Posts

Showing posts from 2017

Extract Windows Usernames, Passwords, Wi-Fi Keys & Other User Credentials with LaZagne

Image
After exploiting a vulnerable target, scooping up a victim's credentials is a high priority for hackers, since most people reuse passwords. Those credentials can get hackers deeper into a network or other accounts, but digging through the system by hand to find them is difficult. A missed stored password could mean missing a big opportunity. But the process can largely be automated with  LaZagne . LaZagne is good for both hackers and pentesters. And the benefit of LaZagne is that it works on Linux, Windows, and macOS, so anyone can practice using it, and it applies to almost every target. LaZagne is included in the remote access tool  Pupy  as a post exploitation module, but we can also use it on its own. There's also  a standalone Windows PE  ( Preinstallation Environment ) of LaZagne, which makes an excellent addition to the windows-binaries folder in Kali Linux. LaZagne is still in active development and currently supports enumerating passwords from a large set of W

How to Flip Photos, Change Images & Inject Messages into Friends' Browsers on Your Wi-Fi Network

Image
Networking is built largely on trust. Most devices do not verify that another device is what it identifies itself to be, so long as it functions as expected. In the case of a man-in-the-middle attack, we can abuse this trust by impersonating a wireless access point, allowing us to intercept and modify network data. This can be dangerous for private data, but also be fun for pranking your friends. In this case, we'll be intercepting and manipulating traffic from within a local area network, often times a Wi-Fi network connected to a wireless router. Keep in mind that a man-in-the-middle (MitM) attack still involves intercepting and modifying traffic, and without permission, this could be illegal depending on your jurisdiction. Step 1 Install the Prerequisites The primary tool we'll be using to intercept and modify network traffic in this guide is the Man-in-the-Middle Framework, better know as  MITMf . It's intended for use on  Linux  but could be potentially compile