Showing posts with label its. Show all posts
Showing posts with label its. Show all posts

Tuesday, July 18, 2017

Kali Linux Tutorial Find IP Address Of Any Website And Trace Its Location

Kali Linux Tutorial Find IP Address Of Any Website And Trace Its Location


kali-find-ip-location-website- picateshackz.com

Welcome back hackers, after a short break today i am here to share with you a new kali tutorial to find the ip address of any website and trace its exact location, i know there is a lot of tutorials to find location of ip address but all of them are really sucks, means they only give us only country details or sometimes shows random places for an ip, and if you want to know the exact location of a website then you need a search warrant but here i will demonstrate you how to find the ip address of any website and how to know its exact location without any search warrant or subpoena.

IP address, hope you all know what is IP. In this tutorial first we need to find the ip address of website in order to trace the location, without ip there is no way to find the location so for this purpose we will use Maltego information gathering tool and it is pre-installed in our favorite Kali Linux.

Maltego is popular information gathering tool but it will not show us the exact place of website, so we will use MaxMind database to find the location. MaxMind is company maintaining a database of the locations of every ip address in the world and their location status includes GPS coordinates, area code, zip code and country. MaxMind software is little expensive but the good news is they are also providing a free developers version of this database without any softwares or tools to read it.

Pygeoip, is a small python script we are also using in this tutorial. It is developed by two programmers named Jennifer Ennis and T.Williams and it is released under GPL license that enables us to input an ip address and output this critical information.



How to find the ip address with maltego

Maltego, is an open source intelligence and forensics application. This is a GUI tool so looks different. Maltego is an information gathering tool that allows you to visually see relationships and it focuses on providing a library of transforms for discovery of data from open sources, and visualizing that information in a graph format, suitable for link analysis and data mining.

Maltego allows you to enumerate network and domain information like Domain Names, Whois Information, DNS Names, Netblocks, IP Addresses etc 

Maltego also allows you to enumerate People information like:
  • Email addresses associated with a person’s name
  • Web sites associated with a person’s name
  • Phone numbers associated with a person’s name
  • Social groups that are associated with a person’s name
  • Companies and organizations associated with a person’s name etc

I have already published a tutorial for information gathering with maltego, so i would like to recommend you to read this article to find the IP address of website which you want to know the location: Kali Linux Tutorial: Using Maltego Tool To Scan Network And Finding IP



Tracing the exact location of website 



Step 1: Boot Kali Linux and open up a terminal

First of all run our favorite Kali system and open up a new terminal.

If you are new to kali linux then i recommend you to read my older post about kali linux and will guide you through the installation process and also it will also teach you the kali basics: An Introduction To Hacker’s OS: Kali Linux Setup Tutorial

Step 2: Download MaxMind database

Now we need to download the database from MaxMind, and we can get it by typing the following.
wget -N -q http://geolite.maxmind.com/download/geoip/database/GeoLiteCity.dat.gz

kali-find-ip-location-website- picateshackz.com


Then we need to unzip it.

gzip -d GeoLiteCity.dat.gz

Lets now check that the database is in place by listing the directory.

ls -alh GeoLiteCity.dat

kali-find-ip-location-website- picateshackz.com


Step 3: Download & Install Pygeoip

Next, we need to install the Python script to read the database, pygeoip. We can download it by typing the following.
wget http://pygeoip.googlecode.com/files/pygeoip-0.1.3.zip

kali-find-ip-location-website- picateshackz.com


Then, unzip it.

unzip pygeoip-0.1.3.zip

kali-find-ip-location-website- picateshackz.com


We next need to download some setup tools into the pygeoip directory.

cd pygeoip-0.1.3
wget http://svn.python.org/projects/sandbox/trunk/setuptools/ez_setup.py

kali-find-ip-location-website- picateshackz.com


Now type following:

wget https://pypi.python.org/packages/2.5/s/setuptools/setuptools-0.6c11-py2.5.egg#md5=64c94f3bf7a72a13ec83e0b24f2749b2

kali-find-ip-location-website- picateshackz.com


Lets now move and then build and install the setup tools.

mv setuptools-0.6c11-py2.5.egg setuptools-0.7a1-py2.5.egg
python setup.py build

kali-find-ip-location-website- picateshackz.com


Next type:

python setup.py install

We need to move the database to the pygeoip directory so that script can access it without having to use the full path.



cd 
mv GeoLiteCity.dat /pygeoip-0.1.3

Step 4: Query the Database

Now that we have the database in place and the pygeoip script downloaded and installed, we can begin to query that database with pygeoip.

