Featured

Trying Head Scarf

Trying Scarf for First Time – Side Vlog#1 on Youtube

 

If you like this video and want to see more of such videos, please comment and subscribe to my Channel. 🙂

Follow me on other Social Networks below:

Youtube: https://www.youtube.com/rameezrehman92

Instagram: https://www.instagram.com/rameezrehman408/

Twitter: https://twitter.com/rameezrehman408

Facebook: https://www.facebook.com/rameezrehman408

Website: http://www.rameezrehman408.wordpress.com/

ResearchLog: Supervisor finalization & Topic Exploration

After searching for about 10 months at-last i have found the supervisor for my MS Thesis. He’s an expert in the field of Industrial Engineering and Systems Engineering. He’s currently working in the fields of Mathematical Optimization (esp. Genetic Algorithms).

Hopefully, I’ll be combining the fields of Mathematical Optimization along with the Information Security Techniques. I found that the Intrusion Detection Systems and Anti-virus systems use these (heuristic) techniques for the identification of attacks.

Today, I have downloaded some Research Papers, one of which captured my attention. It discussed the optimized allocation of Limited Budget in the small companies with Information Security implementation in them. I’ll study it in detail hopefully today or in tomorrow morning.

I also have issued a book from Library named “Introduction to Mathematical Optimization: From Linear Programming to Meta-heuristics” by Xin-She Yang. In the first view it seemed more like a mathematical book.
I am actually in search of a book from programming point of view.

I am also looking to learn/practice python language. So, i have the programming skill if required.

 

I think that’s all for today. See you guys tomorrow.

 

SelfStudy: Software Defined Networking

I am in search of an MS supervisor for sometime in the field of Information Assurance for quite some time. On Friday, i had a meeting with Dr. M.S. Baig, who seems like the guy one should have for their MS. After that meeting i concluded that it (thesis) won’t be an easy journey but will be adventurous enough. 🙂

A thing that he emphasized upon is to look out for a topic/problem that the student be interested in, so it acts as a self-motivation.

Well, i am already interested in the field of IoT, Home-Automation or fog computing. He advised to learn a bit of SDN, as it’s the next big thing in networks, and what could be a better way to research but in the security aspects of network’s revolution.

I started looking for some sources to study about this topic. I found a few of the following sources to look at this topic. Kindly suggest me other resources too:

 

  • Coursera’s course: “Software Defined Networks” by Nick Feamster on youtube
  • “SDN: Software Defined Networks” a book by o’reiley
  • Elithecomputerguy has 2-3 lectures on the topic. (good beginner level)

Apart from these, i am also in-search of other resources.

Tutorial: Window’s User password hacking

In Windows there’s a particular file that contains the user’s passwords in hashed form. These hashed passwords can easily be decrypted using online or offline password cracker.

The folder which contains the password is not easily accessible(requires administrative privilege) in the windows environment but using a live cd of any Linux OS this file can be easily accessed.

I have generated a Report of this activity. Hopefully it’ll be helpful.

Tutorial: How to crack WPA2 wifi using aircrack-ng (dictionary attack)

This post describes the step-by-step process of cracking WPA2 wifi Access-point using Kali Linux’s tool air-crack.

Install OS and Aircrack tool:
First step is to have Kali Linux installed on your system (preferably because aircrack-ng comes pre-installed in it) or any other Linux OS along with aircrack-ng installed.

Check your Wireless Card’s injection capability:
It’s better if you have a wireless card’s chip-set which supports injection capability (i haven’t tried with normal card). This “link” on aircrack’s website discusses this issue in detail.

Put your card in Monitor Mode:
Now put your card into monitor mode by using the following command:

airmon-ng start wlan0

where wlan0 is the logical name of your wireless card. You can check it using the command:

iwconfig

which will show in detail the status of your wireless card.

Check available wifi connections:
You can check all the available wifi connections by typing the following command:

airodump-ng start wlan0mon

where “wlan0mon” is the logical name of the connection after it’s put in monitor mode.

Listen to your targeted connection:
Now you can listen to your targeted access point (which you found in the previous step) by the following command:

airodump-ng -c 9 –bssid 00:00:11:11:22:22 -w psk wlan0mon

-c means channel is specified after it.
9 is the number of channel.
–bssid means the MAC address of Access point is described after it.
00:00:11:11:22:22 is the BSSID or MAC address of the targeted Accesses Point.
-w means write the information in file mentioned after it.
psk name of the file to save data in.
wlan0mon the logical name of your wireless card.

After this the terminal will show the airodump data but only of the specified Access point. Now you’ll have to wait until a message appears:

WPA handshake: 00:00:11:11:22:22

This will appear when a user gets connected with the access point (a complete hand shake).

Run aircrack-ng to crack the pre-shared key:
After you get the above mentioned message, you have the hash value of the pre-shared key. Now you can run the following command to try to crack that hash value:

aircrack-ng -w dictionaryFile -b 00:00:11:11:22:22 psk*.cap

where:

-w is used to specify the dictionary file.
dictionaryFile is the name of the file(along with location) of the dictionary.
-b is used to indicate the next MAC address of the Access point (BSSID value).
00:00:11:11:22:22 is the mac address of your targeted Access point.
psk*.cap is used for listing all the files with names starting from “psk” and of .cap extension.

Result Display:
Now you’ll see  the aircrack tool trying to crack your pre-shared key using the dictionary. With some luck (if the pre-shared key is in the dictionary) and some processing (on your processor’s part) you’ll have the pre-shared key.

I will soon add the links to the related guides for using the linux tools and linux environment(e.g. getting a dictionary or finding already available ones). My main content was taken from the Aircrack’s website.

See you guys soon.