Sunday, August 11, 2013
Weakness on WEP,WPA and WPA2 PSK
@ Weakness on WEP (Wired Equivalent Privacy)
>> Problem of weak keys, RC4 algorithm used can be solved.
>> WEP uses static keys
>> Problem initialization vector (IV) WEP
>> Message integrity issues Cyclic Redundancy Check (CRC32)
WEP consists of two levels, namely 64-bit key, and 128 bits. Actually, the secret key in the WEP key 64 bit only 40 bit, 24bit is Initialization Vector (IV). Similarly, the 128-bit WEP key, secret key consists of 104bit.
Attacks on WEP weaknesses include:
Attacks on the weaknesses of the initialization vector (IV), often called the FMS attack. FMS stands for the names of the inventors of the IV weakness Fluhrer, Mantin, and Shamir. This attack was carried out by collecting a weak IV sebayak possible. The more IV
weak obtained, quickly found the key that is used
Get a unique IV data obtained through packet to be processed by cracking the WEP key process faster. This method is called chopping attack, first discovered by h1kari. This technique only requires a unique IV thus reducing the need for IV weak in WEP cracking.
Both attack and take over the packet, to shorten the time, the hackers usually do traffic injection. Traffic Injection is often done with the way the ARP packet and send it back to the access point. This resulted in the collection of initial vectors is easier and faster. Unlike the first and second, for traffic injection attacks, required specification of tools and applications that start rarely found in stores, ranging from chipsets, firmware version, and the version
driver, and not infrequently have to do patching of drivers and applications.
@ Weakness on WPA (Work Projects Administration) or WPA2/WPA2 PSK
The only drawback WPA2 psk and wpa is when a client connects to the AP where the handshake process, we can do the Force Gross will try one by one with a password that is obtained from the handshake. Doing Gross Force is done by using dictionary file, which means we should have a file that contains passpharase will try one by one with a handshake packet to find the keys that are used or can be called with a wordlist.
Saturday, August 10, 2013
vietnam government website vspa has been hacked
Hacked by Dr.SHA6H so when you visit the government website at www.vspa.gov.vn vietnam until the news was made on the date 07-08-2013 at approximately 11:30 pm, the state of the website is still under the control of a hacker who calls himself this Dr.SHA6H.
index on the website is hacked, the hacker put a video file of a child who was severely injured and is being treated, very touching at all when I saw the video, and try to imagine if it happened to you, what do you feel? hopefully not.
who knows what the motive that drives hackers, but you can see for yourself on www.vspa.gov.vn address if still not fixed.
Below are the results of a successful screen shoot localtechno get when trying to access the website :
www.vspa.gov.vn
index on the website is hacked, the hacker put a video file of a child who was severely injured and is being treated, very touching at all when I saw the video, and try to imagine if it happened to you, what do you feel? hopefully not.
who knows what the motive that drives hackers, but you can see for yourself on www.vspa.gov.vn address if still not fixed.
Below are the results of a successful screen shoot localtechno get when trying to access the website :
www.vspa.gov.vn
or this mirror : www.zone-h.org/mirror/id/20434133
we can take a lesson from the events that have happened and are trying to improve a website's security system, especially on the government website.
Friday, August 9, 2013
Chinese government website zfxxgk has been hacked
Hacked by SultanHaikal so when you go to a Chinese government website at http://xw.zfxxgk.gov.cn/sunnah.htm until the news was made on the date 07-08-2013 at approximately 07:30 pm, a state website is still under the control of a hacker on the website address tab.
lucky not index on the website is hacked, the hacker can just put the file on the tab sunnah.htm that in her own, yet still very dangerous if the conditions hacked by hackers, because a hacker could be in and out as they pleased with the website they, like their own.
who knows what the motive that drives hackers, but you can see for yourself at the address http://xw.zfxxgk.gov.cn/sunnah.htm if still not fixed.
below are the results of a successful screen shoot localtechno get when trying to access the website :
http://xw.zfxxgk.gov.cn/sunnah.htm
with this incident we can take a lesson and try to improve the security system on a website, primarily on government websites.
lucky not index on the website is hacked, the hacker can just put the file on the tab sunnah.htm that in her own, yet still very dangerous if the conditions hacked by hackers, because a hacker could be in and out as they pleased with the website they, like their own.
who knows what the motive that drives hackers, but you can see for yourself at the address http://xw.zfxxgk.gov.cn/sunnah.htm if still not fixed.
below are the results of a successful screen shoot localtechno get when trying to access the website :
http://xw.zfxxgk.gov.cn/sunnah.htm
Ahlussunnah Was Here!
Anti Shia , Anti Zionist (Jewish)
./SultanHaikal
#Free Syria ! #antigovernment #FvckShia
with this incident we can take a lesson and try to improve the security system on a website, primarily on government websites.
Wednesday, August 7, 2013
Turkish government website duzceelsanatlari has been hacked
Hacker back in action again, this time in the Turkish government website defacement is, at the address http://www.duzceelsanatlari.gov.tr/ until the news was made on 06-08-2013 at approximately 15:00 pm a state website is still in control by a hacker who calls himself CrAzY_Dz
Indeed, a hacker never cease to look for a weakness in the security system websites, especially important government website, a hacker can easily retrieve data and manipulate the data in accordance with what they want, whether it be personal or group interests and maybe just a hobby, to seek weaknesses security systems.
is very important to pay attention to the security system in a website, because with diretasnya security systems, hackers can go out with as he pleased on our server computers, such as their own.
