Popular posts from this blog
wifi attack with kali linux
Prerequisites Kali Linux Prior experience with wireless hacking You will also need to install a tool (bridge utils) which doesn't come pre-installed in Kali. No big deal- apt-get install bridge-utils Objectives The whole process can be broken down into the following steps- Finding out about the access point (AP) you want to imitate, and then actually imitating it (i.e. creating another access point with the same SSID and everything). We'll use airmon-ng for finding necessary info about the network, and airbase-ng to create it's twin . Forcing the client to disconnect from the real AP and connecting to yours. We'll use aireplay-ng to deauthenticate the client, and strong signal strength to make it connect to our network. Making sure the client doesn't notice that he connected to a fake AP. That basically means that we have to provide internet access to our client after he has connected to the fake wireless network. For that we will need to have i...
Google Dorks : Use Google For Hacking websites, Databases and Cameras
Using Google Dorks For Hacking Google is the most popular search engine on the internet right now. People use it to find their answers, images, videos, news and notes etc. But, did you know that the Google can also help hackers to find vulnerable targets and steal unauthorized information?. Google is as much helpful for hackers as any other general user. Hackers use Google search engine to find Vulnerable systems (Be it a database, website, security cameras, or any IOT gadget) with the help of some special search queries. There are many Google search engine queries that can uncover vulnerable systems and/or sensitive information disclosures. These queries are known as Google Dorks. What is Google Dork or Google Dorking? In 2002, Johnny Long began to collect interesting Google search queries that uncovered vulnerable systems or sensitive information disclosures. He labeled them Google dorks. Some people call it Google hacking. Google Dorking is the method for findi...
Comments
Post a Comment