Pasalnya, Wireshark ini dapat digunakan bukan hanya untuk membobol password WiFi, tapi juga menyadap orang – orang. Jika anda menggunakan Wireshark pada komputer anda yang terhubung dengan jaringan yang sama, maka anda juga bisa mengetahui jalan lalu lintas data yang sudah masuk dan keluar dari si target. Cara Hack Wifi dengan CMD di PC Laptop Windows 7, 8 dan 10 – Untuk dapat mengetahui password wifi yang berlum pernah terkoneksi dengan laptop atau komputer kita, maka penggunaan comand prompt ini bisa anda andalkan. Untuk itu pada kesempatan kita kali ini kami akan membahas mengenai cara bobol Wifi orang lain dengan menggunakan CMD.
Wireshark is the world’s foremost network protocol analyzer. It lets you see what’s happening on your network at a microscopic level. It is the de facto (and often de jure) standard across many industries and educational institutions.
This tutorial can be an angel and also devil in the same time, it depends to you who use this tutorial for which purpose…me as a writer of this tutorial just hope that all of you can use it in the right way , because I believe that no one from you want your password sniffed by someone out there so don’t do that to others too
Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone who thinks it’s a good idea to try to use this to attempt to hack systems that do not belong to you
Requirements :
1. Wireshark Network Analyzer (wireshark.org)
2. Network Card (Wi-Fi Card, LAN Card, etc) fyi : for wi-fi it should support promiscious mode
Step 1: Start Wireshark and capture traffic
In Kali Linux you can start Wireshark by going to
Application > Kali Linux > Top 10 Security Tools > Wireshark
In Wireshark go to Capture > Interface and tick the interface that applies to you. In my case, I am using a Wireless USB card, so I’ve selected wlan0.
Ideally you could just press Start button here and Wireshark will start capturing traffic. In case you missed this, you can always capture traffic by going back to Capture > Interface > Start
![Tutorial Tutorial](/uploads/1/2/5/8/125858094/516456651.jpg)
Step 2: Filter captured traffic for POST data
At this point Wireshark is listening to all network traffic and capturing them. I opened a browser and signed in a website using my username and password. When the authentication process was complete and I was logged in, I went back and stopped the capture in Wireshark.
when wee type in your username, password and press the Login button, it generates a a POST method (in short – you’re sending data to the remote server).
To filter all traffic and locate POST data, type in the following in the filter section
http.request.method “POST”
See screenshot below. It is showing 1 POST event.
Step 3: Analyze POST data for username and password
Now right click on that line and select Follow TCP Steam
This will open a new Window that contains something like this:
So in this case,
username: sampleuser
password: e4b7c855be6e3d4307b8d6ba4cd4ab91
But hold on, e4b7c855be6e3d4307b8d6ba4cd4ab91 can’t be a real password. It must be a hash value.
to crack this password its simple just open new terminal window and type this :
and its looks like this:
- username: sampleuser
- password: e4b7c855be6e3d4307b8d6ba4cd4ab91:simplepassword
Thanks,
Chetan Pandey
Get introduced to the process of port scanning with this Nmap Tutorial and series of more advanced tips.
With a basic understanding of networking (IP addresses and Service Ports), learn run a port scanner, and understand what is happening under the hood.
Nmap is the world's leading port scanner, and a popular part of our hosted security tools. Nmap as an online port scanner can scan your perimeter network devices, and servers from an external perspective; ie outside your firewall.
Nmap Tips and Resources
Getting started with Nmap
Windows or Linux?
Use the operating system that works for you. Nmap will run on a Windows system, however, it generally works better and is faster under Linux, so that would be my recommended platform. Plus, having experience with Linux based systems is a great way to get access to a wide selection of security tools.
The installation steps in this guide are for an Ubuntu Linux based system but could be applied, with minor changes, to other Linux flavors such as Fedora / Centos, or BSD based system.
If you are not using a Linux based system as your main operating system, you will find it convenient and simple to fire up an installation of Ubuntu Linux in a virtual machine. You will then be able to the installation, play with Linux, and break things without affecting your base system. If you are interested in doing remote scanning such as that provided by hackertarget.com, you could get a cheap Ubuntu based VPS from one of the hundreds of providers, paying anything from $10 per month to $100 or so. Linode is great for this, providing high quality and good specifications for the price.
Step 1: Operating System Installation
If you need to get a Linux system up and running, a Free virtual machine is Virtualbox. This is an easy to use virtual machine system, you could of course alternatively use VMware or Parallels.