Below are the results localtechno sreen shoot when visiting the website :
hopefully it will fast for diperbaikai back and try to improve the security system on the website, because we can take a lesson in this incident, and trying to be better.
Indeed, a hacker never cease to look for a weakness in the security system websites, especially important government website, a hacker can easily retrieve data and manipulate the data in accordance with what they want, whether it be personal or group interests and maybe just a hobby, to seek weaknesses security systems.
is very important to pay attention to the security system in a website, because with diretasnya security systems, hackers can go out with as he pleased on our server computers, such as their own.
Below are the results localtechno sreen shoot when visiting the website :
[ ! ] HaCkEd By CrAzY_Dz [ ! ]
Security => 0%
hopefully it will fast for diperbaikai back and try to improve the security system on the website, because we can take a lesson in this incident, and trying to be better.
Tuesday, August 6, 2013
Philippines government website bukidnon has been hacked
Philippines government website which is located at [http://www.bukidnon.gov.ph/x.htm] has compromised its security system by hackers and until this news was published, at approximately 15:00 pm 06-08-2013 the website is still under the control of a hacker.
This course is very vulnerable, because a website is very crucial especially a government website, which is where a hacker can get out into the computer our server, security by hacking on a website.
Below are the results of our successful screen shoot took while trying to visit the website :
http://www.bukidnon.gov.ph/x.htm
# The following is a message on the website :
This course is very vulnerable, because a website is very crucial especially a government website, which is where a hacker can get out into the computer our server, security by hacking on a website.
Below are the results of our successful screen shoot took while trying to visit the website :
http://www.bukidnon.gov.ph/x.htm
# The following is a message on the website :
[#] Your System Owned by TheHackersArmy (THA) by Shadow_Haxor!
[#] Philippine h4x0r was here ^ _ ^
[#] Where is the security?
[#] Do not worry i just test your security! : P
[#] Greets: Rude THA - THA Disaster - THA X HaxOr - Cronos Ip THA - THA Shadow_Haxor - THA Rox Root - Kjubi THA - THA Ex Leet - Dark THA - THA Optimizer - THA Rooter
Madleets - And specially to my Computer <3
This may be a lesson to us all, in order to improve the security system on a website, especially the government websites.
Monday, August 5, 2013
kristinasalin website has been hacked by Maniak k4sur
Indonesian hacker back in action by looking for weaknesses in the security of a website. This time kristinasalin website hacked by [Maniak k4Sur] on 05-08-2013 at approximately 14:04:03 until this news was published, the website is still under the control of a hacker [Maniak k4Sur]
if you look at the address http://kristinasalin.com you will see an image that are added by the hacker, when I tried to get in on the gallery tab or the other, turned the page on the point on the page that has been added by the hacker [Maniak k4Sur] this.
The following is a screen shoot that I managed to take when visiting the website :
http://kristinasalin.com
but with this event we can take a lesson and try to improve the security system on a website.
if you look at the address http://kristinasalin.com you will see an image that are added by the hacker, when I tried to get in on the gallery tab or the other, turned the page on the point on the page that has been added by the hacker [Maniak k4Sur] this.
The following is a screen shoot that I managed to take when visiting the website :
http://kristinasalin.com
! Maniak K4Sur w4s here !
or you can look in mirror http://www.zone-h.org/mirror/id/20429859no message
whether the motive is what drives hackers to deface the website kristinasalin.
but with this event we can take a lesson and try to improve the security system on a website.
How to use commview and aircrack-ng in Windows 8 64bit or 32bit
Back again with localtechno
Okey buddy localtechno this time I will give you a little tutorial about, How to use commview and aircrack-ng in Windows 8 64bit or 32bit for Cracking Password Wifi [I hope you use this tutorial wisely and in a state of urgency or at the time of need]
Okay we headed straight to the scene:
First download and install CommView for wifi, which can be downloaded at : here
and install aircrack-ng for windows 8 if you do not already installed on your computer aircrack-ng you can read How to install Aircrack-ng in Windows 8 64bit or 32 bit
after all you done a good installed CommView for wifi and aircrack-ng it is time for action :
run CommView for wifi and clik capture, you can look this picture bellow :
Okey buddy localtechno this time I will give you a little tutorial about, How to use commview and aircrack-ng in Windows 8 64bit or 32bit for Cracking Password Wifi [I hope you use this tutorial wisely and in a state of urgency or at the time of need]
Okay we headed straight to the scene:
First download and install CommView for wifi, which can be downloaded at : here
and install aircrack-ng for windows 8 if you do not already installed on your computer aircrack-ng you can read How to install Aircrack-ng in Windows 8 64bit or 32 bit
after all you done a good installed CommView for wifi and aircrack-ng it is time for action :
run CommView for wifi and clik capture, you can look this picture bellow :
# and click start capture and then click capture :
# wait until get the +- 50.000 packet
# after finish, in the tab program commview you can look logging and save the capture :
# Type for save = .cap look this picture bellow :
# after your save the capture, now run aircrack-ng gui.exe in folder c:\aircrack\bin\aircrack-ng gui.exe
choose your file capture, example my file is try1.cap and in tab wordlist choose pasword.list in c:\aircrack\test\pasword.lst and check in tab ESSID and includ name your target.
and then click launch...
I hope you use this tutorial wisely and in a state of urgency or at the time of need.
and i hope you enjoy read this tutorial. Thanks for coming.... :)
Subscribe to:
Posts (Atom)