First, we need to start a Python shell.

python

Then, you will be greeted will the triple >>> indicating you are now in an interactive python shell. Lets import the module and instantiate the class.

>>> import pygeoip>>> gip = pygeopip.GeoIP(GeoLiteCity.dat)

Next, we are ready to begin our query. Lets see where Google is located.

>>> rec = gip.record_by_addr(64.233.161.99)
>>> for key,val in rec.items():
... print "%s: %s" %(key,val)
...

Please note that it is critical to indent the "print". If not, you will throw an error.


kali-find-ip-location-website- picateshackz.com

As you can see, we were able to locate Googles IP in Mountain View, CA at area code 650, postal code 94043, longitude -122.0574, and latitude 37.4192. Not bad!.

Once again, the combination of the database and pygeoip script was able to provide us with key location information on CNNs IP address.

This little tool is great for locating any IP address in the world, albeit, it is a bit clunky. Maybe someone here in the Null Byte community with good Python skills would like to write an interactive script with a nice user interface where the user can simply enter the IP and get the record information?. Thank you, if you have any doubts please type down a comment.



Also Read:

  • How to Setup Nessus in Kali Linux - Most Used Vulnerability Scanner in 2015
  • How To Bypass Antivirus Detection Using Veil-Evasion In Kali Linux
  • Kali Linux Tools: Brief Introduction To 10 Powerful Hacking Tools

Available link for download

Read more »

Friday, June 23, 2017

Kill the monster while its small

Kill the monster while its small


What I do with Jason’s morning ritual is to implant generative patterns he can use to guide and evaluate his behaviors.  The “morning ritual” is critical, and I’m hoping to implant a habit for lifetime (although the specific techniques will shift, I’m sure.)
The most important things this morning were:
1) interrupting the non-resourceful behaviors. (Bowing, sitting seiza)
2) Anchoring love and confidence (morning hug)
3) Calming his energy levels (10 “omm” patterns with deep breathing”
4) Reminding him of his resourceful states, principles and values (Musashi’s principles, “the rules”
5) “Killing the monster while it’s small”—“swish” patterns, envisioning a negative behavior and SMASHING the image with an expanding image of a hyper-resourceful behavior.  Again and again.  Faster and faster.
7) When   highest-energy, positive, and centered he pumps his fist and yells “YES!” anchoring in that positive state.

“Killing the monster while it’s small” means to attack the root of a negative behavior.   Before he has what we call a “brain fart” he will begin to distort his body into odd positions.  His vocal quality will shift, he starts acting goofy.  This leads to a hyper-excitable and sensitive state in which “he wants what he wants” and the slightest disappointment can trigger upset. 

By this time, it is too late for conscious control.  But BEFORE this point, he can take control again by sitting upright and calming his breathing, doing a “swish” pattern, or pumping his fist and saying “YES!”  NOTE: the efficiency of a fired “anchor” is in direct relationship to how much you have “powered it up” earlier, and the uniqueness of the anchor.  

He is learning to recognize the early stages of a tantrum, while “the monster is still small” and crush it, replacing it with a positive, resourceful state.  This is very similar to recognizing when he is at a “3” on a scale of 1-10, “3” being a little tickle in his bladder, but an “8” meaning he has 30 seconds to get to a toilet.

If you study your own mind, looking at any unresourceful behavior, you’ll notice that there are precursive actions, feelings, and thoughts.  Smoking.  Cheating.   Writers’ block.  Begin to examine how you “do” them. What you do first, second and third to “accomplish” an unresourceful state.
Trust me…you have a recipe for any state or behavior in your life, positive or negative.   And if you can deliberately change that recipe by changing your physiology, mental focus or emotional state (I work all three with Jason!)  you can derail the process. 

Be a dragon-slayer.

But kill it in the nest

Namaste,
Steve

Available link for download

Read more »

Tuesday, June 13, 2017

Kali Linux Tutorial Hack Your Own Network and Beef Up Its Security

Kali Linux Tutorial Hack Your Own Network and Beef Up Its Security


Hack Your Own Network - Beef Up Its Security- picateshackz.com

Kali Linux is packed with a ton of software for testing security holes in your network. There are far too many to list here, but were so enamored with it that we decided to pick a few of our favorite tools and show how they work: Aircrack, Airbase, and ARPspoof. Well show you how to crack a Wi-Fi password with brute force techniques, create a fake router to trick machines into logging into it, and perform a man in the middle attack to eavesdrop on network communications. Remember: use these powers for good, not for evil. Knowing how to do these things can get you out of a jam or help you learn to secure your own network, but doing them to someone else is not something we recommend.
Read my previous article to know more about Kali Linux: An Introduction To Hacker’s OS: Kali Linux And Setup Tutorial.


