So, till now we learnt about changing our MAC address. Now coming to the actual scenario, what is the actual need to change our MAC address. One of the interesting thing we can do by changing our MAC address is, we can actually increase our internet connection speed. Thinking how......!!
SO, for example let us consider that we are connected to the internet through a low speed internet connection with a 128kbps plan for which dowload speed is low. And if we want to change our internet connection speed to 512kbps plan or even higher, it can be done easily by MAC address spoofing.
Simply follow the below steps.
DOWNLOAD NETBUS HERE
For remote access of the target computer, an attacker should first install a trojan on the victim's computer. An attacker cannot send the trojan to the victim's computer directly because the victim can recognize that the received file is a trojan. So instead of directly sending the trojan to the victim's computer, the attacker binds the trojan to any of the executable files like calculator.exe or any flash games etc and sends to the victims computer. When the victim receives the executable file he thinks that that is a normal executable file and executes it.
Trojans are the Remote Administration Tools that allow the remote control and access to the attacker.
Once the trojan is installed on the target computer, then the attacker can remotely access all the software and hardware of the target computer. Simply saying, a complete access will be handed over to the attacker and he can access the remote system as he like. But the trojans can be easily detected by all antivirus softwares.
Some of the Trojans are :
1. NetBus (click here)
2. Backorrifice
3. GirlFriend
4. subSeven
The host file is the file which are present in the windows by default.
Host file is present in the following path in windows.
Windows/System32/drivers/etc.
In host file we can give the Domain names with their respective IP addresses.As a result we can observe the increase in the speed of accessing the websites which are entered in the host file.
We can play with Host file in the following manner.
Zenmap is a fabulous tool actually an extension to Nmap
Zenmap is an excellent graphical user interface tool which can be used fort port scanning the remote computer.
using zenmap tool you can find the following information regaurding the remote computer.
Download zenmap (click here to download zenmap).
What can you find using Zenmap???????
First of all you should install a data sniffer software to know the remote computer's MAC address.
Install any data sniffer you like on your computer.
I prefer Colasoft Data sniffer software ( download here)
STEPS:
1. Open the data sniffer software and run it.
2. Now your friend's MAC address whose IP address is 192.168.199.7
Every ethernet card has a unique MAC address assigned to it.
You can see your ethernet card's MAC address from command prompt.
Simply open cmd prompt and type following
ipconfig /all
Following will be displayed on the screen.
so my MAC address is visible in themarked area of below screen shot
Ping tool is commonly used for detecting whether a remote host is alive or not.
It makes use of ICMP protocal for detecting whether the remote host is alive or not.
Ping can also be missused to perform the following attacks.
1. Denial of service attack (DOS).
2. OS(Operating system) detection purposes.
Various tools for performing ping sweeping are
1. Cping
2. Fping
3. SuperScan
4. Ping Sweep
5. Nmap
6. WS_ping pro pack
Most of the file hosting websites enforce a download limit for the free users.
The phenomena is that the download limit restriction is provided on basis of the total no. of files we download or the total size of the files we download.
1. Simply delete the cookies of your web browser.
OR
2. Use a different web browser when download limit is reached in one web browser.
Proxy bouncing can be treated as an extension for proxy servers.
In proxy bouncing we connect to the internet using multiple Proxy servers. Therefore much more security is provided for our computer.
Tools: MultiProxy (Download here)
Proxy servers acts as a buffer between your computer and the internet.
So your identity is hidden and is not visible to the internet. Instead the proxy server's IP address is visible to the internet when you use proxy servers.
Famous proxy servers are
1. Wingate (Download here)
2. Winproxy (Download here)
Fport is a tool which allows you to map all the open ports, their respective processes, applications and path names for any remote computer
It is a fabulous software and you can just download it here (Download Fport)
Mac address is actually unique 12 digit hexa decimal number assigned to the every ethernet card during manufacturing. It is very simple to change your computer's MAC address by doing slight modifications in your windows registry editor or either by using ready made softwares.
One of those softwares is Etherchange ( download it ). But Eterchange will not run on the windows vista and Windows 7 onwards. Etherchange software can be used in windows XP, NT and 2000. But in Windows vista and Windows 7 you can change the MAC address manually through registry editor. It involves the following steps.
so the process of changing your MAC address through the windows registry editor is as follows.
1. Go to windows registry by typing regedit in your run command.
2. Now go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972- E325-11CE-BFC1-08002BE10318}
3. Now double-click {4D36E972- E325-11CE-BFC1-08002BE10318}.
4. List will be opened which looks like 001,002,003...................,0016.
5. Now you chould manually check all the keys ie 001,002,003...................,0016 for where your ethernet card is present. You should check the the right side pane for your ehernet card(ethernet card is actually the your ethernet card manufacturer name).
6. You will found your ethernet card in one of the keys (001,002,003...................,0016), now in the right side pane right click your mouse and select new string value. Then enter the name for that string value as NetworkAddress. Observe that in the NetworkAddress N and A are capitals.