I suggest selecting
bridged network
for your adapter - this will give your virtual machine an IP address on your local network. Then when you are playing with Nmap you can scan your local virtual machine on one IP, your base operating system on another IP, and other devices on your local network. Scanning is fun, just keep in mind it is intrusive. Only scan systems you own/operate or have permission to scan.Step 2: Ubuntu Installation
Download the latest Ubuntu iso from www.ubuntu.com, select the ISO as the boot media for your guest and start the virtual machine. Select the install option and Ubuntu will be installed onto the virtual hard disk on the machine.
Step 3: Nmap Installation from source
Ubuntu comes with Nmap in the repositories or software library, however this is not the one we want. In most cases, I suggest sticking with the software from the Software Center, but in this case, there are many benefits from running the latest version of Nmap.
On the download page https://nmap.org/download.html you will see the bzip2 version (you can get the stable or development).
To get the latest feature packed development version, start a terminal (type terminal in the menu of Ubuntu and it will show as an option):
Hopefully Internet access from your virtual machine is working, if it is you will soon have the latest in your home directory.
You may need to install
g++
in order to compile, you should also install the libssl-dev
package as this will enable the SSL testing NSE scripts to work.Now unpack, compile and install. Use the standard
configure
and make
commands when building software from source.Run the nmap commmand to show available command line options if the installation has been successful.
You now have a list of the various options available. Start with the basics then move onto testing different scan options and NSE scripts. You have found the white rabbit, are you going to follow?
As you can see, there are a great many variations on port scanning that can be done with Nmap. Hit the book in the column to the right for an in-depth guide.
To get started
This is a simple command for scanning your local network (class C or /24):
This command will scan all of your local IP range (assuming your in the 192.168.1.0-254 range), and will perform service identification
-sV
and will scan all ports -p 1-65535
. Since you are running this as a normal user, and not root, it will be TCP Connect based scan. If you run the command with sudo
at the front, it will run as a TCP SYN scan.Zenmap for those who like to click
Start
zenmap
either from the command line or through your menu. This is the GUI interface to the Nmap scanner. It is solid and works, I prefer the command line as it allows you to script things, collect the output and have more understanding of what's going on. One nice feature of the Zenmap scanner is the graphical map of the scanned networks, a bit of eye candy if nothing else.Understanding Open, Closed and Filtered
Nmap has a variety of scan types. Understanding how the default and most common
SYN
scan works is a good place to start to examine how the scan works and interpreting the results.The 3 way TCP handshake
First, a bit of background, during communication with a TCP service, a single connection is established with the TCP 3 way handshake. This involves a
SYN
sent to an TCP open port that has a service bound to it, typical examples are HTTP (port 80), SMTP (port 25), POP3 (port 110) or SSH (port 22).The server side will see the
SYN
and respond with SYN ACK
, with the client answering the SYN ACK
with an ACK
. This completes the set up and the data of the service protocol can now be communicated.In this example, the firewall passes the traffic to the web server (HTTP -> 80) and the web server responds with the acknowledgement.
In all these examples a firewall could be a separate hardware device, or it could be a local software firewall on the host computer.
Filtered ports or when the Firewall drops a packet
The job of a firewall is to protect a system from unwanted packets that could harm the system. In this simple example, the port scan is conducted against port 81, as there is no service running on this port, using a firewall to block access to it is best practice.
A
filtered port
result from Nmap indicates that the port has not responded at all. The SYN
packet has simply been dropped by the firewall. See the following Wireshark packet capture that shows the initial packet with no response.Closed ports or when the Firewall fails
In this case,
closed ports
most commonly indicate there is no service running on the port, but the firewall has allowed the connection to go through to the server. It can also mean no firewall is present at all.Note that while we are discussing the most common scenarios, it is possible to configure a firewall to reject packets rather than drop. This would mean packets hitting the firewall would be seen as closed (the firewall is responding with
RST ACK
).Pictured below is a case where a firewall rule allows the packet on port 81 through even though there is no service listening on the port. This is most likely because the firewall is poorly configured.
An Open Port (service) is found
Open Ports
are usually what you are looking for when kicking off Nmap scans. The open service could be a publicly accessible service that is, by its nature, supposed to be accessible. It may be a back-end service that does not need to be publicly accessible, and therefore should be blocked by a firewall.An interesting thing to notice in the wireshark capture is the
RST
packet sent after accepting the SYN ACK
from the web server. The RST
is sent by Nmap as the state of the port (open) has been determined by the SYN ACK
if we were looking for further information such as the HTTP service version or to get the page, the RST would not be sent. A full connection would be established.Hacking Nmap Video from Defcon 13
This video contains some interesting Nmap features, the presenter is Fyodor the creator of the Nmap port scanner.
Become an expert with the ultimate Nmap Reference book
Hosted Nmap for external port scanning