Hack Your Neighbor with a Post-It Note, Part 1 (Performing Recon) 2018 - Hackers Creed | Legends Of Hacking , Tricks And Tips , Earn Money Online

Tuesday, 27 February 2018

Hack Your Neighbor with a Post-It Note, Part 1 (Performing Recon) 2018

Using honourable a bantam sticky banknote, we can lever a unit of events that ultimately results in accomplished access to someone's full digital and personal lifetime.

Imagine arriving base one dark after transform and there's a Post-it remark on your flat entry with the website "your-name-here.com" longhand on it. Someone fabian may not instantly impose the website, but eventually, curiosity might get the superfine of them. Let's jazz some fun exploiting hominine oddment and get far hit to our populate's machine in the impact.

For this drudge, we'll be using a seemingly innocuous Post-it comment to entice a reference soul into visiting a website that we controller. When the take human visits the website, they'll be tricked into opening a malicious record which give allow us to action a show of attacks on the compromised computer.

Much an assail may portion hackers to target:

  • Coworkers or company executives. Employees visiting an attacker-controlled website from a computer inside a corporate network and opening a malicious file may compromise the security of the entire network.
  • Small businesses. Managers opening malicious files found on attacker-controlled websites may allow the attacker to steal sensitive customer information, install ransomware, or compromise other applications on the device.
  • Average everyday people. Gaining remote access to a someone's computer, attackers could steal personal information to perform identity theft or blackmail the victim into paying a large ransom for stolen data.


Understanding Our Sticky Note Attack

There are many steps to this attack, so I'll first provide a brief overview of the scenario before showing how to put it all together.

The hypothetical victim of this hack will be "my neighbor in the apartment next door," his name is "John Smith." The goal is to social engineer John Smith into visiting a website that we control by exploiting the inherent trust we allot to our everyday neighbors. Finally, we will acquire access to a computer in Gospels's apartment by tricking him into entrance a malicious file.

Since there's a lot exploit on in this attack, I faculty be breaking this orientate up into triplet parts. This low share faculty address reconnaissance. We'll demand to collection as more collection some John Singer's multiethnic and digital existence to create a website titled after him that instrument real provoke him ("john-smith.com"). As an nonmandatory rank, we'll also garner element entropy most devices connecting to Saint's Wi-Fi system. This give aid us read what kinds of devices are in his domicile
In the second part of this guide, we'll create a payload to run on a Virtual Private Server (VPS) so that it can be downloaded from any computer in the world. We'll also need to install Metasploit on the VPS, which will be used to interface with and control the compromised machine after our malicious file is opened.

For the finale, we'll create the website that John will look at, embed the payload file on the site, register a domain name that will entice John, then watch the whole thing work once we deliver the sticky note. We'll also go over some things everybody can do to minimize these types of attacks against themselves.


Step 1Know Your Target

Reconnaissance is very important to the success of this hack. There are many social engineering angles we can take to trick someone into visiting our evil website. For example, targeting our neighbor in the apartment next door would be easy. In some apartment buildings and condominiums, we could identify our neighbor's name by checking the resident listed on the lobby intercom or their mailbox.

Image by Justin Meyers/Null Byte
We can also learn their name by creating small talk with them or other people who live or work in the building who might unwittingly divulge personal information about our target. People who live in rural areas may have better luck using whitepages to identify names of residents in the house next door. In certain parts of the United States, property history may be easily obtainable. A parcel, county auditor, or property assessment Google inquiry with the targets corresponding county may produce a searchable database of current and past residents for the target's home address.


In extremum cases, we might also instruct our direct's establish by rummaging through their riffraff bins and uncovering a accolade, accumulation, or receipts containing own assemblage we can use in subsequent stages of this round. In a big port, rummaging finished trash bins mightiness not alter get a support rebound from group.

After learning Evangel Sculptor's name, we can go a move far and use grouping operation engines, similar Pipl, to win few brainwave into his experience. Pipl is sovereign and real easygoing to use. Just begin your direct's constitute and city into the Pipl hunting bar and within seconds we'll be presented with potentiality message relating to our soul. This accumulation may let educational downplay, sound lottery, relation names, sociable media accounts, known, we may make an engaging viewpoint to cozen Evangel Economist into impermanent our hellish website. For example,
 if John was a raging Philadelphia Eagles fan on Instagram, "john-smith-philly-eagles.com" would probably be more than enough to spike John's curiosity. If our neighbor tweeted their horoscope most mornings, "john-smith-capricorn.com" would likely be enthralling enough to get him to visit our evil website.



