Your Guide To Buy Routers Online

Your Guide To Buy Routers Online


Router? What is that supposed to be?

Contrary to popular belief, routers have nothing to do with routes, maps or road! Instead, these handy little devices make human existence in a technologically-soaked world much simpler. For the uninitiated, a router is a device that connects multiple devices to the same internet connection (See above table for a quick overview). Most Routers today have wireless facility and hence help folks connect to the internet anywhere within the vicinity of a device as such! For the love of wireless internet connectivity and the fact that we as a species hate being tethered to a wire, we’ve put together a few basic things you need to know before going wire-free! Read on to know all you need to know about the realm of routers and get ready to buy routers online!

What makes routers remarkable?

The answer’s simple! Who wouldn’t love a good internet connection at hand, without wires, right? Well, here are a few more reasons why you need a router and a wireless router at that!

Connectivity

Routers can be placed just about anywhere in your home or workspace and connecting your smartphone, tablet or laptop to one of these devices, requires just a few clicks and taps on your device! So long as you’re within a router’s network range, uneasy and wiry internet connections are a far-fetched nightmare that you don't have to worry about!
Shop Now For Routers

Security

Besides the fact that routers allow you to wirelessly hook on to a network, these can also work to help secure your network, making your surfing experience safe and free from internet sharks. Many routers available these days come with firewalls, keeping your network secure with complete privacy.

Easy-To-Use

Setting up a router isn’t difficult. So long as you know the difference between your internet connection and your TV cable, you probably won’t have to think too long to have a new router hooked onto a network! Nearly every router available on store shelves these days comes with an installation guide that make it as simple as a ‘plug-and-play’ operation.

So Routers Have Types Too?

Oh yes they do! There are a range of routers you can choose from, each created to address specific needs and connectivity requirements. While buying a router and switching over to a wireless network, keep in mind the importance to pick out the most feasible device that will suit all your needs, without making internet connectivity a dreadfully tedious experience. Here are some of the most important things you should chalk out while making a router purchase.

The Routers Input

Depending on the internet service provider (ISP) you currently use the services of, there are several types of connection inputs that can be tethered to your router

RJ11 Telephone Line:

These connections use the typical telephone line. To quickly understand what an RJ11 telephone line looks like, simply walk up to your land-line handset and pull out the wire connecting it to telephone network. Service providers who currently offer RJ11 internet connections include the Mahanagar Telephone Nigam Ltd. (MTNL), Bharat Sanchar Nigam Limited(BSNL), Reliance Broadband, Tata Broadband and Airtel. While buying a router that you’re looking to connect to a telephone line, look for the term “ADSL” in the name of the product. Only these will work with your existing telephone line.

USB

Routers with a USB port enable the connection of USB internet dongles and data cards. Some routers available today include USB ports that enable users to connect a data card/dongles. Internet service providers like Tata Photon, MTS, Vodaphone, Airtel and Reliance currently offer data cards and USB dongles which can be connected to routers featuring these ports. While buying a USB Dongle router, check for terms like “3G” mentioned in the product name. Routers supporting USB connections by Belkin, Micromax, TP-Link and Leoxsys can be bought at Amazon.in.

RJ45 Ethernet Cable

These connections are not to be confused with the RJ11. To keep things simpler, always remember that the RJ11 connector is smaller than the RJ45. If you can connect your connector to your laptop/desktop in the LAN port and get internet access it’s a RJ45 connector! Standardised as the IEC 60603-7 8P8C modular connector, the RJ45 has eight conductors present, as opposed to the RJ11’s four conductors. ISPs currently offering internet connections with RJ45 cables include Airtel, Reliance, Hathway, Act and your neighbourhood cable TV service. Currently, Amazon.in stocks several routers that support RJ45 cables, including routers by D-Link and TP-Link. Simply look for “RJ 45 Routers” on Amazon! Unlike RJ11-friendly routers, these will not have “ADSL” mentioned in the product name or description. Make sure you pick a router without “ADSL” indicated.

SIM cards

To further boost internet connectivity, many routers today support SIM cards. This enables users to connect the router to a wireless 3G network,offering faster internet speeds. Besides this, routers sporting SIM card slots also support 4G connectivity and CDMA/EVDO SIM cards. Routers with input connections like these are particularly better for use in areas where Ethernet broadband networks aren’t available. Routers with “SIM”, “MiFi” and “Mobile Hotspot” mentioned in the product name or description enable are of this type. The iBall iB-W3GM072G, Connectwide Portable Wireless Pocket 3G WiFi Router and Tenda 3G Wireless Router, available on Amazon.in, support SIM Cards!

