere,  PCNFS, POP3, POSTGRES, RDP, Rexec, Rlogin, Rsh, SAP/R3, SIP, SMB, SMTP,  SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion,  Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP.

How to use hydra in Kali Linux

Thc-hydra is available in kali linux already you don’t need to install or configure it. In Kali Linux hydra available in two mode Graphical and Command line.

Graphical Interface of Hydra in Kali Linux:

Graphical interface is easy to use so let’s look on graphical interface of hydra:

  1. Open hydra-gtk Go Application > Password attacks>Online Attacks > Hydra-Gtk
    Open hydra-gtk
  2. Configure Hydra for Attack
  3. Target: there are following option are available:
    1. Single Target: Give the IP address of Single target
    2. Target List: you can upload file consist targets list.
    3. Define Port: specify port
    4. Protocol: Select protocol for attack
      configure target tab
  4. Passwords: In this tab you set the username and password and more…
    1. Username: Give the username if you know
    2. Username list: if you don’t know the username provide file location consist multiple usernames
    3. Password: This option for single password
    4. Password List: Here you provide the wordlist location
    5. Check on try login as password
    6. Check on Try empty password
    7. Check on Try reversed login
      configure passwords tab
  5. Tuning: Following options for this tab:
    1. Number Task: Repeat task
    2. Time out: configure timeout on not response
    3. Proxy: Set proxy if you are using. Or leave by default No proxy
  6. Specific: Leave default
  7. Start: Here you can start stop attack and save result
    start and result tab

Command line Interface of Hydra in Kali Linux:

As in Linux command line have their own importance and value and most of tools are available with command line interface for linux, Hydra is one of them. to know more about the hydra just execute following command

#Hydra –h

This command will show all options used with hydra command.

hydra -h

 

You have many options on how to attack with logins and passwords

With -l for login and -p for password you tell hydra that this is the only

login and/or password to try.

With -L for logins and -P for passwords you supply text files with entries.

e.g.:

hydra -l admin -p password ftp://localhost/

hydra -L default_logins.txt -p test ftp://localhost/

hydra -l admin -P common_passwords.txt ftp://localhost/

hydra -L logins.txt -P passwords.txt ftp://localhost/

Additionally, you can try passwords based on the login via the “-e” option.

The “-e” option has three parameters:

s – try the login as password

n – try an empty password

r – reverse the login and try it as password

If you want to, e.g. try “try login as password and “empty password”, you

specify “-e sn” on the command line

 

 

Source: https://www.thc.org

https://github.com/vanhauser-thc/thc-hydra

Open post
Generate Rainbow Tables and Crack Hashes in Kali Linux

Generate Rainbow Tables and Crack Hashes in Kali Linux

Generate Rainbow Tables and Crack Hashes with rcracki_mt

Rcracki_mt is a tool used to crack hashes and found in kali linux by default.  It is used rainbow tables to crack the password. Some other tools generate rainbow tables. You can download Rainbow table https://www.freerainbowtables.com/tables2/ if you don’t want to download rainbow table you can create you own by Using winrtgen in window and rtgen in Kali Linux

Generate Rainbow Tables in Kali Linux

You have entred in next step. here you can learn to generate rainbow tables by using some tools, There are some tools working for rainbow table are found in kali linux, location is /usr/share/rainbowcrack if you want to generate rainbow table

  1. Opne Terminal
  2. #cd /usr/share/rainbowcrack
    here you will see some tools. Use rtgen to create rainbow table.
  3. #rtgen hash_algorithm charset plaintext_length_min plaintext_length_max table_index chain_len chain_num part_index
    Example #rtgen md5 loweralpha-numeric 6 8 0 3800 33445532 0
  4. Your rainbowtable will be saved in the current location (/usr/share/rainbowcrack)

Generate Rainbow Tables

Crack Hashes with rcracki_mt in Kali Linux

Then issue the command rcracki_mt -h [hash] -t [num threads] [directory of rainbow tables]
For this example, [hash] is the cryptographic hash you wish to reverse. [num threads] is how many threads you wish to dedicate to the task. You should usually use an amount equal to the amount of processor cores available on your computer. The last parameter is the directory where the rainbow tables are located.

crack hashes

RCRACKI_MT in depth

The RCRACKI_MT process can be divided into 3 distinct phases.

  1. The pre-calculation phase
  2. The search phase
  3. The false alarm checking phase

RCRACKI_MT in depth

 

Posts navigation

1 2 3 4
Scroll to top