Hello, I am my own Administrator and I want to test the strenght of my network. So reinstalled my laptop so there is no password and nothing. So now I am out of my network and I'm playing "hacker". So what should I do? I don't know the password, I don't know the IP of the router I know nothing! How should I start?
So I begin the discussion!
I'm thinking that I can look if the network is safe with WPS/WEP/WPA2 ect. Ok it is WPA2.
I start bruteforce!
Meanwhile I'm thinking if I know somebody in the network so I probably can send him a backdoor! But no! There is noone I know. So bruteforce failed. What should I do next?
I read some "How to" but I'm not sure what I should do next because WPA2 is very difficult!
PS: Another discussion. So we are in the network as a "normal" user. How can I "hack" another user? Any ideas?
Thanks for alle comments :)
PPS: Happy hacking
3 Responses
Okay, first the attack you perform on your access point isn't a Brute Force attack but more likely a Dictionary Attack for the simple reason that a Brute Force Attack never fails if the password doesn't change meanwhile : it's just insanely long (100~1000 years ). It's just to clarify things.
Now about your question : you're not doing things in the right order. First you need to gather intel on your target. You need to know as much as you can : it's always the first step for a selective hack. Do you know your target name/domain name ? Do you know its email ? Then use whois-like database to find other information...
Otherwise you'll be limited at trying to crack your target AP...
Oh ok so thank you. Finally I'm in the network and I want to hack a computer but how? Without Backdoor or something. I mean I wrote the article about the neighbour and he got connected with an exploit but it didn't work for me?! What should I do.
PS: Thank you for taking time to write back :)
The thing with hacking it's really "case by case". An exploit can work on one computer and not on a other for various reason : the host is patched, the kernel has changed and the exploit is affected, or the host firewall is blocking your shell...
I don't understand the second part of your post. Can you rephrase it ? From what I understand a neighbour of yours managed to exploit your victim while you failed. Did you target the same host ? Did you use the same exploit and the same payload ?
Share Your Thoughts