Linset Is Not a Social Enginering Tool - Hacking without brute force-Disconnecting all the clients in the selected network, connecting them to my fake network Capture handshake (can be used without handshake but a chance of fail), asking for the router password. If they introduce the asked password, LINSET will stop working, will save the password and the client will reconnect to the legit network.
This is for educational purposes only
Requirements :
- Linux OS
- Laptop or PC with WiFi Adaptor
Instructions :
1. Download the Linset patched and extract it on your PC running on Linux OS
2. Update software for linset (Kali Linux) internet needed dito
Open terminal
First Command
apt-get update && apt-get install -f
Second
apt-get install isc-dhcp-server
Third
apt-get install hostapd
Fourth
apt-get install lighttpd
Fifth
apt-get install php5-cgi
Pag may error punta ka dito source list update mo then try again
# Regular repositories
deb http://http.kali.org/kali sana main non-free contrib
deb http://security.kali.org/kali-security sana/updates main contrib non-free
# Source repositories
deb-src http://http.kali.org/kali sana main non-free contrib
deb-src http://security.kali.org/kali-security sana/updates main contrib non-free
Source List
deb http://http.kali.org/kali kali-rolling main contrib non-free
# For source package access, uncomment the following line
# deb-src http://http.kali.org/kali kali-rolling main contrib non-free
deb http://http.kali.org/kali sana main non-free contrib
deb http://security.kali.org/kali-security sana/updates main contrib non-free
# For source package access, uncomment the following line
# deb-src http://http.kali.org/kali sana main non-free contrib
# deb-src http://security.kali.org/kali-security sana/updates main contrib non-free
deb http://old.kali.org/kali moto main non-free contrib
# For source package access, uncomment the following line
# deb-src http://old.kali.org/kali moto main non-free contrib
2. Change the terminal directory to extracted folder Type "cd Desktop" press enter
or sample naka folder sa Desktop wpa2 folder Type "cd wpa2" press enter after nyo mag cd Desktop.
3. Type this command in terminal "chmod +x linset" and "chmod +x airmon"
4. Finally "./linset"
Dapat OK OK OK lahat lilitaw
5. Ganito dapat lilitaw lilitaw yung WiFi device mo
Type 1 Press Enter
6. Select Channel All Channel Press mo 1 then press Enter.
7. Then makikita BOX list ng available na WiFi SSID sa area mo wait mo mga 1 minute or 30 seconds.
8. Close the White Box List then may lilitaw na ganito APS list yung may (*) sa number maganda i hack.. available yun for handshake. Select ka sample I select 2 Type 2 then press Enter.
9. Mode of Fake AP ( eto gagawin neto mag gegenerate ng Fake AP same ng target pati Mac at Vendor Name )
Press 1 recommended Hostapd then Enter.
10. Info MAC just press Enter lang dito
11. Examination Handshake Press 1 then Enter
Tapos Capture HandShake Target Mass AP
12. Now wait to have WPA handshake ( at this momment i di disconnect nya yun mga user kaya makakita kayo ng mga mac list yun ang mac ng user ng WiFi at mag rerecon)
Kapag nakita nyo na may WPA handshake Press 1 Yes..
pag Wala Press 2 Strike Again
13. Now After success handshake Select Web Interface Press 1 and Enter
14. Select Language English Press 1 and Enter
15. WiFi Attack is on Going ( at this momment gagawa siya ng Fake AP at Fake DNS at DHCP)
ma didisconnect yung mga device sa original AP at i coconnect sila sa Fake AP )
Kailangan 6 windows ang lilitaw yung isa madalas natatakpan ng mdk3 yung AP
1.Main window
2.DHCP
3.Esperando
4.AP
5.FakeDNS
6.mdk3
16. Wait nyo lang may kumagat sa Fake AP SSID nyo
Ganito mang yayari sa Device ng ina atack na WiFi router mag ma rerecieve silang Notification Sign into WiFi network.. Hindi sila mag kaka internet hangat di nila na enter ang tamang password!
Pag nag open sila ng browser ganito lilitaw mag aask parin ng Password... yung Router nila kuhang kuha din Name Mac at Mac Vendor
17. Success!! Kapag na inpunt na nila yung password nila at na verify na correct titigil ang 4 Aps Window eto na yung password.
Yung password ma sasave yan sa root folder .
