Sunday, April 5, 2009

protecting your pen drive





So,You have a pen drive or USB drive

* you use it on other system with no anti-virus and you come back to your home with virus that crashes your computer ;D (in case you are still stuck with some crappy anti-virus,lol).

Anyways, i will tell you how i do it...

format your pen-drive.It will not take more than 10 sec's.
now open up command prompt by writing command in run.


now type the command that i have written below,Don't forget to replace 'k' with letter of your pendrive.
:\>Convert k: /fs:ntfs


after sometime the prompt will come back...now exit.



Now,go to control panel
open folder options


Go to view tab and remove the tick from last option,see below.


Click okay and now open my computer and open your pen-drive.Make a folder there by name 'molecules'.


Now come back to my computer & right click on your pendrive's letter...
mine is k: as you can see below.



Click on security tab and remove tick from all check-boxes except read option.

Click ok.
Open pendrive,
and just right click on 'molecules' and click security tab,check full control & click ok.




Now let me try to send a file to pendrive...



...
Let's try to create a folder in pendrive's root...




So what has happened?? how are we going to use our pendrive...

Don't worry,to send any data to pen drive you will need to copy it and paste into the pendrive's 'molecules' folder.See below...



i created a folder testing and pasted the file i wanted to copy in pendrive.
This was all that you needed to do.
This will protect your root only.Not the folder 'molecules' in 'current scenario' as we gave full control to 'molecules' afterwards.
If you are going to use your pen drive for copying something on other computers then you can keep the molecules folder protected too i.e. don't check the full control checkbox.This will make sure that nothing can we written to drive or executed from the drive.So,now you can insert your pen drive on any system and give them the stuff they want or access your files without infecting your drive.
Usually i keep an updated copy of NOD32 AV on the pen drive and install it first then after scanning i give full control to 'molecules' folder.
This was i am always safe.Not only i can share my data with others but i am secure too.
I hope i helped you guys a bit.
Take care...

Saturday, March 28, 2009

peneterating a Wi-Fi through backtrack


This is meant for educational purpose only.Any resemblance to real persons, living or dead is purley coincidental...lolz.Any attempt made by you,makes you responsible...not me.
May be too intense for some of you kids,so take a good look at yourself and think what you want to do.I am writing this for people who don't have it in them to study and learn the basics.This is like a 'capsule' for them.This is meant for testing of your WEP protected wireless network.I hope you guys don't misuse this and land yourself in trouble.It goes without saying that this is for YOUR OWN NETWORK TESTING PURPOSES ONLY. Unauthorized access of other people's networks is illegal. If you have problems or questions about anything, for the love of god use google/wikipedia and do some shit work yourself.


hmmm...let's get started...
We need to have right tools but we need to understand the lingo too...
so cram this first...
AP: Access Point: a wireless router
MAC Address: Media Access Control address, a unique id assigned to wireless adapters and routers. It comes in hexadecimal format (ie 00:11:ef:22:a3:6a)
BSSID: Access Point's MAC address
ESSID: Access Point's Broadcast name. (ie linksys(like in my HP training center), default, IBM etc) Some AP's will not broadcast their name but Kismet may be able to detect it anyway
TERMINAL: MS-Dos like command line interface. You can open this by clicking the black box icon next to the start key in backtrack
WEP: short for Wired Equivalency Privacy, it is a security protocol for Wi-Fi networks
WPA: short for WiFi Protected Access. a more secure protocal than WEP for wireless networks. NOTE: i will not cover cracking WPA encryption...yeah.No spoonfeeding here lolz

(i).Backtrack
Backtrack current stable ver 3.Backtrack is a linux live cd based program,i.e.it runs directly from cd-rom.Get it from backtrack.com make a cd.don’t install it.You may fuck up your computer coz i know that you will not know what you are doing lolz.So ummm...if u are already familiar with linux and have played with it then you are ready...if not then pick up an e-book on linux and go through it for a 2-3 hrs and come back.

(ii).Wireless card
Atheros** or Prism2/2.5/3 wifi card (the injection card)
You make sure your wireless card has the right chipset.Why i say thi coz u stupid dumbo, most wireless cards are programmed only to accept data that is addressed to them,other cards,like the ones that are of use for wifi sniffing,are capable of picking up all traffic that is flying through the air.Common types are Atheros, Prism, Aironet, Realtek, Hermes, etc based cards. You are on your own figuring out what type of chipset your wireless card has, as its too vast to get into here...okay.
else there is one nifty wif-usb adaptor...it will do all the work.see here

What tools you require:-
airmon - It's a tool that can help you set your wireless adapter into monitor mode (rfmon)
airodump - It's a tool for capturing packets from a wireless router (otherwise known as an AP)
aireplay - It's a tool for forging ARP requests
aircrack - It's a tool for decrypting WEP keys
iwconfig - It's a tool for configuring wireless adapters. You can use this to ensure that your wireless adapter is in "monitor" mode which is essential to sending fake ARP requests to the target router
Remember : your best tools are Patience, luck, persistence...

