Sunday, July 27, 2014

Hacker movie








Hacking Wireless Networks

This example is for educational purposes only so that I could help you to recognize porousness that exist in WiFi network

 Building the foundation for testing Wireless Networks

Wireless local-area networks - often referred to as WLANs or Wi-Fi networks - are all the rage these days.
Wireless networks are based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 set of standards for WLANs.

Why you need to test your Wireless Systems

Wireless networks have been notoriously insecure since the early days of the 802.11b standard of the late 1990s. Since the standard`s inception, major 802.11 weaknesses, such as physical security weaknesses, encryption flaws, and authentication problems, have been discovered. Wireless attacks have been on the rise ever since. The problem has gotten so bad that two wireless security standards have emerged to help fight back at the attackers: WPA and WPA2

The Wireless Hacking Process

  1. Thou shalt set thy goals
  2. Thou shalt plan thy work, lest thou go off course,
  3. Thou shalt obtain permission,
  4. Thou shalt work ethically,
  5. Thou shalt work diligently,
  6. Thou shalt respect the privacy of others,
  7. Thou shalt do no harm,
  8. thou shalt use a scientific process,
  9. Thou shalt not covet thy neighbor`s tools,
  10. Thou shalt report all thy findings.
Ethical hackers use laptops. Laptops have dropped dramatically in price that last few years, so they have become more accessible. You don`t need a lot of processing power, but, to paraphrase Tim Allen more power is better. You can use almost any operating system, including Windows although you will find you get better results when using a newer and supported operating system. In addition to the laptop, you need the following components to get maximum results you ethical hacking.

  • Hacking software
  • A wireless network interface card (NIC) that can be inserted into your laptop - preferably one with an external antenna jack
  • External antenna (directional or omnidirectional) with the proper pigtail cable to connect your external antenna to your wireless NIC
  • Portable global positioning system (GPS)
  • DC power cable or DC to AC power inverter to power your laptop from your cars 12-volt DC cigarette lighter plug socket. These are widely available from RadioShack, Kmart, Staples, CompUSA, or Wal-Mart stores.

Hacking Software

To do your job properly you need a selection of freeware and commercial software. You need the following software to do al the hacking exercises in the tutorial.

  • Partitioning or emulation software
  • Signal strength-testing software
  • Packer analyzer
  • Wardriving software
  • Password crackers
  • Packet Injectors

Using software emulators

In a perfect world, all the tools available would work on the same operating system. To solve this problem, people often build dual-boot or multi-boot workstations. When everyting`s installed, you can select the operating sytem you want to use when you boot the system. Say you using some of the version of Windos OS and you decide to use WEPcrack - wich is available only on linux - on the access points you just identified with NetStumbler. You shut down windows, reboot system and select Red Hat Linux operating system. Fliping back and forth a lot eats up valuable time. And mangling your partitions and traying to make the operating systems coexist on the same hardware can be challenging.

Enter software emulators. Software emulators allow you to emulate a guest operating sytem by ruinning it on top of host operating sytem. you can run Linux emulation on Windows host, and vice versa. To emulate Windows or Dos on Linux host, you can choose one of the following Windows-based Emulator>

  • Bochs
  • DOSEMU
  • Plex86
  • VMware
  • WINE
  • WIn4Lin
Alternatively you can emulate Linuh on a Windows host. to do this choose one of the following Linux-based emulators:

  • Cygwin
  • VMware

Saturday, July 27, 2013

Defining hacker

Traditionally, hackers like to tinker with software or electronic systems. Hackers enjoy exploring and learning how computer systems operate. They love discovering new ways to work — both mechanically and
electronically.

In recent years, hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain. Technically, these criminals are crackers (criminal hackers). Crackers break into, or crack,
systems with malicious intent. The personal gain they seek could be fame, profit, and even revenge. They modify, delete, and steal critical information, often making other people miserable.
The good-guy (white hat) hackers don’t like being lumped in the same category as the bad-guy (black hat) hackers. (In case you’re curious, the white hat and black hat terms come from old Western TV shows in which the good guys wore white cowboy hats and the bad guys wore black cowboy hats.) 
Gray hat hackers are a little bit of both. Whatever the case, most people have a negative connotation for the word hacker.

Many malicious hackers claim that they don’t cause damage but instead help others for the greater good of society. Yeah, right. Malicious hackers are electronic miscreants and deserve the consequences of their actions. However, be careful not to confuse criminal hackers with security researchers.

Hacking for beginer

Welcome to Hacking For Beginners,
computer hacker tricks and techniques that you can use to assess the security of your information systems, find the security vulnerabilities that matter, and fix the weaknesses before criminal hackers and malicious users take advantage of them. This hacking is the professional, aboveboard, and legal type of security testing — which I call ethical hacking throughout the blog.

Computer and network security is a complex subject and an ever-moving target. You must stay on top of it to ensure that your information is protected from the bad guys. That’s where the tools and techniques outlined in this blog can help.

You can implement all the security technologies and other best practices possible, and your information systems might be secure — as far as you know. However, until you understand how malicious attackers think, apply that knowledge, and use the right tools to assess your systems from their point of view, you can’t get a true sense of how secure your information really is.

Ethical hacking — which encompasses formal and methodical penetration testing, white hat hacking, and vulnerability testing — is necessary to find security flaws and to help validate that your information systems are truly secure on an ongoing basis. This blog provides you with the knowledge to implement an ethical hacking program successfully, perform ethical hacking tests, and put the proper countermeasures in place to keep external hackers and malicious users in check.