How do I know what my router is compatible with?

There are a range of routers from various brands like D-Link RoutersNetgear, TP Link, Micromax, iBall, Cisco, Asus and more that you can choose from, each created to address specific needs and connectivity requirements. While buying a router and switching over to a wireless network, keep in mind the importance to pick out the most feasible device that will suit all your needs, without making internet connectivity a dreadfully tedious experience. Here are some of the most important things you should chalk out while making a router purchase.
Shop Now For Routers
Depending on the internet service provider (ISP) you currently use the services of, there are several types of connection inputs that can be tethered to your router (see table).
  • RJ11 Telephone Line
  • RJ45 Ethernet Cable
  • USB
  • SIM Cards

Router Bandwidth:

A router’s bandwidth is measured by your connection to the router, the router’s ability to handle and forward requests, and the outbound bandwidth provided to the router. Different routers sport different bandwidths, each of which is suitable for particular applications. While purchasing a router, make sure you pick one up with a suitable bandwidth. After all, you simply wouldn’t want a router that’ll leave you looking at the loading bar for hours on end, as your internet destination materializes in front of you! 
While shopping for a router, you’ll come across a bunch of numbers mashed together with words, like “150Mbps, 300Mbps, 600Mbps…etc”. Don’t be puzzled and don’t kid yourself either! This isn’t really the internet speed you’ll attain on buying one of these routers. Instead, the speed emblazoned on these devices is the highest limit at which they’re capable of transmitting data. Don’t forget, faster router speeds do not directly relate to faster internet speeds. Your browsing and downloading speed is decided by your ISP and relies on the package you’ve selected for yourself. A faster router on the other hand will help boost the performance of your internal network, increasing the speed at which you share files, videos, music and more.

Router Portability

Not all routers are portable. Those connected to wired internet connections are meant to be set up and left alone in one spot, while they transmit magical internet beams to your portable devices in the vicinity. However, this isn’t the case with all routers. Mobile routers are also available, enabling you to set up a wireless network everywhere you go! These routers create a hotspot by connecting to cellular networks and transmitting wireless signals to more than one connected portable device.

Router’s Antenna

Surprising as it may sound, the router’s antenna does have a big role to play in its usability. The better the antenna your router has, the better the signal you’ll enjoy around your home or office-space. While some routers come with a single antenna, some come with a few more, enabling a wider signal range. Before buying a router, make sure you’ve decided on just how far away from the router you wish to use your wireless devices. If your living or office space is larger, get a dual-antenna router. For smaller homes and offices, a single antenna router is sufficient.
There are a bunch of antennae types on routers too. While selecting a router, make sure you pick one out with antennae that will meet your needs and cover the distance you require it to. Refer to the table above for a quick understanding of the range different types of antennae offer, while using a 100mW Wireless Router with antennae at both ends:

Router's Designation

Several folks are left confused when they stumble across terms like Wireless B, G, N and AC. While these might sound like alien terms to most of us, this is simply a classification of router types available today, based on the advancement of technology they use.
Take a look at the various types of router designations to know which kind of router you need to buy.

Router's Band

Routers are also classified as Single Band or Dual Band. Again, these have an effect on the speed of your internet connection. Single Band routers that operate on the 2.4 GHz band are the slowest and least expensive of the lot. Dual Band routers functioning on the 2.4 GHz band are also slower and less expensive. However, those operating at 5 GHz and connected to devices that 802.11N or 802.11AC compatible have the highest connection speeds and are expensive, compared to the rest. Generally, these are twice the price of the aforementioned routers and are more often than not also compatible with older devices.

Where To Use A Router

3 Tips to increase your router’s bandwidth

  • Adjust your “channel width” 
    Adjusting your router’s channel width decides how much data can be transferred via its wireless signal. The channel width for 2.4 or 5 GHz bands is generally configured to 20 MHz, 40 MHz or 60MHz by default. Using a channel width of 20 MHz increases the router’s range but decreases data speeds. 40 MHz on the other hand is a broader channel, enabling higher data transfer while restricting the router’s range.
  • MAC filtering 
    Devices that connect to a network always have a MAC address assigned their network adapters. MAC filtering helps prevent specific devices from accessing a network, restricting access only to a few selected devices. Use your router’s management interface to add MAC addresses. This will help you decide which devices have access to your network!
  • QoS, or Quality of Service 
    This feature helps increase the performance of a select few types of traffic on a network, including gaming, video-streaming, video-calls etc. by enabling QoS, a router will give the highest bandwidth priority to a selected application, making that application in particular lag-free. This is one of the best ways to pump up the performance of your router whenever required.

