OpenStreetMap logo OpenStreetMap

Nearby0051's Notes

Notes submitted or commented on by Nearby0051

Id Creator Description Created at Last changed
2925233

dylan22hewitt"airdump-ng is used to list all the network around us and display useful information about them. It is a packet sniffer, so it is basically designed to capture all the packets around us while we are in Monitor mode. We can run it against all of the networks around us and collect useful information like the mac address, channel name, encryption type, number of clients connected to the network and then start targeting to the target network. We can also run it against certain AP(access point) so that we only capture packets from a certain Wi-Fi network.

Syntax
airodump-ng [MonitorModeInterface]
First, let's look at how to run the program. In this case, we need our Wi-Fi card in Monitor mode. The name of the our Wi-Fi card is wlan0.

airodump-ng

Note: We can press Ctrl + C to stop the following execution.
Where

BSSID shows the MAC address of the target network
PWR shows the signal strength of the network. Higher the number has better signal
Beacons are the frames send by the network in order to broadcast its existence
#Data, shows the number of data packets or the number of data frames
#/s shows the number of data packets that we collect in the past 10 seconds
CH shows the channel on which the network works on
ENC shows the encryption used by the network. It can be WEP, OPN, WPA, WPA2
CIPHER shows the cipher used in the network
AUTH shows the authentication used on the network
ESSID shows the name of the network
In the above image, you can show all the wireless networks like Oppo, perfe, Fligh, Ashu, LIFCA, Xiaom, BS1A-YW5 etc and the detailed information about all the network.

Note: airodump-ng is also used to identify all of the devices connected to the networks around us.

2925178

No sex

2925231

Dylan22hewitt"Pre-connection attack is the first part of the network penetration testing. To perform this attack, we will look at the fundamentals like how to show all the networks around us, how to find the details of all the connected devices to a particular network. Once we know about the network and connected devices to it, we can disconnect any device without knowing the password of that device.

Following are the basic steps we will be going through to perform Pre-connection attack:

Wireless Interface in Monitor mode: In this step, we will change the mode of wireless device as Monitor mode.
About airodump-ng: In this step, we will use airodump-ng to list all the network around us and display useful information about them.
Run airodump-ng: In this step, we will see all the devices that are connected to a particular network and collect more information about it.
Deauthenticate the Wireless client: In this step, we can disconnect any device which is shown in the previous step using the aireplay-ng.

2925226

dylan22hewittA network is a group of two or more devices that are connected to each other to share the data or share the resource. A network contains a number of different computer system that is connected by a physical or wireless connection like server or router. This router has direct access to the internet. The device can only connect to the internet through the router or access point.

For example: Suppose the client or device connected to the network through Wi-Fi or Ethernet. If the client opens the browser and types google.com, then your computer will send a request to the router for asking google.com. The router will go to the internet and request google.com. The router will receive google.com and forward that response to the computer. Now the client can see google.com on the browser as a result.

Basic of Network
In networking, devices on the same network communicate with each other using packets. If you send a video, login a website, sending chat messages, sending email, all the data is send as packets. In networking, devices ensure that these packets go in the right direction using the mac address. Each packet has the source mac and destination mac, and it flows from the source mac to destination mac.

2925295

Demond Mckelvey is 51 years old and currently lives in Lufkin, TX.
Date of Birth
February 1970
Full Name
Demond Mckelvey
Also Known As
Demon Mckelvey
Demond Mckelbey
Demond Mc Kelvey

Last Known Address
1422 Fm 706 Lot 25 Lufkin, TX 75904-5974
Mobile
(936) 635-8057
[email protected]
[email protected]

2925285

Daniele R. Tant is 36 years old and currently lives in Huntington, TX.
Date of Birth
July 1985
Full Name
Daniele R Tant
Also Known As
Daniele Tant
Daniele Tant
Danielle Tant

Last Known Address
1131 Porterville Rd Huntington, TX 75949-8852
Mobile
(210) 426-2357
Mobile
(940) 886-8334
Landline
(361) 937-1512
Landline
(361) 949-7335
Landline
(361) 949-0376
[email protected]

2925292

Hackers

2925218

dylan22hewitt Network penetration testing is the first penetration testing that we are going to cover in this section. Most of the systems and computers are connected to a network. If a device is connected to the internet, that means the device is connected to the network because the internet is a really big network. Therefore, we need to know that how devices interact with each other in a network, as well as how networks works.

Network penetration testing is divided into 3 subsections:

Pre-connection attacks: In this section, we will learn about all the attacks that we can do before connecting to a network.
Gaining attacks: In this section, we will learn that how to crack Wi-Fi keys and gain access to Wi-Fi network whether they use WEP/WPA/WPA2 network.
Post-connection attacks: These attacks apply whenever you are able to connect to the network. In this section, you will learn the number of powerful attacks that will allow you to intercept the connections and capture everything like the user-name, password, URL, chat messages. You can also modify the data as it has been sent in the air. These attacks can apply on both Wi-Fi or wired networks:

2925221

Dylan22hewitt Network penetration testing is the first penetration testing that we are going to cover in this section. Most of the systems and computers are connected to a network. If a device is connected to the internet, that means the device is connected to the network because the internet is a really big network. Therefore, we need to know that how devices interact with each other in a network, as well as how networks works.

Network penetration testing is divided into 3 subsections:

Pre-connection attacks: In this section, we will learn about all the attacks that we can do before connecting to a network.
Gaining attacks: In this section, we will learn that how to crack Wi-Fi keys and gain access to Wi-Fi network whether they use WEP/WPA/WPA2 network.
Post-connection attacks: These attacks apply whenever you are able to connect to the network. In this section, you will learn the number of powerful attacks that will allow you to intercept the connections and capture everything like the user-name, password, URL, chat messages. You can also modify the data as it has been sent in the air. These attacks can apply on both Wi-Fi or wired networks.

2925268

Dylan22hewitt"Nmap(Network Mapper) is the second program that we're going to look. It is a huge tool and has many uses. Nmap is used to gather information about any device. Using the Nmap, we can gather information about any client that is within our network or outside our network, and we can gather information about clients just by knowing their IP. Nmap can be used to bypass firewalls, as well as all kinds of protection and security measures. In this section, we're going to learn some of the basic Nmap commands that can be used to discover clients that are connected to our network, and also discover the open ports on these clients.

We're going to use Zenmap, which is the graphical user interface for Nmap. If we type zenmap on the Terminal, we'll bring up the application like this:

Zenmap

In the Target field, we're going to put our IP address. In the Profile drop-down menu, we can have various profiles:

Post-Connection Attacks

In the Target filed, if you want to gather information of only one IP address, we can just enter that address. We can also enter a range like we did with netdiscover. We're going to enter 198.168.1.1/24. Then we are going to select the Ping scan from the Profile drop-down menu and hit the Scan button:

Zenmap

The preceding scan is kind of a quick scan, but it doesn't show too much information, as we can see in the preceding screenshot. It only shows the connected devices. This scan is very quick. We are able to see the connected devices on the left-hand panel, and we can see their IP addresses, their MAC addresses, and their vendors.

The next scan we're going to learn is the Quick Scan. Now, the Quick scan is going to be slightly slower than the Ping scan. But in Quick scan, we will get more information than the Ping scan. We're going to be able to identify the open ports on each device:

Zenmap

In the above screenshot, we can see that it shows the open ports on each one of the discovering devices. The main router has an open port c