Eto gagawin : Minsan di lumilitaw yun dhcp
Punta kasa root/var/lib/dhcp/ or buksan mo computer var then lib then dhcp folder tapos meron isang file jan na .leases ang format rename mo un ng dhcpd.leases
Kapag blanko yung var/lib/dchp walang laman punta kasa var/lib/networkmanagement/ nandyan yung may file.leases
rename mo ng dhcpd.lease copy mo sa /var/lib/dhcp/
This is for educational purposes only
Requirements :
- Linux OS
- Laptop or PC with WiFi Adaptor
Instructions :
1. Download the Linset patched and extract it on your PC running on Linux OS
2. Update software for linset (Kali Linux) internet needed dito
Open terminal
First Command
apt-get update && apt-get install -f
Second
apt-get install isc-dhcp-server
Third
apt-get install hostapd
Fourth
apt-get install lighttpd
Fifth
apt-get install php5-cgi
Pag may error punta ka dito source list update mo then try again
# Regular repositories
deb http://http.kali.org/kali sana main non-free contrib
deb http://security.kali.org/kali-security sana/updates main contrib non-free
# Source repositories
deb-src http://http.kali.org/kali sana main non-free contrib
deb-src http://security.kali.org/kali-security sana/updates main contrib non-free
Source List
deb http://http.kali.org/kali kali-rolling main contrib non-free
# For source package access, uncomment the following line
# deb-src http://http.kali.org/kali kali-rolling main contrib non-free
deb http://http.kali.org/kali sana main non-free contrib
deb http://security.kali.org/kali-security sana/updates main contrib non-free
# For source package access, uncomment the following line
# deb-src http://http.kali.org/kali sana main non-free contrib
# deb-src http://security.kali.org/kali-security sana/updates main contrib non-free
deb http://old.kali.org/kali moto main non-free contrib
# For source package access, uncomment the following line
# deb-src http://old.kali.org/kali moto main non-free contrib
2. Change the terminal directory to extracted folder Type "cd Desktop" press enter
or sample naka folder sa Desktop wpa2 folder Type "cd wpa2" press enter after nyo mag cd Desktop.
3. Type this command in terminal "chmod +x linset" and "chmod +x airmon"
4. Finally "./linset"
Dapat OK OK OK lahat lilitaw
5. Ganito dapat lilitaw lilitaw yung WiFi device mo
Type 1 Press Enter
6. Select Channel All Channel Press mo 1 then press Enter.
7. Then makikita BOX list ng available na WiFi SSID sa area mo wait mo mga 1 minute or 30 seconds.
8. Close the White Box List then may lilitaw na ganito APS list yung may (*) sa number maganda i hack.. available yun for handshake. Select ka sample I select 2 Type 2 then press Enter.
9. Mode of Fake AP ( eto gagawin neto mag gegenerate ng Fake AP same ng target pati Mac at Vendor Name )
Press 1 recommended Hostapd then Enter.
10. Info MAC just press Enter lang dito
11. Examination Handshake Press 1 then Enter
Tapos Capture HandShake Target Mass AP
12. Now wait to have WPA handshake ( at this momment i di disconnect nya yun mga user kaya makakita kayo ng mga mac list yun ang mac ng user ng WiFi at mag rerecon)
Kapag nakita nyo na may WPA handshake Press 1 Yes..
pag Wala Press 2 Strike Again
13. Now After success handshake Select Web Interface Press 1 and Enter
14. Select Language English Press 1 and Enter
15. WiFi Attack is on Going ( at this momment gagawa siya ng Fake AP at Fake DNS at DHCP)
ma didisconnect yung mga device sa original AP at i coconnect sila sa Fake AP )
Kailangan 6 windows ang lilitaw yung isa madalas natatakpan ng mdk3 yung AP
1.Main window
2.DHCP
3.Esperando
4.AP
5.FakeDNS
6.mdk3
16. Wait nyo lang may kumagat sa Fake AP SSID nyo
Ganito mang yayari sa Device ng ina atack na WiFi router mag ma rerecieve silang Notification Sign into WiFi network.. Hindi sila mag kaka internet hangat di nila na enter ang tamang password!
Pag nag open sila ng browser ganito lilitaw mag aask parin ng Password... yung Router nila kuhang kuha din Name Mac at Mac Vendor
17. Success!! Kapag na inpunt na nila yung password nila at na verify na correct titigil ang 4 Aps Window eto na yung password.
Yung password ma sasave yan sa root folder .
Eto gagawin : Minsan di lumilitaw yun dhcp
Punta kasa root/var/lib/dhcp/ or buksan mo computer var then lib then dhcp folder tapos meron isang file jan na .leases ang format rename mo un ng dhcpd.leases
Kapag blanko yung var/lib/dchp walang laman punta kasa var/lib/networkmanagement/ nandyan yung may file.leases
rename mo ng dhcpd.lease copy mo sa /var/lib/dhcp/
I'm a professional in all kinds of hacking services, which leads me into giving out a blank ATM card to all individuals & serious minded people only. I hack, clone ATM cards worth's the total sum of $500,000.00 United States Dollars, with this card you can withdraw the sum of $3500 as daily limit till you cash out the sum total said sum & this cards has been cloned & hacked in the manner that you'll never be caught not detected during usage. For more info, kindly email us: fastatmhackers@gmail.com OR Call/WhatsApp: +16626183756
ReplyDelete