To Conclude

Now that you know all you need to, it’s time you pick out the very best router to suit your wireless cravings. Some of the most popular router brands to choose from currently include D-Link, Netgear, iBall, TP-Link, Cisco and Belkin. Take your pick and shop online, wirelessly!
Sunday 19 June 2016
Posted by christy

hp vs pny pendrives writing speed test

Wednesday 1 June 2016
Posted by Unknown

want to Test your antivirus is working well and give protected check it

Sunday 29 May 2016
Posted by Unknown

Decrease Video size Without loosing Quality





Reducing the video file size, actually helps you upload videos much faster and easier .The smaller file size can help your videos to stream much faster on YouTube,daily motion and other video streaming sites.

This video shows,how you can reduce the file size of a video file without loosing the video quality.The software used is Format factory

(http://www.pcfreetime.com/download.html)

 using this software you can easily compress video files (for eg:A 500 mb video to a 55 mb video)and retaining the original quality.



If you like this video you can give it a thumps up or you can subscribe our Youtube channel for more

_________________________________________

NickCyber facebook:

https://www.facebook.com/FREECYBERWORLD



NickCyber Google+

https://plus.google.com/102746645570902002787



NickCyber blog

http://nickcyber.blogspot.in

-------------------------------------------------------------------



another useful software:

https://handbrake.fr/



HandBrake is a tool for converting video from nearly any format to a selection of modern, widely supported codecs.



Reasons you’ll love HandBrake:



Convert video from nearly any format

Free and Open Source

Multi-Platform (Windows, Mac and Linux)



FORMAT FACTORY

Format Factory is a multifunctional media converter.

Provides functions below:

All to MP4/3GP/MPG/AVI/WMV/FLV/SWF.

All to MP3/WMA/AMR/OGG/AAC/WAV.

All to JPG/BMP/PNG/TIF/ICO/GIF/TGA.

Rip DVD to video file , Rip Music CD to audio file.

MP4 files support iPod/iPhone/PSP/BlackBerry format.

Supports RMVB,Watermark, AV Mux.



Format Factory's Feature:

1 support converting all popular video,audio,picture formats to others.

2 Repair damaged video and audio file.

3 Reducing Multimedia file size.

4 Support iphone,ipod multimedia file formats.

5 Picture converting supports Zoom,Rotate/Flip,tags.

6 DVD Ripper.
Sunday 21 June 2015
Posted by christy

How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng

How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng'

Welcome back, my cyber hackers.
When Wi-Fi was first developed in the late 1990s, Wired Equivalent Privacy was created to give wireless communications confidentiality. WEP, as it became known, proved terribly flawed and easily cracked. You can read more about that in my beginner's guide to hacking Wi-Fi.
As a replacement, most wireless access points now use Wi-Fi Protected Access II with a pre-shared key for wireless security, known as WPA2-PSK. WPA2 uses a stronger encryption algorithm, AES, that's very difficult to crack—but not impossible. My beginner's Wi-Fi hacking guide also gives more information on this.
The weakness in the WPA2-PSK system is that the encrypted password is shared in what is known as the 4-way handshake. When a client authenticates to the access point (AP), the client and the AP go through a 4-step process to authenticate the user to the AP. If we can grab the password at that time, we can then attempt to crack it.
In this tutorial from our Wi-Fi Hacking series, we'll look at using aircrack-ngand a dictionary attack on the encrypted password after grabbing it in the 4-way handshake. If you're looking for a faster way, I suggest you also check out my article on hacking WPA2-PSK passwords using coWPAtty.

Step 1: Put Wi-Fi Adapter in Monitor Mode with Airmon-Ng

Let's start by putting our wireless adapter in monitor mode. For info on what kind of wireless adapter you should have, check out this guide. This is similar to putting a wired adapter into promiscuous mode. It allows us to see all of the wireless traffic that passes by us in the air. Let's open a terminal and type:
  • airmon-ng start wlan0
Note that airmon-ng has renamed your wlan0 adapter to mon0.

