ProCodeCG Kids Private Class – White Hacking – 15 Aug 2019

Standard

Another hard work preparation for ProCodeCG Kids Coding Exhibition in two days!

IMG_8687

We’re going to hack wifi with Kali Linux on Virtual Box

IMG_8688

and this network usb adapter is essential to enable Kali Linux to recognize a wifi network 😉

IMG_8685

while one computer start hacking

IMG_8686

Ara is starting to follow the steps, starting with setting up the hardware 😉

IMG_8689

and then installing the driver

IMG_8690

IMG_8691

enable wifi monitoring

IMG_8695

start monitoring

IMG_8696

dumping the wifi data

IMG_8697

waiting for a handshake before start hacking

IMG_8698 Screen Shot 2019-08-15 at 17.55.59

the first attempt is failed because the password is too hard 😀

Screen Shot 2019-08-15 at 16.07.15

but we got this one and get the  wifi password: password 😀 because we changed to password into something easy to guess 😀 a word that is included in the dictionary 🙂

Screen Shot 2019-08-15 at 18.00.13

IMG_8702

and then we started to hack using rainbow table

Screen Shot 2019-08-15 at 19.18.47

Screen Shot 2019-08-15 at 19.19.38

it is not yet successful but we stopped it because we already done the hacking project with dictionary attack and it is enough for the exhibition. will get back to rainbow table after the exhibition 😉

IMG_8705

the other reason is this 😀 😀 😀 after 3 straight hours hacking, Ara said he’s got backpain and went like this LOLLLLL

IMG_8706

and he still got homework to do LOLLLL

IMG_8703 IMG_8704

see you on Saturday, Ara, we’ll do live hacking 😉

IMG_8684

*Photos are also available here

ProCodeCG Kids Private Class – White Hacking – 8 Aug 2019

Standard

Preparation for 17 August ProCodeCG Kids Exhibition 🙂

The first plan is to do wifi dumping and wifi monitoring with Kali Linux
IMG_8224

we tried many ways to enable wifi on kali linux

IMG_8225

but since we running kali linux on virtual box, airmon-ng could not recognize wifi connection

IMG_8226 IMG_8227

thus could not retrieve any data from any wifi connections

IMG_8228 IMG_8229

IMG_8230

so we changed plan to password attack 😉

IMG_8231

there are still several thing to research and setup before we’re ready for exhibition 🙂

IMG_8223

ProCodeCG – Kids Private Class – White Hacking – Day #5 – 17 June 2019

Standard

The last day already 🙂 *but don’t worry Ara will still take the class regularly after this 😉

IMG_3764

Our to do list for today 😉

IMG_3765

And then Ara is installing DVWA for like the 10th times 😀

IMG_3766

it didn’t work on Ara’s laptop but worked well on the Mac

IMG_3768

this time Ara got this .php file which is a good sign

IMG_3769

got some problems with dpkg but we fixed this

IMG_3770

the point is that we’re going to make the target use a proxy that has been intercepted by BurpSuite to get the session id to be used by Hydra to crack the password 😀

IMG_3771

DVWA installation and setup success 🙂

IMG_3772

IMG_3773

now loading the BurpSuite

IMG_3774

setting up the browser to use proxy manually (directed to BurpSuite)

IMG_3775

setting up BurpSuite

IMG_3776

and cracking up password using Hydra 🙂

IMG_3778

ok all task for today is accomplished, very well done! 🙂

*Photos and videos are also available here

ProCodeCG – Kids Private Class – White Hacking – Day #4 – 13 June 2019

Standard

Day #4 of White Hacking already 🙂

IMG_3318

today we’re installing DVWA on Kali Linux 🙂

IMG_3327

IMG_3320

there are zillion of things we have to do and zillion of errors we have to fix 😀

IMG_3321

also modifying some codes in some files

IMG_3323

registering recaptcha and so on

IMG_3324

until finally we can get to this login page 😀

IMG_3325

and ready to do penetration test with DVWA 😀

IMG_3326

IMG_3328

we’ll save the attack for the next class 😉

IMG_3317

*Photos and videos are also available here

ProCodeCG – Kids Private Class – White Hacking – Day #3 – 12 June 2019

Standard

Day #3 of White Hacking, we’re going to review the tools we have learn before, compare it with other tools and combine all to make analysis 😀

