Atlantis

Members
  • Content Count

    572
  • Last visited

Community Reputation

143 Excellent

1 Follower

About Atlantis

  • Rank
    Friendly

Converted

  • Discord
    Atlantis#1523

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. [hide]https://anonfile.com/Lbh1ge09n4/gmail.com_79080_txt[/hide] I appreciate a like! Leechers will get reported and banned! :fyou:
  2. [hide]https://anonfile.com/W7RaMay6n1/Gmail_Hacking_guide_pdf[/hide] Leechers will get reported and banned Leave a like!
  3. [hide]Step 1 : Make Sure You Have Everything To prepare our evil twin access point attack, we'll need to be using Kali Linux or another supported distro. Quite a few distributions are supported, and you can check out the Airgeddon GitHub page for more about which Airgeddon will work with. You can use a Raspberry Pi running Kali Linux for this with a wireless network adapter, Finally, you'll need a good wireless network adapter for this. In our tests, I found that the TP-Link WN722N v1 and Panda Wireless PAU07 cards performed well with these attacks. You can find more information On Google [ Search for best EXT Wifi Adapter for Hacking]. Step 2 - Install Airgeddon To start using the Airgeddon wireless attack framework, we'll need to download Airgeddon and any needed programs. The developer also recommends downloading and installing a tool called CCZE to make the output easier to understand. You can do so by typing apt-get install ccze a terminal window. Next, we'll install Airgeddon, change directories, and start Airgeddon with the following commands. If you see the alien spaceship, you know you're ready to hack. Step 3 - Configure Airgeddon Press enter to check the various tools the Airgeddon framework relies on. If you're missing any, you can open a new terminal window and type apt-get install tool, substituting "tool" for the name of the missing tool. If that doesn't work, you can also try sudo pip install tool. When you have all of the tools, proceed to the next step by pressing return. Otherwise, you may experience problems during your attack, especially if you are missing dnsspoof. Next, the script will check for internet access so it can update itself if a newer version exists. When this is done, press enter to select the network adapter to use. After we select our wireless network adapter, we'll proceed to the main attack menu. Press 2 to put your wireless card into monitor mode. Next, select option 7 for the "Evil Twin attacks" menu, and you'll see the submenu for this attack module appear. Step 4 - Select Target Now that we're in our attack module, select option 9 for the "Evil Twin AP attack with a captive portal." We'll need to explore for targets, so press enter, and you'll see a window appear that shows a list of all detected networks. You'll need to wait for a little to populate a list of all the nearby networks. Step 5 -Gather the Handshake Now, we'll select the type of de-authentication attack we want to use to kick the user off their trusted network. I recommend the second option, "Deauth aireplay attack," but different attacks will work better depending on the network. Press enter once you've made your selection, and you'll be asked if you'd like to enable DoS pursuit mode, which allows you to follow the AP if it moves to another channel. You can select yes (Y) or no (N) depending on your preference, and then press enter. Finally, you'll select N for using an interface with internet access. We won't need to for this attack, and it will make our attack more portable to not need an internet source. Next, it will ask you if you want to spoof your MAC address during this attack. In this case, I chose N for "no." Now, if we don't already have a handshake for this network, we'll have to capture one now. Be VERY careful not to accidentally select Y for "Do you already have a captured Handshake file?" if you do not actually have a handshake. There is no clear way to go back in the script without restarting if you make this mistake. Since we don't yet have a handshake, type N for no, and press enter to begin capturing. Once the capture process has started, a window with red text sending deauth packets and a window with white text listening for handshakes will open. You'll need to wait until you see "WPA Handshake:" and then the BSSID address of your targeted network. In the example below, we're still waiting for a handshake. Once you see that you've got the handshake, you can exit out of the Capturing Handshakewindow. When the script asks you if you got the handshake, select Y, and save the handshake file. Next, select the location for you to write the stolen password to, and you're ready to go to the final step of configuring the phishing page. Step 6 - Set the Phishing Page In the last step before launching the attack, we'll set the language of the phishing page. The page provided by Airgeddon is pretty decent for testing out this style of attack. In this example, we'll select 1 for English. When you've made your selection, press enter, and the attack will begin with six windows opening to perform various functions of the attack simultaneously. Step 7 - Capture Network Credentials With the attack underway, the victim should be kicked off of their network and see our fake one as the only seemingly familiar option. Be patient, and pay attention to the network status in the top right window. This will tell you when a device joins the network, allowing you to see any password attempts they make when they're routed to the captive portal. When the victim joins your network, you'll see a flurry of activity like in the picture below. In the top-right corner, you'll be able to see any failed password attempts, which are checked against the handshake we gathered. This will continue until the victim inputs the correct password, and all of their internet requests (seen in the green text box) will fail until they do so. When the victim caves and finally enters the correct password, the windows will close except for the top-right window. The fake network will vanish, and the victim will be free to connect back to their trusted wireless network. The credentials should be displayed in the top-right screen, and you should copy and paste the password into a file to save, in case the script doesn't save the file correctly. This sometimes happens, so make sure not to forget this step or you might lose the password you just captured. After this, you can close the window, and close down the tool by pressing Ctrl + C. If we get a valid credential in this step, then our attack has worked, and we've got the Wi-Fi password by tricking the user into submitting it to our fake AP's phishing page![/hide] I appreciate a like! Leechers will get reported and banned!
  4. Lemme enter 11 is my number, thanks for this btw
  5. Okay I've tested all the accounts, none of them were working. And I only got 1296 accounts instead of 1500 accounts
  6. I tried it but it almost didn't work, probably because the proxy was blocked by it. Can you help me. I will look what I can do, will try to test the accounts, send me the accs in a txt file in pm
  7. Please show evidence evidence that they do not work, that's what I am asking. Create a working account put it in a combolist, if the config detects it the config is working. Then Import the udemy accounts and check them with the config. Config and OB here:https://cracked.to/Thread-Udemy-Config-with-count-and-all-course-title-capture?highlight=udemy
  8. I sent the picture above, I need a replacement but he didn't answer me. many times, what you need me to provide. ? You need to provide proof that the accounts do not work, everyone can ask for a replacement, even though the accounts do work, so you must provide proof that the accounts do not work
  9. As the title says :) Discord: Atlantis#1523
  10. I'm gonna spend the money to invest in a money making method