Wednesday, September 12, 2018

How to Hack WiFi Password Easily Using New Attack called PMKID On WPA/WPA2

 

Are you looking for "How to hack wifi having wpa2 security" ? well then this blog is for you.
stay with me. Thanks
Lets continue
A security researcher has revealed a new WiFi hacking technique that makes it easier for hackers to crack WiFi passwords of most modern routers.

this new method discovered by lead developer of most popular gpu and cpu based password cracking tool hashcat, Jens 'Atom' Steube.

this research works well on wpa/wpa2 wireless network protocols with pairwise master key identifier(PMKID) based roaming features enabled.

This attack to compromise the WPA/WPA2 enabled WiFi networks was accidentally discovered by Steube while he was analyzing the newly-launched WPA3 security standard.

This new WiFi hacking method could potentially allow attackers to recover the Pre-shared Key (PSK) login passwords, allowing them to hack your Wi-Fi network and much more.

Earlier WiFi hacking methods require attackers to wait for someone to log into a network and capture a full 4-way authentication handshake of EAPOL, which is a network port authentication protocol.but now hackers don't need to wait. Now it is performed on Robust Security Network Information Element(RSNIE) using a single EAPOL frame after requesting it from the access point.

Robust Security Network is a protocol for establishing secure communications over an 802.11 wireless network and has PMKID, the key needed to establish a connection between a client and an access point, as one of its capabilities.

To apply above attack you can visit this link for full guide.
https://hashcat.net/forum/thread-7717.html

This WiFi hack also does not work against next-generation wireless security protocol WPA3, since the new protocol is "much harder to attack because of its modern key establishment protocol called "Simultaneous Authentication of Equals" (SAE)

You wanna get your hands dirty with these attacks. visit our new course on Penetration testing, that will give real life experience. visit Cybertron Network Solutions






Sunday, August 5, 2018

updating openfuck exploit if you are geting ssl error

Kioptrix level 1- Error while compiling openfuck exploit solved

Hello guys. I got error while compiling exploit openfuck, even i updated that exploit according to this blog http://paulsec.github.io/blog/2014/04/14/updating-openfuck-exploit/. But still got ssl error like this screenshot.

I googled a bit to solve this error.follow the steps carefully.

Step 1- Update your exploit first according to this blog
http://paulsec.github.io/blog/2014/04/14/updating-openfuck-exploit/.

Step 2- Now add these lines at line no 24

#define SSL2_MT_ERROR 0
#define SSL2_MT_CLIENT_FINISHED 3
#define SSL2_MT_SERVER_HELLO 4
#define SSL2_MT_SERVER_VERIFY 5
#define SSL2_MT_SERVER_FINISHED 6
#define SSL2_MAX_CONNECTION_ID_LENGTH 16

Step 3- Replace if (pkey ->type != EVP_PKEY_RSA) from line 1078 with

if (EVP_PKEY_get1_RSA(pkey) == NULL).

Step 4-  Goto line no 1084 and replace pkey->pkey.rsa with  EVP_PKEY_get1_RSA(pkey)

Hope this can help you out if you got stuck with this exploit. Cheers !