Step 2: Capture Traffic with Airodump-Ng

Now that our wireless adapter is in monitor mode, we have the capability to see all the wireless traffic that passes by in the air. We can grab that traffic by simply using the airodump-ng command.
This command grabs all the traffic that your wireless adapter can see and displays critical information about it, including the BSSID (the MAC address of the AP), power, number of beacon frames, number of data frames, channel, speed, encryption (if any), and finally, the ESSID (what most of us refer to as the SSID). Let's do this by typing:
  • airodump-ng mon0
Note all of the visible APs are listed in the upper part of the screen and the clients are listed in the lower part of the screen.

Step 3: Focus Airodump-Ng on One AP on One Channel

Our next step is to focus our efforts on one AP, on one channel, and capture critical data from it. We need the BSSID and channel to do this. Let's open another terminal and type:
  • airodump-ng --bssid 08:86:30:74:22:76 -c 6 --write WPAcrack mon0
  • 08:86:30:74:22:76 is the BSSID of the AP
  • -c 6 is the channel the AP is operating on
  • WPAcrack is the file you want to write to
  • mon0 is the monitoring wireless adapter*
As you can see in the screenshot above, we're now focusing on capturing data from one AP with a ESSID of Belkin276 on channel 6. The Belkin276 is probably a default SSID, which are prime targets for wireless hacking as the users that leave the default ESSID usually don't spend much effort securing their AP.

Step 4: Aireplay-Ng Deauth

In order to capture the encrypted password, we need to have the client authenticate against the AP. If they're already authenticated, we can de-authenticate them (kick them off) and their system will automatically re-authenticate, whereby we can grab their encrypted password in the process. Let's open another terminal and type:
  • aireplay-ng --deauth 100 -a 08:86:30:74:22:76 mon0
  • 100 is the number of de-authenticate frames you want to send
  • 08:86:30:74:22:76 is the BSSID of the AP
  • mon0 is the monitoring wireless adapter

Step 5: Capture the Handshake

In the previous step, we bounced the user off their own AP, and now when they re-authenticate, airodump-ng will attempt to grab their password in the new 4-way handshake. Let's go back to our airodump-ng terminal and check to see whether or not we've been successful.
Notice in the top line to the far right, airodump-ng says "WPA handshake." This is the way it tells us we were successful in grabbing the encrypted password! That is the first step to success!

Step 6: Let's Aircrack-Ng That Password!

Now that we have the encrypted password in our file WPAcrack, we can run that file against aircrack-ng using a password file of our choice. Remember that this type of attack is only as good as your password file. I'll be using the default password list included with aircrack-ng on BackTrack nameddarkcOde.
We'll now attempt to crack the password by opening another terminal and typing:
  • aircrack-ng WPAcrack-01.cap -w /pentest/passwords/wordlists/darkc0de
  • WPAcrack-01.cap is the name of the file we wrote to in the airodump-ng command
  • /pentest/passwords/wordlist/darkc0de is the absolute path to your password file

How Long Will It Take?

This process can be relatively slow and tedious. Depending upon the length of your password list, you could be waiting a few minutes to a few days. On my dual core 2.8 gig Intel processor, it's capable of testing a little over 500 passwords per second. That works out to about 1.8 million passwords per hour. Your results will vary.
When the password is found, it'll appear on your screen. Remember, the password file is critical. Try the default password file first and if it's not successful, advance to a larger, more complete password file such as one of these.

Stay Tuned for More Wireless Hacking Guides

Keep coming back, as I promise more advanced methods of hacking wireless in future tutorials. If you haven't seen the other Wi-Fi hacking guides yet, check them out here. Particularly the one on hacking WEP using aircrack-ng and hacking WPA2-PSK passwords using coWPAtty.
And as always, if you have questions on any of this, please ask away in the comments below. If it's something unrelated, try asking in the Null Byte forum.
Paper password and digital password images via Shutterstock

See Also

Tuesday 24 February 2015
Posted by christy
Tag :

How to Crack Wi-Fi Passwords—For Beginners!

How 
to Crack Wi-Fi Passwords—For Beginners!

An internet connection has become a basic necessity in our modern lives. Wireless hotspots (commonly known as Wi-Fi) can be found everywhere!

If you have a PC with a wireless network card, then you must have seen many networks around you. Sadly most of these networks are secured with a network security key.

Have you ever wanted to use one of these networks? You must have desperately wanted to check your mail when you shifted to your new house. The hardest time in your life is when your internet connection is down.

