Latest Attack Wifi Jammer with kali linux 2017

Hello friends once again welcome here in this advance hacking blog.Now today we will learn all about wifi jammer.I think you are familiar about jammer,basically It is way by which one can restrict others for using wifi connection.In this blog post I'm going to use kali linux for making wifi jammer,I mean you can jam all the wifi near by you.

Suppose one router has 3 connections so you can restrict all the three device from that router this is called jamming of wifi connection in simple language.

Automatically you can disconnect all the devices or any perticular device from access wifi and in future they can't able to connect with that wifi.

So i think you have enough knowledge about whatis jammer and what is the use of it.Please remenber this ,don't use this hack to harm anyone otherwise I m not responsible for the action taken by your victim.

Now follow below given steps one by one ,and if you don't understand any particular steps please read that steps twise.

Step By Step Guide For Creating A WiFi Jammer With Kali Linux

Below are the steps:

Step:1) First of all you need to check the information of  connected wlan so open your kali linux terminal windows and enter this command iwconfig and hit enter button or you can execute this command airmon-ng and you will see all the details like driver,interface,chipset etc of your wlan ,in my case interface is wlan0. check your's

Step:2) So now you need to on the monitor mode so simply execute this command airmon-ng start wlan0 ,when you execute this command you will see the changed interface name of wlan0 to wlan0mon (Remember this new name,In next step you need to put this new name in further command)

Step:3) Now you need to monitor the wife which is detected near by you.So for this give this command airodump-ng wlanomon  and press enter will get the list of all active wifi connection,and also get the details of all connected devices with that particular wifi network.For example in my case there are 3 wifi network available here and all the three wifi has 5-5 active connection or devices.You will get detail like bssid,channel,pwr,ENC,ESSId etc of every wifi.

Step:4) Now choose the wifi network which you want to jam for others,So simply see the mac address and channel no. of any wifi router and execude this below given command

airodump-ng c 11 --bssid cb:03:23:se4:45:AD wlan0mon
Note1: Write your channel no. instead of my which is 11 and also replace the mac address with your wifi router mac address and also write your new interface name which is in my case wlan0mon.
Note2: One space after 11  and one space after bssid and one space after mac address in above give command.
Step:5) After executing above command ,your system just only monitor one wif network.Now you will see the all device connected with that particular wifi.

Step:6) Now the time come to disconnet all the devices from wifi so simply execute this command airplay-ng -0 0 -a cb:03:23:se4:45:AD(write the bssid of wifi) wlan0mon 

Step:7) Now you will see all the devices connected with this wifi network automaticaly disconnected from it till you stop it.
Note: If you want to disconnect any particular device from wifi then read next steps

Disconnect a single client

Step:8) Again give the same command which you give in step 4 which is airodump-ng c 11 --bssid cb:03:23:se4:45:AD wlan0mon

Step:9) Now note the mac address of that particular connected device and give this command airplay-ng -0 0 -a cb:03:23:se4:45:AD(write the bssid of wifi) -c [copied mac address of the device] wlan0mon

Step:10) Now in the end you can disable the monitor mode by executing this command airmon-ng stop wlan0mon.

That's it guys ,in this way you can disconnect all the device or any particular device from any particular wifi network.If you have any doubt in any steps please read the whole process twise.if you like this post please share it with your friends or social media like facebook. 

Parrot VS Kali Linux 2017 And Which One Is Better For Learning Ethical Hacking?

Hello guys warm welcome here,hope you are doing well.Now my today's topic is just for those people who want to know about which operating system is good for ethical hacking or pentesting service either kali or parrot .In this blog i'll try to provide you a brief discription about both the operating system( kali and parrot os).

