Here we learn about how we can hack wifi using airmon-ng and hashcat

Hello Folks,

I’m back again with my another blog, Today i’m going to show you how you can hack any Wifi Network from a noob to pro, I’m sharing some of my personal methods here that i’m following while doing this stuffs.

So, Here we are let’s talk about some basic stuffs first.

What is WIFI?

Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with…


Here is a walkthrough of vulncms 1 vulnhub.

Today we are doing another one machine of Vulnhub.

Goal : get the user and root flag.

Level : Beginner (Piece of Cake)

[Tip : No need to use any other tool in the box only nmap is enough.]

[Note : This box is all about CMS as its name suggests]

Lab Setup :

From here you can download the machine and setup it on your virtualbox.

As its name suggest it has a vulnerable CMS, Let’s look into it.

Let’s start with reconnaissance.

Nothing more only the default Linux Interface.


Vulnhub Walkthrough

Today we are doing a another machine from https://twitter.com/4nqr34z

Goal : Your objective is to pwn a hotel. :-)

Important: This box probably needs to be run in an isolated environment (Host-Only network), or it might disrupt your internal network. You should of course always run downloaded vm that way.

Hint: Foothold is inspired by one of these vulnerabilities:

Initial Lab Setup :

From here you can download the machine and setup it on your virtualbox, and use the Host only adapter.

https://www.vulnhub.com/entry/worst-western-hotel-1,693/

Tip : If you’re using a 1 series i.e : 192.168.1.* network kindly change it…


Vulnhub Walkthrough

Goal : find 3 horcruxes hidden inside the machine

Lab Setup:-

Download this machine from the link and import it into the virtual box.

Let’s start with reconnaissance.

Here is the machine welcome message and the ip.

In my case IP is 192.168.1.103

Let’s start a quick scan.


Let’s do another cool machine of Vulnhub from @Mansoor R

Aragog is the 1st VM of 3-box HarryPotter.

Goal : find 2 horcruxes hidden inside the machine

Lab Setup:-

Download this machine from the link and import it into the virtual box.

Let’s start with reconnaissance.

Here is the machine welcome message and the ip.

In my case IP is 192.168.1.101

Let’s start a quick scan.

┌──(root💀kali)-[~/vm/arogya]
└─# nmap 192.168.1.101
Starting Nmap 7.91 ( https://nmap.org ) at 2021-05-06 10:16 IST
Nmap scan report for 192.168.1.101
Host is up (0.00061s latency). …


Let’s do another cool machine of Vulnhub from Akanksha Verma.

Goal: Get the root flag of the target.

Difficulty: Medium/Intermediate Level

Note: Set Domain Name — typo.local

Lab Setup:-

Download this machine from the link and import it into the virtual box.

Let’s start with reconnaissance.

Here is the machine welcome message and the ip.

In my case IP is 192.168.1.208

Let’s start a quick scan.

Scanning:-


Its a another easy level machine of Vulnhub

Goal: Get the root flag of the target.

Difficulty: Easy/Medium Level

Lab Setup:-

Download this machine from the link and import it into the virtual box.

Now Lets find the IP of machine.

Here is my machine IP 192.168.1.205

Scanning:-

┌──(danial㉿kali)-[~/Desktop/InfosecWarrior/Its_October]
└─$ nmap -sV -sC -v -A -oA nmap -p- 192.168.1.205

Goal: Get the root flag of the target.

Difficulty: Easy to Intermediate

Lab Setup:-

Download this machine from the link and import it into the virtual box.

Let’s start with reconnaissance.

Here is my machine IP 192.168.1.111

Scanning :-


You can download the machine from

Goal: Get the root flag of the target.

Difficulty: Medium/Intermediate Level

Lab Setup:-

Download this machine from the link and import it into the virtual box.

Network Mode: Bridge Adapter

Here My machine ip is 192.168.1.211

Let’s start with reconnaissance.

┌──(root💀kali)-[/home/danial/Desktop/InfosecWarrior/My_Web_server]
└─# nmap -sV -sC -A -vv -oA nmap -p- 192.168.1.211

Today we are going to solve the “My Communication Server”.

You can download the machine from the given link.

One thing you want to remember that there’s no need to brute-forcing any services and also not to exploit the kernel of the target.

Goal: Get the root flag of the target.

Difficulty: Hard/Challenging Level

Note: Set MAC Address of your network interface 080027E148F2

Before starting the machine I’ll suggest you read the Description of the machine.

Okay so let’s quickly set up the machine.

Lab Setup:-

Download this machine from the link and import it into the virtual box.

Network Mode: Bridge…

Rahul

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store