Cracking those Wi-Fi passwords is your answer to temporary internet access. This is a comprehensive guide which will teach even complete beginners how to crack WEP encrypted networks, easily.

If it's WPA2-PSK passwords you need to crack, you can use aircrack-ng orcoWPAtty.
Table of Contents
How are wireless networks secured?
What you'll need
Setting up CommView for Wi-Fi
Selecting the target network and capturing packets
Waiting...
Now the interesting part... CRACKING!
Are you a visual learner?
Step 1: How Are Wireless Networks Secured?

In a secured wireless connection, internet data is sent in the form of encrypted packets. These packets are encrypted with network security keys. If you somehow manage to get hold of the key for a particular wireless network you virtually have access to the wireless internet connection.

Broadly speaking, there are two main types of encryptions used.
WEP (Wired Equivalent Privacy)

This is the most basic form of encryption. This has become an unsafe option as it is vulnerable and can be cracked with relative ease. Although this is the case many people still use this encryption.
WPA (Wi-Fi Protected Access)

This is the more secure alternative. Efficient cracking of the passphrase of such a network requires the use of a wordlist with the common passwords. In other words you use the old-fashioned method of trial and error to gain access. Variations include WPA-2 which is the most secure encryption alternative till date. Although this can also be cracked using a wordlist if the password is common, this is virtually uncrackable with a strong password. That is, unless the WPA PIN is still enabled (as is the default on many routers).

Hacking WEP passwords is relatively fast, so we'll focus on how to crack them for this guide. If the only networks around you use WPA passwords, you'll want to follow this guide on how to crack WPA Wi-Fi passwordsinstead.
Step 2: What You'll Need
A compatible wireless adapter:

This is by far the biggest requirement.The wireless card of your computer has to be compatible with the software CommVIew. This ensures that the wireless card can go into monitor mode which is essential for capturing packets. Click here to check if your wireless card is compatible
CommView for Wi-Fi :

This software will be used to capture the packets from the desired network adapter. Click here to download the software from their website.
Aircrack-ng GUI:

After capturing the packets this software does the actual cracking. Click hereto download the software from their website.
A little patience is vital!!
Step 3: Setting Up CommView for Wi-Fi
Download the zip file of CommView for Wi-Fi from the website. Extract the file and run setup.exe to install CommView for Wi-Fi. When CommView opens for the first time it has a driver installation guide. Follow the prompts to install the driver for your wireless card.
Run CommView for Wi-Fi.
Click the play icon on the top left of the application window.

Start scanning for wireless networks.

CommView now starts scanning for wireless networks channel by channel. After a few minutes you will have a long list of wireless networks with their security type and signal. Now it is time to choose your target network.
Step 4: Selecting the Target Network and Capturing Packets

A few things to keep in mind before choosing the target wireless network:
This tutorial is only for WEP encrypted networks, so make sure you select a network with WEP next to its name. If you need to crack a WPA encrypted network, follow this tutorial instead.
Choose a network with the highest signal.
Each network will have its details in the right column.
Make sure the WEP network you are choosing has the lowest dB (decibel) value.

Once you have chosen your target network, select it and click Capture to start capturing packets from the desired channel.

Now you might notice that packets are being captured from all the networks in the particular channel. To capture packets only from the desired network follow the given steps.
Right click the desired network and click on copy MAC Address.
Switch to the Rules tab on the top.
On the left hand side choose MAC Addresses.
Enable MAC Address rules.
For 'Action' select 'capture' and for 'Add record' select 'both'.
Now paste the mac address copied earlier in the box below.

We need to capture only data packets for cracking. So, select D on the bar at the top of the window and deselect M (Management packets) and C (Control packets).

Now you have to save the packets so that they can be cracked later. To do this:
Go to the logging tab on top and enable auto saving.
Set Maximum Directory Size to 2000.
Set Average Log File Size to 20.
Step 5: Waiting...

Now the boring part- WAITING!

NOTE: The amount of time taken to capture enough data packets depends on the signal and the networks usage. The minimum number of packets you should capture should be 100,000 for a decent signal.

After you think you have enough packets (at least 100,000 packets), you'll need to export them.
Go to the log tab and click on concatenate logs.
Select all the logs that have been saved.
Do not close CommView for Wi-Fi.
Now navigate to the folder where the concatenated logs have been saved.
Open the log file.
Select File- Export -Wire shark tcpdump format and choose any suitable destination.
This will save the logs with a .cap extension to that location.
Step 6: Now the Interesting Part... CRACKING!
Download Aircrack-ng and extract the zip file.
Open the folder and navigate to 'bin'.
Run Aircrack-ng GUI.
Choose WEP.
Open your .cap file that you had saved earlier.
Click Launch.
In the command prompt type in the index number of your target wireless network.
Wait for a while. If everything goes fine, the wireless key will be shown.

