Posts

Showing posts with the label Post Attacks

Zenmap

Image
  Zenmap Nmap(Network Mapper)  is the second program that we're going to look. It is a huge tool and has many uses. Nmap is used to gather information about any device. Using the Nmap, we can gather information about any client that is within our network or outside our network, and we can gather information about clients just by knowing their IP. Nmap can be used to bypass firewalls, as well as all kinds of protection and security measures. In this section, we're going to learn some of the basic Nmap commands that can be used to discover clients that are connected to our network, and also discover the open ports on these clients. We're going to use  Zenmap , which is the graphical user interface for Nmap. If we type zenmap on the Terminal, we'll bring up the application like this: In the  Target  field, we're going to put our IP address. In the  Profile  drop-down menu, we can have various profiles: In the  Target  filed, if you want to gathe...

Netdiscover

Image
  netdiscover The netdiscover is a tool which is used to gather all the important information about the network. It gathers information about the connected clients and the router. As for the connected clients, we'll be able to know their IP, MAC address and the operating system, as well as the ports that they have open in their devices. As for the router, it will help us to know the manufacturer of the router. Then we'll be able to look for vulnerabilities that we can use against the clients or against the router if we are trying to hack them. In the  Network penetration testing , we used  airodump-ng  to discover all the connected clients to the network. In the second part of the  airodump-ng  output, we learned how we could see the associated clients and their MAC addresses. All these details we can get before we connect to the target access point. Now, after connecting to the network, we can gather much more detailed information about these devices. To d...

Post-Connection Attacks

  Post-Connection Attacks All the attacks that we performed in the pre-connection and gaining access section, we weren't connected to a network. In this section, we are going to be talking about post-connection attack that means the attacks that we can do after connecting to the network. Now, it doesn't matter that the network is a wireless or a wired network and it doesn't matter that the target was using the WEP or WPA key, we can launch all of the attacks that we're going to talk about in this section. In all the previous attacks, we kept our wireless card in monitor mode, so that we could capture any packet that goes in the air. In this section, we're going to use our wireless card in managed mode because we have access to the network, so we really don't need to capture everything, we only want to capture packets that are directed to us. In this section, we're going to look at the attacks that can perform when we break through the network. Firstly, we...