Jump to content

i8igmac

Dedicated Members
  • Content Count

    923
  • Joined

  • Last visited

  • Days Won

    22

5 Followers

About i8igmac

  • Rank
    Hak5 Ninja

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. I'm running hostapd, dnsmasq, iptable rules and ip forwarding. been running for years with out any issues. I shut down all networking services. WPA_supplicant networking network-manager I assume this is running on a computer or labtop? this error with the adapter, when it happens check dmesg to see what other errors are reported. could check for firmware updates. I would start off with a basic config. see if you can get a open wifi hotspot to work properly. then you can incorporate encryption and performance options. (from a glance your config looks fine) you mention nothing about dnsmasq or iptable. I can post my full configuration. possibly tonight. there are other config files involved, your not giving enough information. my guess is the client can't establish a ip with the host. so a dnsmasq config is needed with also running ifconfig <DEVICE> up 192.168.69.1
  2. it was pre installed on backtrack 3 if I remember. see how much information you can gather... read and watch tutorials
  3. I think the tool is called metagoofil. its a advanced search google gui that will scrape information together in a nice organized way. install it on kali. test it out
  4. the devices you are deauthing are updated and wont connect to the spoofed hotspot.
  5. I run a desktop at home. Linux mint with all my favorite tools like metasploit and ports cinfigurednto accept reverse tcp oayloads on port 4444. Your looking to get a device on a network and then launch post exploitation modules or a better term is pivot your exploits onto the network. The device you place on the network could be anything like a android phone, raspberry pi, bash bunny, network turtle or any device that can run meterpreter_reverse_tcp. Long story short, you have a device on the target network, install meterpreter on your device and connect back to your metasploit desktop at home. meterpreter already has pivot functionality that would allow your desktop to launch exploits like autopwn onto the target network using your bash-bunny-meterpreter as a tcp pivot point. DESKTOP-> (Exploit-code:445)-> bashbunny Bashbunny-(exploit-code:445)-> [node-10.0.0.105] [Node-10.0.0.105]->(payload-shell:4444)-> DESKTOP the point of this, your little devices trying to run metasploit is like a slug racing a rabbit... its just not practical. The performance gains of simply using your turtle as a tcp relay point are huge.
  6. Ill suggest trying burp suit, connect your browser to burps proxy and accept the agent. If your trying to sidejack traffic. It seems doable. at some point you should be able to make the system think you are already a authenticated machine. burp will give you the best control and view of each header and the ability to modify the header. A controlled test environment.
  7. share with ethernet or wifi. How does your linux machine connect to the network Dnsmasq and some ip tables will do it with eth0 Same concept with wifi but u would need hostapd to broadcast wifi.
  8. I doubt its a driver issue with kali. Its fully loaded with wifi adapter firmware. But I guess upgrade for fun. maybe a virtual box driver issue, check for updates. My opinion, a bootable kali usb or dual boot with internal ssd. Try other wifi adapters. Install kali. Change to gnome-shell and its a slick operating system... Or I run linux mint19 on all my machines and I just install all thools I want from kali
  9. https://youtu.be/qwZsCRcUsFA
  10. I have been messing with some ram tweaks. If you had 30 gigs free of ram. Your system can boot to ram with the remaining 2 gigs. Store a 30 gig wordlist in ram, run it in hashcat64.bin... I only have a machine with 8gigs of ram. Ill run some performance test on my machines. A kali or linuxmint bootable usb stick with the boot parameter 'toram'
  11. Lol I like him. cpanel suports basic Authentication on its login page. I forget what port it is. 2082 maybe. there are default firewall rules. You will need a socks5 proxylist. If you alternate each ip addressys between each login attempt, you can slide past the firewall. Proxychains wget http:/sitedomain:2082/ --USER=admin --PASSWORD=passw0rd1 proxychains can be configured to alternate socks5 proxies. I installed cpanle in a vm and tested the default firewall rules. If your serious, install the OS in a vm and build a brute force tool. Study the systems default firewall rules. And document what you find or the tools you build. You can even brute force usenames. the server will respond with user exist or not. The most fun I had on my laptop was doing what was said above. Building tools and watching them work with successful results at the maximum speed capable. Ill post a video soon. Um. I already have a cpan video. Let me find it.
  12. yah the pipe lol. Wpatools Has a lot of eordlist for default routers like netgear. 1800 numbers also is a default set by the isp I would suggest phone numbers and 1800 numbers first for a quick check.
  13. After recently discovering the admin of the wifi I've acquired have changed the default gateway password. I typically hosts my web servers from my personal machines. if I can't find a free. Web hosting service that supports ruby on rails, then ill have to acquire machines that are currently apart of the bot net with root access and port forwarding capabilities that with some pipes ill be forced to demon eyes a bunch of reverse TCP proxies. rofl. Um any hosting suggestions.
  14. Has any one tried wpatools. I had some success with this word list.. The most success I had was with crunch and phone numbers. Old people use there phone for wifi passwords Crunch 10 10 -t 253%%%%%%% | hashcat64.bin 2500 out.hccap Ill make a video of the process this weekend. The hole process, starting from capturing a handshake, gpu cracking, manual configuration of wpa_supplicant config, authenticate with wpa_cli using the passphrase and then a failed attempt to brute force the router admin page...
  15. I forgot there was v4 last night I captured some handshakes and converted to hccapx with hashcat-utils. wordlist suggestions. Phone numbers with crunch I have success before. ill make a mobile raspPi wps-pin-brute/handshake-grabber. A multithreaded automated solution.
×
×
  • Create New...