Showing posts with label backtrack tutorial. Show all posts
Showing posts with label backtrack tutorial. Show all posts

Friday, January 6, 2012

Backtrack 5 OpenVas Tutorial


OpenVas is a open source vulnerability assesment system just like nessus, openVas used to find the vulnerabilities on a computer system, it is open source so you dont need to buy it, however you can get home feed of nessus for free too, but we consider both of them. I

You can find nessus on backtrack 5 but you have to install openvas on backtrack5, so below is the tutorial for Openvas it includes how to install openvas in backtrack 5 and some basic usage.


Backtrack5 is not necessary to run openvas, if you are using some other version of backtrack or if you are using some other distro like Ubuntu than the procedure is same.

How To Install OpenVas
  • Open terminal on bt5 or ubuntu and type exactly
root@bt:~# apt-get install openvas
root@bt:~# sudo apt-get update
  • It begins your openvas installation and update all the applications. When Openvas has been installed you can find it on Application --> Backtrack --> Vulnerability assessment --> vulnerability scanner --> Openvas . See the picture.


  • On the next step click on openvas-check-setup, it will show you the problem and suggest some solution.
  • Its time to add user, from the menu select Openvas adduser, enter the login name and password, for rule type ctrl-d.
  • Now click on OpenVas NVT sync, by this you will get the latest NVT's from openvas database, you must do this step frequently to make update your Openvas.
  • Start openvas scanner from the menu, it may takes some time.
  • Open terminal for setting up openvas manager, use the command 
root@bt:~# openvas-mkcert-client -n om -i
rebuild the database by the command 
root@bt:~# openvasmd --rebuild
  • On the terminal type the command to set openvas administrator 
root@bt:~# openvasad -c 'add_user' -n openvasadmin -r Admin
  • Now click on start Openvas manager from the menu and use the command. 
root@bt:~# openvasmd -p 9390 -a 127.0.0.1
  • Start openvas administrator from the menu and type
root@bt:~# openvasad -a 127.0.0.1 -p 9393
Your are almost done, just start Greenbone security assistant and use
root@bt:~# gsad --http-only --listen=127.0.0.1 -p 9392
  • Now open your web browser and type http://127.0.0.1:9392/
  • Use your username and password that has been set on previous step.

Sunday, October 2, 2011

WiFi cracking with Backtrack and Wiffy

Do you want to crack WiFi network without touching a key? Well just install Wiffy on Backtrack5, sit back and relax.


What is this?

A bash script to automate cracking WiFi networks! Supports WEP (Client & Client-less), WPA/WPA2, MAC filtering and hidden SSID with the option of connecting afterwards.


How does it work?

> Scans for wireless networks and saves gathered data
> Configures the attacker’s wireless card
> Tries to detect currently connected clients
> Starts to capture data
> Depending on encryption on the wireless network – starts different attacks
> Once enough ‘essential’ data has been collected starts to crack the WiFi key
> Optional: Connect to network with the clients MAC (For MAC Filtering) and WiFi Key

What do I need?


> The shellscript, wiffy.sh (37.24 KB, SHA1:49f7a930120544a6cec11171abe500f7042ba49d)
> A wireless card — that supports monitor mode
> Dictionaries/Word-lists —If you’re wanting to crack WPA/WPA2
> aircrack-ng suite, macchanger — All on BackTrack!> Optional: Subversion
How do I use it?
1.) Either edit wiffy.sh or specify, via command line, your interface. (You can view your interfaces via ifconfig and use kate to edit.)
2.) If an ESSID or BSSID wasn’t set via command line, select which is YOUR network
3.) Wait…
4.) …Game over. (=

Links

Download video: http://www.mediafire.com/?3vvodwhxx191ex1
Download Script (wiffy.sh): http://www.mediafire.com/?nmu7mixhis1u8km
The latest version: wiffy.sh v0.2 (#0 BETA #6) ~ 2011-03-17

Thursday, June 16, 2011

Dual Boot Backtrack with Windows

This method of installation is the simplest available. The assumption is that the you have a Windows installation taking up all the space on your drive, and you would like to resize and repartition your drive to allow a BackTrack install alongside your Windows. BACK UP YOUR WINDOWS INSTALLATION FIRST.
  1. Boot BackTrack on the machine to be installed. Once booted, type in “startx” to get to the KDE graphical interface.
  2. Double click the “install.sh” script on the desktop, or run the command “ubiquity” in console
  3. Select your geographical location and click “forward”. Same for the Keyboard layout.
  4. The next screen allows you to configure the partitioning layout. The assumption is that we are resizing the Windows 7 partition and installing BackTrack on the newly made space.
  5. Accept the installation summary and client “Install”. Allow the installation to run and complete. Restart when done.
  6. Grub should allow you to boot both into BackTrack and Windows.
  7. Log into BackTrack with the default username and password root / toor. Change root password.
  8. Fix the framebuffer splash by typing “fix-splash” ( or “fix-splash800″ if you wish a 800×600 framebuffer), reboot.

Friday, June 3, 2011

FCrackZIP Cracking Password Protected ZIP Files on Backtrack

This tutorial for Ubuntu or Backtrack users to crack password-protected zip files with wordlists. 

1. Install FCrackZIP packages.
   -  apt-get install fcrackzip
2. Crack it with Dictionary or Brute Force Attack.
   - Brute Force Attack.


  •      fcrackzip -v zipfiles.
   - Dictionary Attack.
  •      fcrackzip -v -D -p /pentest/passwords/wordlists/wordlists zipfiles.
      *** Wordlist is the file that contain a lists of words (one word per line)
      *** My wordlist is /pentest/passwords/wordlists/wordlists
3. That's you crack the file.

fcrack