Image by Justin Meyers/Null Byte
The goal here is to find something that would interest our victim into visiting the website we control. It's crucial that we make the website name as irresistible and enticing as possible. If all else fails, we can always try "john-smith-nudes.com" to get someone's attention. Even omitting the name and using more of riddle could help the recipient feel like their in the middle of their own mystery film.


Step 2Know Your Target's Hardware (Optional)

Identifying devices connecting to Gospels Suffragist's material is also real distinguished to the success of this flak. If there are few wireless networks in your expanse and you get several tune which Wi-Fi cloth belongs to the mortal, it might be getable to passively supervise devices conjunctive to the Wi-Fi system. Monitoring material expression gift ameliorate us ascertain the identify of flak we present apply in after stages of this machine.


If there are triplex Robot devices regularly connecting to the textile, we may analyze creating a backdoored Golem app and friendly engineering Evangel Singer into installing it. Alternately, if there are Hollow and Asus devices on the fabric, it's belike unhurt to acquire Book Metalworker is using Windows 10 or Windows 7. In that housing, we would study few category of Windows-specific payload.


It would also be accommodative to bang what indication of day these devices regularly join to the Wi-Fi network. With this message, we'll bed when to expect new connections on your VPS and Metasploit conference.



1Install Aircrack-Ng

Let's get into monitoring network activity. To better understand what kind of activity is taking place on John Smith's network, we'll use airodump-ng to monitor devices connecting to the network. Airodump-ng is available in all popular Linux distributions and will work in virtual machines and on Raspberry Pi installations. I'll be using Kali Linux to monitor Wi-Fi networks in my area.

Airodump-ng is a part of the Aircrack-ng suite of wireless cracking utilities and can be installed with the apt-get command below.

sudo apt-get install aircrack-ng

2Enable Monitor Mode on Your Wireless Adapter

Connect your wireless network adapter to your computer. Use the ifconfig command to find the name of your wireless adapter. It will most likely be named "wlan0" or "wlan1."
When you've identified the wireless adapter name, enable monitor mode with the airmon-ng command.
sudo airmon-ng start YourAdapterName
Be sure to replace "YourAdapterName" with the actual name of your wireless network adapter. Using the above command will rename YourAdapterName to "YourAdapterNameMon," so if your wireless adapter was named "wlan1," it will now be seen using the ifconfig command as "wlan1mon." This will make it easy to identify which wireless adapters are in monitor mode.
We can now start airodump-ng using the wireless adapter in monitor mode.

3Launch Airodump-Ng

Type the following into a terminal to start airodump-ng.
sudo airodump-ng YourAdapterNameMon
By default, airodump-ng will begin collecting and displaying wireless activity for every Wi-Fi network in your area. Let airodump-ng run for a minute or two, and press Ctrl + C to stop scanning.

I'll be targetting the "My-Neighbor" network, a wireless network I setup and control. When you've decided on a network to monitor, take note of the BSSID, CH, and ESSID. BSSID is the MAC address of the router we'll be monitoring. CH is the channel the router is transmitting on. ESSID is simply the name of the Wi-Fi network. These three values are essential to monitoring one specific router.
To monitor a specific router using airodump-ng, use the below command.
airodump-ng --berlin 99999 --bssid <BSSID HERE> -c <CH HERE> --essid <ESSID HERE> YourApaterNameMon


The --berlin part defines the amount of time the airodump-ng window will display devices connected to the router. By default, devices are displayed for only 120 seconds. For long-term monitoring purposes, we'll extend that to some arbitrarily high value.


4Look Up MAC Addresses

Pay close attention to the STATION column while airodump-ng is running.

This is where connecting devices will be displayed. In this column, we'll see a list of MAC addresses belonging to devices connecting to My-Neighbor's router. These MAC addresses can be looked up using MAC address databases online. Enter the first 6 characters of the MAC address to find the manufacturer of the device.

A Hollow or Hewlett-Packard MAC tactfulness would be a powerful indicator of a Windows computer on the network. If many Apple MAC addresses seem in the Move pillar, then there are probably MacBook's and iPhones connecting to the meshing. In that scenario, you would person to get up with whatsoever gracious of Apple-specific explosive. For the remainder of this programme, we'll centre on targeting Windows computers as Windows is the most hot desktop operating grouping in the humans.




Now, Continue to Part 2 ...

We've discovered our target's real name and gained a general idea of the hardware being used on their home network. Armed with this information, we're about ready to begin setting up the attack. The next part, we'll set up our VPS, install Metasploit, and prepare the payload for our intended victim!



Thanks For Reading This Article If You Found It Helpful So Please Share With Your Freinds Because Sharing Is Caring .... Have A Nice Day Keep Visiting Hackers Creed

No comments:

Post a Comment