Here we go...
use your cd to bootup...
linux command lines are similiar to the commands used in DOS.Note that linux is case sensitive.

once you boot up enter these little commands in the Konsole to set things up...
xconf :This should create a file /etc/X11/xorg.conf and autodetects your video settings.
To get the KDE gui desktop...type in:
startx: you should be gleaming in the beautiful glow of the back|track KDE desktop.aren't you?? lol
let's get organized...
to crack a WEP key you must have a large number of encrypted packets to work on.This step can't be skipped.So, how to get the packets??well,the best way to get a large number of packets is to perform an ARP request reinjection attack (otherwise known as attack -3). In order to do this attack and get results there must be a client already authenticated with the AP, or about to connect to the AP.
At the bottom left of the screen is a little icon that looks like a monitor with a black screen. This is called the bash prompt. This is where you will be spending most of your time, so click on this to open up a new bash prompt.
type this:
modprobe -r iwl3945
this will set your wireless utilities up. the next command that you type is:
modprobe ipwraw
this sets up the driver for your card. usually these commands don’t need to be used as the backtrack program pre-loads your drivers on startup.
the next command to put in is:-
iwconfigto find out what your wireless interface is.
All interfaces will show up i.e.This will show you a list of all compatible network cards on your system.(mine is eth0).
sometime you may want to stop the adapter:
airmon-ng stop eth0

In order to connect to a wireless network in backtrack, you must type in
iwconfig eth0 essid nameofnetwork key whateverthekeyis

ifconfig eth0 up

dhcpcd eth0

A message should pop up in the bottom right of the screen saying something about ath0 being connected. To disconnect, before switching to another network, type:
ifconfig eth0 down
This configures your card the way that it needs to be to run the programs that your about to start.
Setting up your wireless interface in monitor mode.
type in:- iwconfig eth0 mode monitor

now type: airodump-ng eth0
this will show you the AP’s in your range, what you want to do is write down the BSSID (mac addy of the target AP) the channel of the target AP, the ESSID (the name of the target AP)

LEt's sniff now..getting excited hehe
Start airodump
airodump-ng --write out --ivs --abg eth0

This starts airodump-ng and tells it to begin sniffing data, write it to the file out, only capture IVs (Initialization Vectors).You will see a list of access points on the top half of the screen, and clients on the bottom.Find your access point in the list.Write down the BSSID or Mac address of the access point and any connected clients.
Our goal is to capture as many unique IVS as possible. Every time data is sent between the wireless server and client, each packet contains IV which are collected and then run through the aircrack-ng program for computation.

You should be seeing a ton of numbers flashing by.Thats because airodump-ng is searching all channels.Once you see your network, note what channel it is on (under the CH header). Stop airodump-ng by hitting:
ctrl-c
go again but this time we will add --channel # where # is the channel number of the access point, say, channel 3

airodump-ng --channel 3 --write out --ivs --abg eth0

Airodump-ng should be running much faster now,numbers flashing at very fast speed.You will see a numbers passing very quickly :-the beacons.Beacons contain message that they are an access point..about 10 times a second.For this type of attack it is important for there to be a client connected to the access point.In backtrack, you should see at the bottom a client pop up, the first MAC is the access point and the 2nd is the Client.Write down both. Open a new bash prompt and type:

aireplay-ng -2 -b PPmac -d ff:ff:ff:ff:ff:ff -m 68 -n 68 -p 0841 -h VPmac eth0

Where PPmac is the mac address (bssid) of the access point and VPmac is the mac address of the client.
aireplay-ng will now start sniffing for a certain type of packet with a length no more and no less than 68 bytes between client and access point.At this point, if there is significant data transfer between the client and ap, it may snag the right type of packet already and there is no need to do the next step. In this case, hit Y to use the packet and skip the next step. If however, it keeps reading packets for a while (more than a couple min) and does not pop up saying "Use this packet?" then do the following:

Open a new prompt and type:--
aireplay-ng -0 1 -a PPmac -c VPmac eth0

This command will effectively terminate the connection between the AP and the client forcing the client to re-connect. It is this re-connection packet that we are looking to scoop up with the first instance of aireplay.See you are becoming smart...Now you see how close you are to penetrating.
When you see something at the bottom of the screen saying "Use this packet?" Hit Y and aireplay will start sending out tons of packets to the AP. Switch over to airodump-ng which should still be running in the first bash prompt. Look at the data rate of the targeted AP--VP.If all is going well, Aireplay is spewing out packets like hell to the access point and airodump-ng is picking up the chatter in between, the data should be rising quickly. This is exactly what we want.

If for some reason the numbers doesn't flash quickly,go back to the first aireplay-ng and hit:
ctrl-c
If aireplay picks more packets,it will prompt you again...if you want to use them.Try more packets.try the aireplay-ng -0 method again. Experiment. Once you've got the data rate going up quickly, start aircrack-ng and start crunching the numbers.Write
ls
To get a list of the files.One file should be the out file that you specified in airodump-ng.
Type in:
aircrack-ng -f 2 -a 1 -b PPmac -n 64 out-01.ivs
If it runs for a long time and finds nothing, either you don't have enough IVs, or you are searching under the wrong key length. Try 128. You can also run multiple instances of of aircrack with different variables. Aircrack will continually update,After a bit of time, it should spit out your WEP key. Congrats!
now use this key...
iwconfig wlan0 key [.......]
ping www.google.com

Njoy...

P.s.
---
if this doesn't work for you...send in the comments.



next post will be on how to protect you USB from common viruses.
I will post it next weekend.

Thursday, March 19, 2009

init()

Have started this just to share what i know...
i will be writing about what can be done,what to read and use...but not how ;)
i am not gonna spoon feed you.When i started in 1999 i was a curious kid like you.It was this hunger to know how they do it,how to beat them.I started taking interest in you know what.Someone told me once during those days "Give a man a fish; you have fed him for today. Teach a man to fish; and you have fed him for a lifetime"!
i hope u get the message...

this was just to initialize the blog.
i will be writing as soon as i get time.I am too busy these days with a lot of work.
Remember i will update when i want to...so don't spam me.