You may also receive a request to try with more packets. In this case wait until more packets have been captured and repeat the steps to be performed after capturing packets.

BEST OF LUCK!
Step 7: Are You a Visual Learner?

Just in case you didn't understand, you can watch this video walk-through.


Posted by christy
Tag :

Hack Like a Pro: How to Crack User Passwords in a Linux System

Hack Like a Pro: How to Crack User Passwords in a Linux System


Welcome back, my eager hackers!
In recent blogs, I've demonstrated how to grab password hashes remotely using Metasploit's meterpreter and pwdump. Once we have the Windows passwords from the SAM file, we can then crack these hashes using tools such as Cain and Abel.
In this article, we'll look at how to grab the password hashes from a Linux system and crack the hashes using probably the most widely used password cracking tool out there, John the Ripper.
Let's boot up BackTrack and get hacking!

Where Linux Passwords Are Stored

Linux passwords are stored in the /etc/passwd file in cleartext in older systems and in /etc/shadow file in hash form on newer systems. We should expect that the passwords on anything other than old legacy systems to be stored in /etc/shadow.

Step 1: Create Some User Accounts

Since our BackTrack system probably doesn't have many users on it other than our root account, let's go ahead and create a couple more accounts.
Let's create user1 with password "flower" and user2 with a password of "hacker".
I've purposely chosen dictionary words as the complexity of the password is inversely related to the time necessary to crack it. One of the nice features of John the Ripper is that it will try to use a dictionary attack first. If that fails, it will try a hybrid attack. And only if that fails will it attempt a brute-force attack, which is the most time consuming.

Step 2: Open John the Ripper

Now that we have a couple of regular users in our system with simple passwords, we now need to open John the Ripper. John the Ripper is a simple, but powerful password cracker without a GUI (this helps to make it faster as GUIs consume resources).
We can access it from BackTrack by going to the BackTrack button on the bottom left, then BacktrackPrivilege EscalationPassword Attacks,Offline Attacks, and finally select John the Ripper from the multiple password cracking tools available.
If you selected the correct menu item, it will open a terminal that looks like this.
By the way, feel free to close our previous terminal as we're finished with it.

Step 3: Test John the Ripper

At the prompt, type:
  • bt > john -test
This command will send John the Ripper through a variety of benchmark tests to estimate how long it will take to break the passwords on your system. Your terminal will look something like this.
Now that John has estimated how long each of the encryption schemes will take to crack, let's put him to work on cracking our passwords.

Step 4: Copy the Password Files to Our Current Directory

Linux stores its passwords in /etc/shadow, so what we want to do is copy this file to our current directory along with the /etc/passwd file, then "unshadow" them and store them in file we'll call passwords. So, let's type both:
  • bt > cp /etc/shadow ./
  • bt > cp /etc/passwd ./
In Linux, the cp command means copy and the ./ represents our current directory. So this command says, copy the contents of /etc/shadow to my current directory. We do the same for the /etc/passwd file.

Step 5: Unshadow

Next we need to combine the information in the /etc/shadow and the /etc/passwd files, so that John can do its magic.
  • bt > ./unshadow passwd shadow > passwords

Step 6: Crack!

Now that we have unshadowed the critical files, we can simply let John run on our password file.
  • bt > john passwords
John the Ripper will proceed to attempt to crack your passwords. As you can see, it cracked all three of ours in a matter of seconds! Of course, more complex passwords will take significantly more time, but all we need is just one user with a simple password and we have access to the account in seconds.
It's also important to note that any password cracker is only as good as its word list. For more complex or hybrid passwords, you probably want to use a password list containing far more passwords, including hybrid passwords such "p@$$w0rd" that combine special characters into words.
We'll be doing more password cracking among numerous other hacks, so keep coming back! And if you have any questions, feel free to comment below or head to the Null Byte forum for help.
Posted by christy
Tag :

Translate

Popular Post

Powered by Blogger.

Followers

amazon.in

amazon.in
todays deals

- Copyright © Cyber Bird - Posting For You - Powered by Blogger - Designed by christy m thomas -