Actualy This is very difficult for me to justify which one is good for you because both of them works like a charm and every person have own choice and the power of judging the things, and i am only the guider so i can tell you only how one is good and how second is less good,what is the  difference between them ..etc.If you're a beginner and trying to inhence or improve your tech skills then i think you will familiar about kali linux.Parrot security system is less popular then kali linux because the launch date of parrot security system is 2013 and kali is 2006.Did you know?kali is the advance version of backtrack team.It have almost all popular softwares or scripts which are usefull in doing some pentesting stuff or creating undetectable payload ,wifi sniffing,jamming etc.

What Is Parrot Security System?

Parrot  security system is same as kali linux and it is debian based GNU/Linux distribution.Parrot os is released in 10 appril 2013 and developed by FrozenBox team.It is Basicaly designed for finding vulnerability,penetration testing,computer forensics etc.It is also useful to surf web anonymousily.

It is avalable in the lite version and full edition.If you want to use full feature of parrot security system then use full edition of this os.It have many advance feature like cryptography,anonymously online,forensics digital etc.

The best thing of this operating system is,it used the hardware resource less then kali linux so you can see the less lag and bugy in compare to kali linux.It is freely available for both architactures (32 bit or 64 bit).

Parrotsec vs kali linux which one is Best?

As i said in the begenning that it is very difficult to tell you what is better one for you.

Yes but i can tell you some intresting things about them so you will easily know which one is perfect for your pc.Both the os are same but in parrot os you will have some spacial feature in compare to kali linux.But you can install these extra feature in kali also but manualy one by one.Kali linux have not  some feature bydefault but parrot have for example wifiphisher is installed bydefault in parrot but not in kali linux.So many of these types of tool are not available in kali linux,you need to install these tools manualy in kali linux.

But if you want to know which one i reccomend you then my choice is kali linux because i m using this operating system from long time and i have some exeperiance about kali.But both the operating system have same terminal windows which is useful for executing commands line.

So if you are planning to install a hacker operating system then install kali in vmware player because it is simple to use.But the best thing is less hardware resources used by parrotsec os in compare to kali linux or other os that's why Parrotsec is faster and smoother then kali .
And if you want some more advance feature then you can install parrot security system.

Parrot have almost 100+ more tools then kali linux.So i suggest you use one operating system either kali or parrot but don't use both the operating system at the same time because you will get confused so better is choose one from them.And its true both are perfect for a learner who want to learn penetration or become ethical hacker.

So friends this is the simple post for latter i'll provide you how to install parrot security system in you computer .If you like this post please share it with your friends.Now this is your turn tell me which one is perfect for you either parrot or kali.

Download Mobile Friendly Facebook Phishing Page For Android And iPhone Users 2017

Hello guys hope you are doing good.Now my today's topic is how you can make mobile friendly facebook phishing page,so whenever your victim will open that page via going to your phishing link ,a mobile responsive phishing page will open which look like same as new mobile version of facebook login page.

First i'll teach you how to create phishing page for android and iphone users and in the end of the article i also provide you a direct download  link so you could easily download it with in a second.

How to get mobile friendly facebook login page source code and make phishing page from it?

Now follow below given step by step process for making your phishing page mobile friendly which is very useful for them who want to hack facebook account of a android mobile or iphone mobile user.

Step:1) Very first open your chrome browser on your mobile phone.

Step:2) After that go to via mobile browser

Step:3) Now you will see the facebook login page.

Step:4) Simply click on the url box and here you need to edit the url link so simply add view-source: in the begenning of the url.


Step:5) As you modify the url you'll see the full source code of mobile friendly facebook login page.
Note: So you can get any websites source code in mobile phone by adding same view-source:  before the actual link of any website.
Step:6) Now Simply copy all the code from their and send that source code to your computer and paste it on notepad any how.And save it with the  name index.htm

Note: I hope you already familiar about how to edit the phishing page and make it work full by modifying some text after the action parameter.If you don't know please read this post how to hack fb via phishing method so you'll get basic idea about how actually phishing attack works.

That's it friends this is the simple post for making phishing page for smartphone users.I hope you liked this post please share it with your friends too.