Crack a WPA Wi-Fi Password with Aircrack



Kali Linux comes with a whole suite of apps for cracking Wi-Fi networks, including Aircrack and Reaver—both of which weve mentioned before for cracking WEP and WPA passwords, respectively.

Recommend to read: How To Hack Wi-Fi WPA/WPA2 With Kali Linux

However, WEP passwords arent that popular anymore (because theyre so easy to crack), and Reaver only works if a network has WPS enabled. So today, were going take another look at Aircrack and use it to to brute force our way into a WPA network (with the help of a password list).

Step One: Configure Your Wireless Card


First things first: disconnect from all wireless networks. Then open up terminal. In order to use Aircrack, youll need a wireless card that supports injections. Type this into the Terminal to make sure your card supports it:
airmon-ng
This lists all the wireless cards that support this crack. If you card doesnt support injections, it wont show up here. Yours is likely listed under interface as wlan0, but it may depend on your machine.
Next, type in:
airmon-ng start wlan0
Replace wlan0 with your cards interface address. You should get a message back saying that monitor mode was enabled.

Step Two: Monitor Your Network


Next, youre going to get a list of all the networks in your area and monitor yours.
Type in:
airodump-ng mon0
Youll see all the networks in your area. Locate your network from the list, and copy the BSSID, while making a note of the channel its on. Tap Ctrl+C to stop the process.
Next, type this in, replacing the information in parentheses with the information you gathered above:
airodump-ng -c (channel) --bssid (bssid) -w /root/Desktop/ (monitor interface)
It should read something like this:
airodump-ng -c 6 --bssid 04:1E:64:98:96:AB -w /root/Desktop/ mon0
Now, youll be monitoring your network. You should see four files pop up on the desktop. Dont worry about those now; youll need one of them later. The next step is a bit of a waiting game, as youll be sitting around waiting for a device to connect to a network. In this case, just open up a device you own and connect to your Wi-Fi. You should see it pop up as a new station. Make a note of the station number, because youll need that in the next step.

Step Three: Capture a Handshake


Now, youre going to force a reconnect so you can capture the handshake between the computer and the router. Leave Airodump running and open up a new tab in Terminal. Then type in:
aireplay-ng -0 2 -a (router bssid) -c (client station number) mon0
It should look something like:
aireplay-ng -0 2 -a 04:1E:64:98:96:AB -c 54:4E:85:46:78:EA mon0
Youll now see Aireplay send packets to your computer to force a reconnect. Hop back over to the Airodump tab and youll see a new number listed after WPA Handshake. If thats there, youve successfully grabbed the handshake and you can start cracking the password.

Step Four: Crack the Password


You now have the routers password in encrypted form, but you still need to actually figure out what it is. To do this, youll use a password list to try and brute force your way into the network. You can find these lists online, but Kali Linux includes a few small lists to get you started in the /usr/share/wordlists directory, so well just use one of those. To start cracking the password type this in:
aircrack-ng -a2 -b (router bssid) -w (path to wordlist) /Root/Desktop/*.cap
So, continuing with our above example and using one of the built-in wordlists, it should read something like:
aircrack-ng -a2 -b 04:1E:64:98:96:AB -w /usr/share/wordlists/fern-wifi/common.txt /Root/Desktop/*.cap
Now, Aircrack will try all of those passwords to see if one fits. If it does, youll get a message saying the key was found with the password. If not, give another one of the password lists a try until you find one that works. The bigger the password list, the longer this process will take, but the greater chance you have of succeeding.

How to Use This Information to Stay Safe

So, you just brute forced your way into your own network. Depending on how good your password is, it either took you five minutes or five hours. If your password is something simple, like "password123", then chances are one of the smaller wordlists was able to crack it pretty quickly. If it was more complicated, it probably took a long time or never surfaced the password at all (if so: good for you!).
The best protection here is a good, strong password on your router. The longer, weirder, and more complex it is, the better. Likewise, make sure youre using the WPA2 security protocol and you dont have WPS enabled.

