Jump to content

taiyed14

Active Members
  • Posts

    252
  • Joined

  • Last visited

Everything posted by taiyed14

  1. You just want to make sure you wireless card's chipset is supported in Linux and if it is able to be put into monitor mode. #iwconfig wlan0 mode monitor AirPCAP is just an external wireless adapter with special drivers to allow for monitor mode. This package, I believe, is the only way to put a card into monitor mode in Windows
  2. For all interested parties Engadget has the news. http://www.engadget.com/2009/07/14/fonera-...shared-storage/ -Wireless N standard -USB Hub -Ability to upload or download files to a slew of social media sites -Convert 3G cell service (USB Dongle) to Wifi
  3. The easiest way to way to get a wifi card into monitor mode is in Linux. (for windows google AirPCAP) Your card's chipset must support it and you have to have linux drivers that support it (google YOUR CARD chipset) or (google YOUR CARD linux) after you have that all set up and working, you can use wireshark to capture the traffic. you'll need to enter the wireless key into wireshark (if there is one) so it can decrypt the packets.
  4. On a switched network you will only see broadcast, mulitcast, and traffic destined for your hardware address (there is one more type, but i don't remember it). On a switched network (yes wireless routers are switched networks) you needs to either a) set up a network tap or b. use a man-in-the-middle attack to see all network traffic. c) put your wireless card into monitor mode and sniff all wireless traffic.. More detail follows. a) you can use a hub. connect target, your computer and the switch all to the hub. The biggest limitations to this is that a true hub is hard to come by these days. You could purchase a network tap from a company like www.netoptics.com. b. tools like ettercap, sslstrip, the middler, cain are great software approaches at MitM attacks. Jasager/Karma or just a correctly configured rouge AP are for wireless MitM attacks c) if you know the encryption key, or its an open wifi point, you can capture any traffic on a particular channel just by setting your wifi card into a listen only mode (monitor mode). Capture the data and then analyze it offline.
  5. here you go. network root@fonzie:~# cat /etc/config/network config 'interface' 'loopback' option 'ifname' 'lo' option 'proto' 'static' option 'ipaddr' '127.0.0.1' option 'netmask' '255.0.0.0' config 'interface' 'lan' option 'type' 'bridge' option 'proto' 'static' option 'ipaddr' '10.0.3.1' option 'netmask' '255.255.255.0' option 'ifname' 'eth0.0' option 'dns' '208.67.220.220' config 'interface' 'wan' option 'ifname' 'eth0.1' option 'proto' 'dhcp' #option 'proto' 'static' #option 'ipaddr' '192.168.0.250' #option 'netmask' '255.255.255.0' #option 'dns' '208.67.220.220' dhcp root@fonzie:~# cat /etc/config/dhcp config 'dnsmasq' option 'domainneeded' '1' option 'boguspriv' '1' option 'filterwin2k' '0' option 'localise_queries' '1' option 'local' '/lan/' option 'domain' 'lan' option 'expandhosts' '1' option 'nonegcache' '0' option 'authoritative' '1' option 'readethers' '1' option 'leasefile' '/tmp/dhcp.leases' option 'resolvfile' '/tmp/resolv.conf.auto' config 'dhcp' 'lan' option 'interface' 'lan' option 'start' '10' option 'limit' '49' option 'leasetime' '8m' list 'dhcp_option' '3,10.0.3.254' config 'dhcp' 'wan' option 'interface' 'wan' option 'ignore' '1'
  6. why didnt she buy it with Windows?
  7. reflash. you'll be back up and running in 40 mins.
  8. mubix at room362.com post links to some blogs a while back
  9. unetbootin http://unetbootin.sourceforge.net/ that is exactly what this program does. Don't worry about selecting a distro, just select the iso file and the drive you want to put it on. press start. get yourself a 'Mountain Dew Gamer Fuel', reboot and away you go.
  10. unetbootin http://unetbootin.sourceforge.net/
  11. Found a solution. Need to add some dnsmasq dhcp options uci a dd_list dhcp.lan.dhcp_option="3,192.168.200.3" uci commit dhcp #/ect/init.d/dnsmasq restart will advertise the gateway as 192.168.200.3 thru DHCP same as adding this to /etc/config/dhcp config dhcp lan list 'dhcp_option' '3,192.168.200.3' sources: http://forum.openwrt.org/viewtopic.php?id=17316 http://www.thekelleys.org.uk/dnsmasq/docs/dnsmasq-man.html <- read -O switch section
  12. -2nd place Midwest Collegiate Cyber Defense Competition (2009) -BS degree
  13. have you checked out DD-WRT? As I understand it, that firmware allows you to use the linksys router as a wireless client/extender off another access point.
  14. thanks for all the input. really is quite helpful.
  15. a kismet server is running on port 3501. the packets will never getting forward to the WAN. My gateway is on the LAN. I want the clients to send the packets to the fon (10.0.0.1) which then forwards them to the gateway (10.0.0.200)
  16. hmm. my firewall.user config is quite different than yours I'm running Piranha firmware # This file is interpreted as shell script. # Put your custom iptables rules here, they will # be executed with each firewall (re-)start. ## -- kismet-drone iptables -t nat -A prerouting_wan -p tcp --dport 3501 -j ACCEPT iptables -A input_wan -p tcp --dport 3501 -j ACCEPT
  17. interceptor is a network tap pineapple is an evil access point.
  18. Does anyone have any information about how easy is it to run linux tools on a mac? Can the be compiled from source for osx?
  19. I am trying to solve this issue and would like any suggestions. I have a Fon+ configured as the LAN's DHCP server and AP. My Internet gateway (10.0.0.200/8) is another devices on the LAN. The Fon (10.0.0.1/8) can access the Internet but the clients connected to it wireless cannot access the internet. while typing up this topic i realized what i was doing wrong. I need to set the client gateway to 10.0.0.200/8. my question now is, can i tell the Fon to give the clients a default gw of 10.0.0.200 with dnsmasq or some other way? OR is it possible to let the clients get a gw of 10.0.0.1 and have the fon route the traffic to its (the correct) gw?
  20. nobody is generic default *nix users. leave it alone. no the cat command is nothing like using a | (pipe command). Pipe does what it sounds like it should do, pipes the output of one command into another.
  21. -Try command cat /etc/passwd |grep /home -The password file? Try command locate shadow. I'll assume you mean the /etc/shadow file. Contains all users and hashed passwords, think SAM file in windows. -Try command man cat. concatenation, and viewing files. ie: cat /etc/passwd - Try command rm -R /tmp/* when starting out with Linux, I've found that Google is your best friend, far quicker and better answers then a forum. also check out the book Linux Pocket Guide.
  22. sounds like you're doing the stalking.
×
×
  • Create New...