Posts

Showing posts from October, 2020

Capture Keystrokes & Passwords Remotely

Image
  Using a keylogger to intercept keys pressed on an infected computer can circumvent encryption used by email and secure chat clients. The collected data can often reveal usernames, passwords, and potentially compromising and private information which hackers abuse for financial gain. Once a hacker has created a payload and established a backdoor on the target computer of their choice, they have the full power of Metasploit to help them perform whatever post-exploitation attacks needed to get what they want. If it’s your computer, they could capture your screenshots, steal your browser passwords, recover your deleted files, and yes … see everything that you’re typing. we’ll highlight exactly how a hacker could use Metasploit to capture and collect keystrokes and passwords being entered on compromised computers, as well as what potential targets could do to prevent such an attack. Using Metasploit’s Keylogger A keylogger is a software that tracks and logs the keys pressed on the keyboar

Make Your Own Evil USB

Image
  Recently, someone asked how to make your own “Evil USB,” and I promised to make a how-to on this topic. In addition, it would be nice to have something related on our WonderHowTo world. So here it is! Introduction Most common USB flash drives are exploitable due to the “BadUSB” vulnerability. This allows us hackers to reprogram the microcontroller in them to act as a human interface device (HID), e.g., a keyboard, and perform custom keystrokes on our target machine. This scenario is often called an “HID Payload Attack,” since you have to hand over your script to the Bad USB for the execution (more on that later). Even though almost every USB flash drive is exploitable, the only released reprogramming method is for “Phison” microcontrollers. In this tutorial, we are going to determine the microcontroller of your USB flash drive, compile the source code published in GitHub for the tools we need, and move over to building a custom firmware with an embedded HID payload that will turn our

Run Kali Linux on Windows without installing

Image
  Kali Linux is known as being the de facto penetration-testing Linux distribution but can be a pain to use as an everyday OS — even more of a pain if that means carrying around a second laptop or the constant frustration of using the finicky Wi-Fi on virtual machines. But there’s another option: installing a Kali subsystem on your Windows computer as a convenient compromise. Microsoft has introduced Windows Subsystem for Linux, or WSL, which lets users run their favorite Linux distributions directly from Windows 10 without dual-booting or using a virtual machine. Thanks to the efforts of Offensive Security and the WSL team at Microsoft, Kali Linux is now the most recent addition to the Microsoft Store. Those familiar with running Kali virtual machines understand the frustration of attempting to use Wi-Fi and Wi-Fi adapters, which is what makes the Windows subsystem so nice — you have no such problems. Additionally, you have the full performance capability of your PC without having to

How hackers Bypass Locked Windows Computers to Run Kali Linux from a Live USB

Image
  It’s easy to run Kali Linux from a live USB on nearly any available computer, but many publicly accessible laptops and desktops will be locked down to prevent such use. School, work, or library PCs can be secured with a BIOS password, which is often an easily recovered default password. Once you have access, though, you can use a USB flash drive to run Kali live on any PC you find. Running Kali Linux on Computers via USB With a Kali live USB stick, you can run a hacking OS on any machine you can plug into, meaning you don’t have to dedicate your personal computer or a portion of it for your hacking adventures, nor do you need to buy a PC just to use Kali with. A live USB allows the resources of the computer to be used to boot from the thumb drive, ignoring the hard drive the computer usually boots from. When running Kali from a USB stick, there are two different ways of doing so. One is persistent, meaning changes that you make are saved to the flash drive. The other is non-persisten