<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: praise munene</title>
    <description>The latest articles on DEV Community by praise munene (@nesh_tech).</description>
    <link>https://dev.to/nesh_tech</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F802356%2F5de6bd61-4bd8-4ce0-b2a7-6a5b5b18d6ca.jpg</url>
      <title>DEV Community: praise munene</title>
      <link>https://dev.to/nesh_tech</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/nesh_tech"/>
    <language>en</language>
    <item>
      <title>ZIP PASSWORD CRACKING USING JOHN THE RIPPER IN KALI LINUX</title>
      <dc:creator>praise munene</dc:creator>
      <pubDate>Mon, 14 Mar 2022 20:18:16 +0000</pubDate>
      <link>https://dev.to/nesh_tech/zip-password-cracking-using-john-the-ripper-in-kali-linux-2mng</link>
      <guid>https://dev.to/nesh_tech/zip-password-cracking-using-john-the-ripper-in-kali-linux-2mng</guid>
      <description>&lt;p&gt;Hello,today am going to show you how to crack password protected zip files in kali linux.&lt;/p&gt;

&lt;p&gt;Kali linux is pre installed with password cracking tools namely:&lt;/p&gt;

&lt;p&gt;1.John the ripper&lt;br&gt;
2.Fcrackzip utility&lt;br&gt;
3.Wordlists&lt;br&gt;
We’ll focus more on john the ripper which is pre-installed in most unix operating systems.&lt;br&gt;
However if your linux operating system lacks this tools,you can install or update the necessary packages with the following commands:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;$sudo apt update&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;br&gt;
$sudo apt install john fcrackzip wordlists&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;John the ripper will use its own wordlist located in the /user/share/john/password.lst to crack the password.you can also locate all the wordlists in your system by typing the following command:&lt;br&gt;
&lt;code&gt;$locate wordlist&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1:create a password protected zip file&lt;/strong&gt;&lt;br&gt;
The only other thing needed to start is a password protected zip file. &lt;br&gt;
Follow the steps:&lt;br&gt;
Create a text file add some text and name it say hacker.txt.&lt;br&gt;
Open the terminal in the directory and type the following command&lt;br&gt;
&lt;code&gt;$zip -password 12345678 hacker.zip hacker.txt&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc6e7ua8ucs0kodh5ll3v.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc6e7ua8ucs0kodh5ll3v.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The command creates a zip file with the password of your choosing after the word password in the shell command above.&lt;br&gt;
Replace the file names and paths to your own.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2:get the password hash&lt;/strong&gt;&lt;br&gt;
To get the password hash to be cracked, we need to enter the command:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;$zip2john hacker.zip&lt;br&gt;
&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2fql8dcvtkbaly1uke9j.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2fql8dcvtkbaly1uke9j.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3:put the password hash in a text fi&lt;/strong&gt;le &lt;br&gt;
Type the following command :&lt;br&gt;
&lt;code&gt;$zip2john hacker.zip &amp;gt; hash3.txt&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Followed by:&lt;br&gt;
&lt;code&gt;$John hash.txt&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgyq7voz4se1yhaacnn1c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgyq7voz4se1yhaacnn1c.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Sometimes you may need to customize or create your own wordlist or use a different wordlist the command follows the following format &lt;/p&gt;

&lt;p&gt;$john –wordlist= the wordlist path saved hashes&lt;br&gt;
I.e&lt;br&gt;
&lt;code&gt;$john --wordlist= /usr/share/wordlists/rockyou.txt hacker.txt&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;The time taken to crack each password varies with the strength of the password&lt;/p&gt;

</description>
    </item>
    <item>
      <title>WIFI PASSWORD HACKING FOR BEGINNERS WITH KALI LINUX</title>
      <dc:creator>praise munene</dc:creator>
      <pubDate>Sat, 12 Mar 2022 15:19:34 +0000</pubDate>
      <link>https://dev.to/nesh_tech/wifi-password-hacking-for-beginners-with-kali-linux-4f1n</link>
      <guid>https://dev.to/nesh_tech/wifi-password-hacking-for-beginners-with-kali-linux-4f1n</guid>
      <description>&lt;p&gt;There are many ways to attack WiFi networks depending on:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The type of encryption&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Default settings  &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Number of connected clients&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In this article we’ll focus on &lt;strong&gt;wifite&lt;/strong&gt; &lt;br&gt;
Wifite tool automates all these processes making wifi hacking a piece of cake.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;WHAT IS WIFITE?&lt;/strong&gt;&lt;br&gt;
Wifite is a powerful hacking tool that allows the hacker to choose a specific network to attack and let the script choose the best strategy for each network&lt;br&gt;
Wifite is developed by Derv82 and maintained by kimocoder&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;GETTING STARTED&lt;/strong&gt;&lt;br&gt;
The tool is pre-installed in kali linux and intuitive to use.&lt;/p&gt;

&lt;p&gt;Follow the steps:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;_Step 1:open wifite _&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You can open the wifite tool from the application menu or from the terminal&lt;br&gt;
Using application menu search for wifite and click on the tool to open&lt;br&gt;
You can also open the terminal and type the following command:&lt;br&gt;
&lt;code&gt;sudo wifite&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;The following interface should appear&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkds816fkvfhtby5twk8v.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkds816fkvfhtby5twk8v.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2: select the target to attack&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Once you open wifite it will start scanning for WiFi networks &lt;br&gt;
Press Ctrl+c to stop &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnrcrfv5iaoj515n33rlq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnrcrfv5iaoj515n33rlq.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Ii.    Choose the number of the WiFi network you wish to attack&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcoa562bbsoov337rc5p0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcoa562bbsoov337rc5p0.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3: sit back and let the tool do the hacking&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here the attack begins. Wifite uses the following methods according to the network targeted:&lt;br&gt;
WPS PIN attack&lt;br&gt;
PMKID capture&lt;br&gt;
WPS Pixie-Dust attack&lt;br&gt;
WPA Handshake capture&lt;br&gt;
Once finished you will see the following &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdt2t9v85f7y3zlx56zbj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdt2t9v85f7y3zlx56zbj.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The password will also automatically be saved in a cracked.json or cracked.txt file.and you can navigate to the file in the terminal and type the following command to view saved cracked passwords:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Cat cracked.json&lt;/code&gt; or &lt;code&gt;cat cracked.txt&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6hadn2ncbizu6o07kmbq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6hadn2ncbizu6o07kmbq.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After hacking the wifi you’ll realise that you cannot use your wireless network.This is because your device is still in monitor mode.To disable monitor mode you need to type the following command in the terminal &lt;br&gt;
&lt;code&gt;airmon-ng stop wlan0mon&lt;/code&gt;&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