Create a Fake Network with Airbase



Next up, lets take a look at how you can spoof a network address to trick people into signing into the wrong network so you can watch what theyre doing. Hackers might do this so you sign into the fake network thinking its your real one, then performing a man in the middle attack (more on that in the next section) to gather information about you from your traffic. This is amazingly easy to do with a tool in Kali Linux called Airbase.
Essentially, youll turn your Wi-Fi adapter on Kali Linux into an access point with the same name as another network. In order to do this, youll follow the same line of research as you did above, but the endings a bit different.

Step One: Configure Your Wireless Card

Just like last time, you need to set up your wireless card to monitor traffic. Open up Terminal and type:
airmon-ng
This lists all the wireless cards that support this crack. Yours is likely listed under interface as wlan0.
Next, type in:
airmon-ng start wlan0
Now youre in monitor mode. Its time to find the network you want to spoof.


Step Two: Find a Wi-Fi Network to Spoof


In order to spoof a router, youll need some information about it. So, type in:
airodump-ng mon0
Available link for download

Read more »

Monday, April 10, 2017

Kahaani 2 Movie Box Office Collections With Budget its Profit Hit or Flop

Kahaani 2 Movie Box Office Collections With Budget its Profit Hit or Flop


Here is Box Office Collections of Bollywood Movie Kahaani 2 (2016) With Budget and its Profit, Verdict (Hit or Flop) Reports at zeewiki.blogspot.com. Its Star-Cast Includes Vidya Balan, Arjun Rampal.

Latest Vidya Balan Movie Kahaani 2 (2016) box office collection Verdict (Hit or Flop) wiki, report New Records, Overseas day and week end.
Kahaani 2 released in around 1200 screens.
Kahaani 2 Movie Box Office Report With Its Verdict (Hit or Flop)*Updating Regularly
Box Office Earnings (Domestic):16 Crore
Budget + P&A:35 Crores
Profit:N/A
Theatrical Business Verdict:N/A
Collection in India:-
Friday (Opening Day):4.25 CroreOpening Day
Saturday5.79 Crore2nd Day
Sunday6.0 Crore3rd Day
Total Domestic Collection Till Now:16-17 Crore.
Total Worldwide Collection Till Now:27-28 Crore.
Total: 16-17 Crore Crore  (Till Now)
Collection in Overseas
Country :in Local Currencyin Rupees (INR)
India --
16-17 Crore  (Till Now)
Total(WorldWide Collection)27-28 crore--
Also Check Our:
Flying Jatt Movie Box Office Collection
Mohenjo Daro Movie Box Office Collection
Sultan Movie Box Office Collection
Housefull 3 Movie Box Office Collection
Baaghi Movie Box Office Collection
Neerja Movie Box Office Collection
Ghayal Once Again Box Office Collection
Rocky Handsome Box Office Collection
Ki & Ka Box Office Collection
Fan Box Offce Collection
List Of Bollywood Movies 2016-2017 With Release Date


Available link for download

Read more »

Sunday, March 12, 2017

Kahaani 2 box office collection day 3 Vidya Balan’s film earns Rs 16 97 crore in its opening weekend

Kahaani 2 box office collection day 3 Vidya Balan’s film earns Rs 16 97 crore in its opening weekend



Kahaani 2 box office collection day 3: Vidya Balan’s film earns Rs. 16. 97 crore in its opening weekend

Kahaani 2 – Durga Rani Singh released last Friday and opened to good numbers. The thriller found many takers over the weekend and that’s the reason, it posted a very respectable score at the end of three days. Vidya Balan’s film earned Rs. 16. 97 cr over its opening weekend. And by doing so, it even managed to earn more than Kahaani’s three day total which was 13. 05 cr.


Taran Adarsh shared the figures on Twitter saying, “#Kahaani2 had further 19.69% growth on Sun… Fri 4.25 cr, Sat 5.79 cr, Sun 6.93 cr. Total: ₹ 16.97 cr [1235 screens]. India biz.” With Dear Zindagi still making moolah in its second week, Kahaani 2 didn’t have to bear the brunt too much. It’s a thriller film and once the mystery gets out, footfalls dwindle. But guess thanks to the first film and its stupendous climax, the sequel received a lot of applause from the audience. And the effect is visible on the numbers.


For a film made on a budget of 15 crore, these numbers are really positive which means it is poised to earn more in the coming days. But the weekdays will be crucial because many people have already watched the film in last three days. Although as per our Trade experts the film was supposed to earn Rs. 27 crore over the first weekend, it has already pocketed more than its budget which makes it a profitable film already.


So have you watched the film?





Available link for download

Read more »