7. After giving the name to the string value double click the NetworkAddress.
8. Now in the value data field enter the new MAC address for your computer.
9.Now either disable your network adopter and enable it OR simply restart your computer.
10. Now the work is done. Your MAC address is changed.
Thats it guys. Now just play around with all the IP addresses in your Local LAN.....!!!! : )
WEEK-1
click here
WEEK-2
click here
WEEK-3
click here
WEEK-4
click here
encryption-protectng your files
meet in the middle attack
introduction
The attack
Shell accounts
Shell accounts-2
USB hacking
Undeleting the deleted data
Undeleting the deleted data-2
Permanantly removing data:eraser
tripwire
sysinternals
task kill attack
shoulder surfing
dumpster diving
Road sign hacking
steganography
steganography-2
water marking
steganalysis
Wireless hacking
introduction
setting up a wireless network
wireless security
poisoned hotspots
important terminology
War driving
war driving: How does it work
war driving tools
demo
war driving & GPS mapping
finding WIFI hotspots on the internet
demo
re-Assosiation requests
De-Authentication attacks
countermeasures against war driving
wireless data sniffers
how are wireless connections established
MAC filtering attacks
DOS attacks against wireless networks
WEP security loopholes
Cracking WEP security loop holes
cracking WEP, WPA, WPA2:tools
ARP request relay attack
cracking WEP keys
caffe Latte attack
improvements in WPA over WEP
cracking WPA & WPA2
recoverign WEP & WPA keys from local machine
demo
computer forensics
honeypots
penetration testing & vulnarability assesment
penetration testing & vulnarability assesment-2
backtrack
AFCEH relearn program
AFCEH retake praogram
AFCEH exam kit
Identity thefts
input validation attacks
SQL injection
Cross site scripting attacks
Missuse of hidden HTML tags
Cannonicalization attacks
HTTP response splitting
Web hacking
buffer overflows
Passive Sniffing Attacks
demo
What is a switch?
What is a hub?
Router vs hub vs switch
introduction
countermeasures
active sniffing attacks
ARP poisoning attack
demo
MAC flooding attack
MAC duplication attack
playing with ARP tables
demo
countermeasures
demo
social networking websites security
windows 7 & windows vista password cracking
demo
password cracking
windows 7 & windows vista bypassing the login prompt
demo
windows 7 & windows vista online password cracking
Captcha
introduction
A good captcha system
recaptcha
mail hide from recaptcha
demo
cracking captcha
cracking megaupload captcha
future trends
my favourite twitter scripts
my favourite facebook scripts
my favourite youtube scripts
Tab napping
introduction
tools
demo
DNS poisoning attacks introduction
DNS poisoning sniffing attack
DNS cache poisoning Birthday paradox
DNS poisoning birthday attack
modern day DNS attacks:search engines
modern day DNS attacks:Fat fingers attack
modern day DNS attacks:Domain hijacking
demo
modification on user computers
Hacking demo
Accessing blocked sites using public DNS systems
demo
countermeasures
demo:FCrDNS
ICMP scanning
OS finger printing
zenmap
demo
Detection-screenca
Passive fingerprinting with p0f
demo
web server fingerprinting
avoid OS detection:change default values
demo
packet generation software
demo
Packet generator:Nping
demo
conclusion
E-Mail forging
DOS attacks
Reflective DDos attacks
password cracking attacks
password cracking attacks-2
Cracking saved passwords in browsers
introduction
google chrome
firefox
internet explorer
tools
demo
counter measures
password managers
introduction
keePassX
demo
LastPass
ClipperZ, KeePass.info, Vulnarabilities
Sniffers
Keyloggers
Trojans
EXE binders
EXE binders-2
FireWall tunneling using SSH & Putty
introduction
Steps to follow
Unvlocking p2p File Sharing tools using SSH & putty
Unblocking P2P File Sharing tools using tecniques
demo
HTTP tunneling
introduction
How it works
Tools of trade
demo
Port forwarding
introduction
How it works
Configuring the router
Portforward.com
DYNDNS
Source port forward using fpipe
port forwarding vs port triggering
Who is hacker
what will you learn in course?
The anatomy of an IP address
The anatomy of an IP address demo
Network address translation
Internal vs External IP address
Hacking demo:The anatomy of an IP address
MAC addresses
Demo
MAC address spoofing
demo
how to find the remote computer mac address
demo
changing the MAC address
Fport
Demo
Proxy servers
Proxy servers part 2
Tor:anonimty online
demo
Hacking file hosting web sites
bypassing the Ads & Multiple links_Part1
demo
Bypassing the Ads & Multiple links_Part 2
Bypassing the Download wait countdown
bypassing the download limit
Shortened URL vulnarabilities
Introduction
Threats
Previewing the shortened URL
Hacking demo
ping sweeping
traceroute
whois
reverse DNS lookups
Host files
Host files part-2
Netcat
demo
Ncat
demo
Port scanning
Deamon banner grabbing
Scanline
demo