What Is Honeypot And How To Setup Honeypot in Kali Linux ? You Can Hack The Hacker And Make Your Company HackingProof 2017

Note: The information which provided here is only for educational purpose.
This article is very important for those people who want to hack the hacker.Every hacker in all over the world want to hide their identity any how?So they never compromise with their identity but in this post we learn how you can reveal the identity of a hacker using Honeypot setup.

Actually honeypot setup is a trap by which one can easily know the actual ip and location of the hacker.So in this post i'll try to provide you every peas of information about how you can setup your own honeypot system using kali linux operating system.

Advance Hacking Articles:
1. How to Generate undetectable payload or backdoor for hacking windows and android ?
2. How To perform Man in the middle attack and hack facebook or any account?
3. What is FatRat tool and how to set it up in kali linux? 
Many big companies always prefer to use a smart honeypot in its organization because they don't want to compromise.Because of honeypot setup the owner of the company will easily know about the activity of the hacker later you know how is this possible? don't worry and don't confused.

Types of Honeypot?

Based on deployment honeypot may be classified as :

1. Production honeypot (For getting less information of the hacker)
2.Research honeypot (for getting full detail of the hacker,It have many feature to expose a hacker)

Based on the design criteria honeypot can be classified as:
1. Pure honeypot
2. High-interaction honeypot
3. Low-interaction honeypot
Here my motive is to see the basic setup of honeypot so i'll not provide you full information about these types of honeypot listed above.

What Type Of Information Of The Hacker You Can Hack?

You can know the following information of the hacker or anyone (Not only the hacker but also a normal person).

1. His ip address (may be static or dynamic)
2. The detail of his operating system.
3. web browser which he used
4. which port, hacker use to attack on your system.
And many more ...
So now see all the thing with the help of step by step process.

How To Set It Up Honeypot On Kali Linux Very Easily?

You need to follow below given steps as it is I provide.

Step:1) Very first before setup honeypot on your system you need to download and install a tool called pentbox-1.8  on your kali by simply using this command git clone

Note: Here in above command the url is the location of pentbox tool,i think you know about this step how to download anything from github site directly from kali os.

Step:2) And after downloading the tool simply execute this command cd pentbox-1.8/ and after that give this command Ls for going to the pentbox folder.

Step:3) Now you'll see a ruby script called pentbox.rb ,and you need to execute this script by entering this command ./pentbox.rb and press enter button. 

Step:4) Now some options will come here you need to choose option no. 2 which is network tools.So type the no. 2 and press enter button.

Step:5) After that again some option you'll see simply choose option no. 3 which is honeypot.So type no. 3 in terminal and press enter button.

Step:6) Now Here you'll need to choose a option two options (Auto configuration and second one is manual configuration.

Step:7) So Choose any one of them according to your need but here i m choosing auto configuration mode.
Note:If you want to choose manual configuration option then you can ,in manual configuration you can choose any port no. which you want to use to know the information of hacker ,suppose if hacker identify in your computer that your port no. 4444 is free for malware attack or some other attacks then obviously hacker use that port for entering in your system but they don't know you have already set up the honeypot hahahaha.
Step:8) So for auto configuration enter 1 and you'll see that the honeypot will start on port no. 80 or anything which can active for monitor your system.

Step:9) Now for checking that honeypot set up working or not simply copy your ip address by executing ifconfig command and enter that ip in any of your web browser and press enter.So after entering the ip address go towards the terminal windows and here now you'll see the full detail of the hacker.

Advance Hacking Articles:

If you want to know the actual ip of the victim or the hacker so you just need to make your ip static and send it to anyone if someone click on that link all his information automatically copied in your system in log format.If you can make your ip static then trace anyone all over the worlds with this simple honeypot method.

So guys this is the basic set up of any honeypot solution.In my next post i'll tell you the advance setup of this tool.If you like this post please share it with your friends or simply socialize it if you can.Thank you...