nmap

IMG_3191

IMG_3195

IMG_3196

IMG_3200

Angry IP

IMG_3192

checking the connection

IMG_3193

Zenmap

IMG_3194

Nikto

IMG_3197

Sparta

IMG_3201 IMG_3202

IMG_3203 IMG_3204

BruteSploit

IMG_3205 IMG_3206

IMG_3207

Some notes from today’s adventure 😀 We’ve gone and explored many places 😉

IMG_3208

We will explore more in the next class 😉

*Photos and videos are also available here

ProCodeCG – Kids Private Class – White Hacking – Day #2 – 11 June 2019

Standard

Today we are installing Nessus and will do some vulnerability scanning on Kali Linux 🙂

IMG_3105

Downloading Nessus

IMG_3106

unzipping the installer file

IMG_3107

figuring out why dpkg is not working

IMG_3109

now successfully unpacking

IMG_3110

and ready to start Nessus 😉

IMG_3112

IMG_3113

creating account and asking for serial number

IMG_3114

took some time for initialization

IMG_3115

on Mac there’s no problem with dpkg

IMG_3118

initialization in the process

IMG_3119 IMG_3120

we did some nmap-ing to, comparing Ubuntu Backbox with Kali Linux

IMG_3121 IMG_3122

IMG_3123 IMG_3124

IMG_3125 IMG_3126

and did some Etherape-ing too 🙂

IMG_3127

we tried to do some Man In The Middle Attack but we need to install Python and virtual environment on Ara’s laptop so we’re going to do it tomorrow

IMG_3128

IMG_3129

Nessus is ready

IMG_3130

The result (there’s only one other computer in the network LOL)

IMG_3131 IMG_3132

IMG_3133

Testing Angry IP and it looks way more interesting than nmap 😀

IMG_3134

We’re going to do Burp tomorrow 🙂

*Photos and videos are also available here

ProCodeCG – Kids Private Class – White Hacking – Day #1 – 10 June 2019

Standard

The first ProCodeCG White Hacking Private Class ever 🙂 We have been teaching ethical hacking to kids but not yet seriously planned like this.

ProCodeCG will certainly add White Hacking Curriculum from now since we’ve been more convinced that this is an urgent topic to be taught to kids 🙂

Ara has been interested in learning hacking, so somebody has to show him the right way 😀

IMG_3016

We’re going to try number 2 and number 3 today 🙂

IMG_3017

We are doing 2 and 3 in parallel; making bootable usb while also downloading virtual machine

IMG_3018

Ara’s laptop is already has dual-boot Ubuntu BackBox and Windows 10 so we have to skip GRUB to be able to enter BIOS because we have to enable some option to make virtual box install Kali Linux

IMG_3019

IMG_3020

We found out that we had to install different Kali Linux version so we decided to explore Ubuntu BackBox while waiting for the download. But Ara forgot the password so we had to reset it 😀

IMG_3022

IMG_3023

the password cannot be reset so we have to find ways around

IMG_3024

and finally after we have changed the password and enter Ubuntu, we started to explore nmap 😉

IMG_3025 IMG_3026

IMG_3027 IMG_3028

IMG_3029 IMG_3030

IMG_3031 IMG_3032

IMG_3033

we also checked the network with EtherApe 😉

IMG_3034

IMG_3035 IMG_3036

IMG_3037 IMG_3038

IMG_3039

things among many things we’ve learned today

IMG_3040

Ara has been given load of homework to be reported in tomorrow’s class 😉

IMG_3041

*Photos and videos are also available here