Hacking WiFi with a 3$ Jammer

In this video for Cr0w’s Place we examine how we can modify a WiFi IoT device, into a powerful WiFi Jammer. A WiFi Jammer is a portable WIFI signal blocker that can disable the WIFI signal effectively. The module that we can use is the ESP8266, and I choose the NodeMCU v1.0 that you can easily find in ebay, for 3$ or so.

Keep in mind that this is NOT a frequency jammer. It is just a deauthing device.

The process of flashing the device is pretty simple. First of all, you download the current release of the firmware from here and upload using the ESP8266 flash tool of your choice. I recommend using the nodemcu-flasher. If this doesn’t work you can also use the official esptool from espressif. But for more information and problem solving just go to the creators github here, so a big shout out goes to spacehuhn. 🙂

Links to buy NodeMCU:

 

 

This project is a proof of concept for testing and education. Please act responsibly.

If you like my videos please Subscribe to my channel.

Thank You For Watching.:)

Cr0wTom

Wordlist Creation with CUPP (Mr. Robot)

In this tutorial for Cr0w’s Place we are going to see how to generate a wordlist / dictionary file in Kali Linux, with a different tool, called CUPP. The difference is that this tool uses questions related to the victim, to produce a personalized wordlist for him/her. It is a really useful and effective tool, and it has also been shown in Mr. Robot series.

CUPP is a very powerful tool that creates a wordlist specifically for a person. CUPP is cross platform and written in Python. CUPP asks us questions about the target (name, wife’s name, pet’s name…) and then creates a password based on the keywords we entered.

To install it, go to a folder with a terminal window and type:

git clone https://github.com/Mebus/cupp.git

After this, and into the newly created cupp folder, we start the program like this:

  • cupp -i

Parameters are:

  • -h this menu
  • -i Interactive questions for user password profiling
  • -w Use this option to profile existing dictionary, or WyD.pl output to make some pwnsauce 🙂
  • -l Download huge wordlists from repository
  • -a Parse default usernames and passwords directly from Alecto DB. Project Alecto uses purified databases of Phenoelit and CIRT which where merged and enhanced.
  • -v Version of the program

If you like my job please Subscribe.

Thank You For Watching.:)

Cr0wTom

BadUSB – HID Attack (HD)

In this tutorial for Cr0w’s Place we examine the BadUSB vulnerability, and we exploit a vulnerable flash drive to work as a HID device, and perform keystroke attacks.

BadUSB is a vulnerability in the microcontroller chip of every USB device, that let us reprogram the original firmware with a patched one, that makes a device type to be presented in the victim as an other type.

Purchase link
Supported Devices
Note: If you buy a confirmed device, you might not end up with one with the PS2251-03, as manufacturers seem that many times use different controllers even with same device models.
Files used
Original code link
Rubber Ducky payloads
Rubber Ducky skripting language

If you like my videos please Subscribe to my channel.

Thank You For Watching.:)

Cr0wTom

Hacking Android with Xposed Framework (Installation and Intro)

In this tutorial for Cr0w’s Place we are hacking Android devices with Xposed Framework. Xposed is a framework for modules that can change the behavior of the system and apps without touching any APKs. That’s great because it means that modules can work for different versions and even ROMs without any changes (as long as the original code was not changed too much). It’s also easy to undo. As all changes are done in the memory, you just need to deactivate the module and reboot to get your original system back. There are many other advantages, but here is just one more: Multiple modules can do changes to the same part of the system or app. With modified APKs, you to decide for one. No way to combine them, unless the author builds multiple APKs with different combinations.

To install it, download the .apk from the download link and install it as unknown source app from a file manager.

Device used: OnePlus One (Android 4.4.4)

Requirements:
-Android Device >4.0.3
-Root (superuser)

Download Link

 

If you like my videos please Subscribe to my channel.

Thank You For Watching.:)

Cr0wTom

Hacking with Android Part 5 – zANTI 2

In part 5 of Hacking with Android series for Cr0w’s Place we are working with zANTI 2 which is the successful result of the merge of the two biggest penetration testing suites for Android. dSploit and zANTI. Evilsocket, the developer of dSploit, went to work for Zimperium, and the result is zANTI 2. Which is “a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button”.

Some of the many features of zAnti 2 are:
-Network Mapping
-Password cracking with various protocol support
-Search for known vulnerabilities
-Check for SSL Poodle and ShellShock vulnerabilities
-Perform various man in the middle attacks

Untitled

To install it, download the .apk from the download link and install it as unknown source app from a file manager.

Device used: OnePlus One (Android 4.4.4)

Download Link

Everything you are going to see is for educational purposes only, so operate carefully and in your own property. I bring no responsibility in what happens to you if you act irresponsibly.

If you like my videos please Subscribe to my channel.

Thank You For Watching.:)

Cr0wTom

Hacking with Android Part 4 – dSploit

In part 4 of Hacking with Android series for Cr0w’s Place we are working with dSploit. dSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assesments on an Android device. Once dSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing ( with common protocols dissection ), real time traffic manipulation, etc, etc .

Some of the many features of dSploit are:
-Network Mapping
-Fingerprint alive hosts operating systems and running services
-Search for known vulnerabilities
-Crack logon procedures of many tcp protocols
-Perform man in the middle attacks

fsdgdfgUntitled

To install it, download the .apk from the download link and install it as unknown source app from a file manager.

Device used: Xiaomi Mi2S(Android 4.1.1)

Download Link

Everything you are going to see is for educational purposes only, so operate carefully and in your own property. I bring no responsibility in what happens to you if you act irresponsibly.

If you like my videos please Subscribe to my channel.

Thank You For Watching.:)

Cr0w Tom

Hacking with Android Part 3: WiFi Hacking (Thomson Default Key Algorithm)

In part 3 of Hacking with Android series we speak about Thomson Default Key Algorithm presented by GNUCitizen team that let us calculate the default passwords on many Thomson routers and then we use an Android application named Thomson WPA Finder to exploit this vulnerability with an android device.

So in this method we have: S/N -> hash -> default SSID and encryption key which can be read as:  a hashed version of the router’s serial number is generated which is then used to derive both, the default SSID and the default encryption key. This is just a high-level overview of the algorithm.

More specifically: 

  • Take as example: “CP0615JT109 (53)”
  • Remove the CC and PP values: CP0615109
  • Convert the “XXX” values to hexadecimal: CP0615313039
  • Process with SHA-1: 742da831d2b657fa53d347301ec610e1ebf8a3d0
  • The last 3 bytes are converted to 6 byte string, and appended to the word “SpeedTouch” which becomes the default SSID: SpeedTouchF8A3D0
  • The first 5 bytes are converted to a 10 byte string which becomes the default WEP/WPA key: 742DA831D2

Countermeasures:

My advice is: use WPA/WPA-2 rather than WEP and change the default encryption key now, to something STRONG!

Application download link.

To install it, download the .apk from the download link and install it as unknown source app from a file manager. After installing it, it will request some download, do it and it will be ready for use. There are many apps like this but I find this easy and fast with no problems in all years that I use it.

Everything you are going to see is for educational purposes only, so operate carefully and in your own property. I bring no responsibility in what happens to you if you act irresponsibly.

 

Device used: Xiaomi Hongmi 1S (Android 4.4)

If you like my videos please Subscribe to my channel.

Thank You For Watching.:)

 Cr0w Tom