Description: This video is part of the Addendum created for the Wi-Fi Security Expert course and certification - http://securitytube.net/certifications . It is being released on SecurityTube as part of our open courseware initiative. Students enrolled for the SWSE will be given a lab manual which tells you how to use these videos to prepare.
In this video, we will look at how it may be possible to create Wireless Backdoors using the Hosted Network feature on Windows 7.
Please do leave your comments and queries behind.
Tags: swse , hosted-network , windows , backdoors ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
I know the voice and video (me down below) is out of sync :( saw it after the conversion finished. Hope this is not too much of pain.
hi vivek i am very curious to know that how u became a security proo...how u prepared your self, i mean how u started your career
you r the best one to answer this question
please help your student i want to see my self as a security proo.....
i don't about eh voice sync stuff ... ur Videos Are Awesome...
Cheers
zer0byte.com
Excellent as usual!!!!!
No need to aplogize for anything my friend. You can barely notice the sync issue. I joined the certification class, got my PDF version of your book and set up my lab (got 2 routers and 3 alpha cards - spares just in case) and I started yesterday setting everything and today I will be going through chapter 2 of the book.
Looking forward to formally become oone of your students. I have to tell you again that thanks to you and your wisdom my career took a turn for the better.
Also I'm waiting for the Metasploit book and megaprimer as well as the Metasploit Security Tube Certification!!!!
vivek sir, thnx for such a nice video . your videos give me a lot of satisfactions . i often watch ur 2-3 video before sleeping and get good sleep
@shivagrayhat@yahoo.com To be honest I don't like these title like "pro" … in my mind i am just doing what i love most and constantly learning. Education is not a destination but a lifelong journey. So, if you security is your passion, then the only other thing is work, work, work, …. :)
@Brav0x Thanks my friend. I was bit disappointed to see it off sync but good its not too realizable.
@esojzuir Thanks for signing up for the course my friend! I am sure we will have a good time :) I am busy writing up labs for the course takers and the final exam is sure gonna be fun :) Good to know you have already created the setup. The more variety of devices you have the better. I am releasing the Metasploit Certification this month end maybe and the book a little later. Lot of work to do :)
@jibu … Thanks! hope my videos are not putting you to sleep :)
nice!
Great!!!! Are you planning to update the Metasploit Megaprimer like the addendums for the Wireless Certification? Also are the Scenario Based Hacking and Router Hacking covered on the Metasploit Certification???
hey vivek proo means "professional"
i love the word work work.....
your doing very great job, spreading your knowledge to very one. it will helps you and others.
vivek -- I couldn't agree more on doing what you love and lifelong learning...unfortunately that doesn't pay the bills. You I think are a security "professional". Qualified by earnings or speaking at conferences. Both are true. Really, Take some credit. You earned it. Still, I get the humility.
Hello Vivek,
Thanks for the great video, it really improves our knowledge.
Thanks... Thanks... Thanks...
Holy nuts and Balls!!! What a great video Vivek! I appreciate all your hard work and the fact that you like to teach others, this world needs more people like you so we can say yes there are a few nice people left in this world who don't mind helping people they don't personally know. The Wireless coarse looks awesome too & I hope to sign up soon along with the Metasploit coarse next month : ) ! Have a great week Vivek.
sir , i have a Q . if computer has 2 or more wireless card then how will i know that the created soft AP with command is on which physical card ? in other words how i will crate a soft AP on a particular physical wireless addapter if system has 2 or more physical card ?
@in0cula @shivagrayhat@yahoo.com @Vishaljpatel1987 thanks!
@esojzuir No addendum's for Metasploit - you will get a brand new course :) all shiny and set for Season 2 :)
@Andrew thanks for the kind words my friend … :)
@n1tr0g3n_0x1d3 Thanks! Well a lot of people helped me when I was learning, this is my tribute to all those great teachers of mine :) Look forward to you joining the courses, we have cool stuff lined up in both the courses.
@jibu Good question - this should answer your question http://msdn.microsoft.com/en-us/library/windows/desktop/dd815243(v=vs.85).aspx paragraph 3
Ok guys, the next video: Malware, Metasploit and the Hosted Network has been posted for your reading pleasure:
http://www.securitytube.net/video/2275
Vivek: Thank you very much for the answer. Man you are awesome. Looking foward to the Metasploit Megaprimer, Book and Certification. I will be first in line to sign for the new cert!!!!
Hi Vivek, here is my wifi scanner based on 'netsh' Command
http://zer0byte.com/2011/10/04/zer0bytes-open-source-wifi-scanner/
Love Ur videos From heart
Regards
Bilal Bokhari
zer0byte.com
It there a torrent or a place to download the DVD or where is the link to buy one???
Nevermind this is why i should not be on my computer a 3am... Peace
Help i can't start
C:\>netsh wlan start hostednetwork
The hosted network couldn't be started.
The group or resource is not in the correct state to perform the requested opera
tion.
hi Vivek your videos have been very useful thanks alot
Hey guys I made 2 wallpapers for everyone if interested. They are for the SWSE coarse. Hope everyone likes them.
http://goo.gl/HhpSx
http://goo.gl/PBbrX
Feeel free to check out the walls at my blog as well if you like. I have about 50 BackTrack Wallpapers & most I have made on my own. Enjoy!! http://www.n1tr0g3n.com
Hi Vivek
I have a question have you tried or been able to break through a ipcop firewall or do you know of a exploit that will do the job. I ask this because i work for a network security company and my boss gave me a task to try break one of his firewalls running ipcop with basically all ports closed, banner grad fails the only way i could get past his firewall was to spoof my mac and ip but this was a way around not a way through now i cant seem to find any information on any known weaknesses with ipcop do you have any ideas? your input will be appreciated. Im relatively new to the testing of security implementations on networks and enjoy it but i cant seem to find a answer for this question so please help. PS i am aware it would also depend on the magnitude of the lock down of the firewall and applied updates and fixes but any feed back would be helpful after all nothing is 100% secure just at times alot more complicated. Thanks