Jump to content

i8igmac

Dedicated Members
  • Content Count

    916
  • Joined

  • Last visited

  • Days Won

    22

4 Followers

About i8igmac

  • Rank
    Hak5 Ninja

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. I doubt its a driver issue with kali. Its fully loaded with wifi adapter firmware. But I guess upgrade for fun. maybe a virtual box driver issue, check for updates. My opinion, a bootable kali usb or dual boot with internal ssd. Try other wifi adapters. Install kali. Change to gnome-shell and its a slick operating system... Or I run linux mint19 on all my machines and I just install all thools I want from kali
  2. You would have to reverse engineer one your self. I made one for warcraft 3. I had to connect with a username and hold a ping with its protocol. once I connected ten clients to the server it would max out the connections, start the game and rehost a new one and I would connect ten more on a never ending loop. depending on the authentication or cd key register will be the key factor. I would distribute these connections across a pool of socks5 proxies
  3. https://youtu.be/qwZsCRcUsFA
  4. I have been messing with some ram tweaks. If you had 30 gigs free of ram. Your system can boot to ram with the remaining 2 gigs. Store a 30 gig wordlist in ram, run it in hashcat64.bin... I only have a machine with 8gigs of ram. Ill run some performance test on my machines. A kali or linuxmint bootable usb stick with the boot parameter 'toram'
  5. Lol I like him. cpanel suports basic Authentication on its login page. I forget what port it is. 2082 maybe. there are default firewall rules. You will need a socks5 proxylist. If you alternate each ip addressys between each login attempt, you can slide past the firewall. Proxychains wget http:/sitedomain:2082/ --USER=admin --PASSWORD=passw0rd1 proxychains can be configured to alternate socks5 proxies. I installed cpanle in a vm and tested the default firewall rules. If your serious, install the OS in a vm and build a brute force tool. Study the systems default firewall rules. And document what you find or the tools you build. You can even brute force usenames. the server will respond with user exist or not. The most fun I had on my laptop was doing what was said above. Building tools and watching them work with successful results at the maximum speed capable. Ill post a video soon. Um. I already have a cpan video. Let me find it.
  6. yah the pipe lol. Wpatools Has a lot of eordlist for default routers like netgear. 1800 numbers also is a default set by the isp I would suggest phone numbers and 1800 numbers first for a quick check.
  7. After recently discovering the admin of the wifi I've acquired have changed the default gateway password. I typically hosts my web servers from my personal machines. if I can't find a free. Web hosting service that supports ruby on rails, then ill have to acquire machines that are currently apart of the bot net with root access and port forwarding capabilities that with some pipes ill be forced to demon eyes a bunch of reverse TCP proxies. rofl. Um any hosting suggestions.
  8. Has any one tried wpatools. I had some success with this word list.. The most success I had was with crunch and phone numbers. Old people use there phone for wifi passwords Crunch 10 10 -t 253%%%%%%% | hashcat64.bin 2500 out.hccap Ill make a video of the process this weekend. The hole process, starting from capturing a handshake, gpu cracking, manual configuration of wpa_supplicant config, authenticate with wpa_cli using the passphrase and then a failed attempt to brute force the router admin page...
  9. I forgot there was v4 last night I captured some handshakes and converted to hccapx with hashcat-utils. wordlist suggestions. Phone numbers with crunch I have success before. ill make a mobile raspPi wps-pin-brute/handshake-grabber. A multithreaded automated solution.
  10. with mdk3 ill run some test maybe tonight to see what router models can be forced to reboot and unlock the wps pin module to allow for further progress of pin attempts... im excited to post some example code and explanation of my techniques.
  11. its been a while since i have messed around, but the time has come that i document what im doing... wash reaver wps pin attacks deauth and capture handshakes hashcat gpu cracking wpa word list's 'couch potato 123' comcast word generator type of password attacks that are router specific. wifi antennas 2.4 ghz and 5.8ghz it looks like nonsense but ill do some automation in my favorite language (ruby) ill do some multi threaded task like clock work to automate almost the hole process. ill start with small simple snippets. if people want to make comments on techniques that have worked for them that are related to wifi cracking/reaver/gpu-cracking. please for example post your reaver commands. if any one has seen mdk3 attacks work to reset routers, make comments on this as well.
  12. Nothing to worry about unless your looking at porn in the bathroom lol... he will only see http like advertisement... everything is secure...
  13. Linux mint 19 running on all my machines. My asus chromebook boots mint19 gnome shell all in ram for a supper snappy experience.
  14. Mdk3 has good deauth attacks.
  15. I also have it on my router... build your self a thin mini itx linux router... I have dual wifi chips, both atheros to support most all wifi attacks, 4 gigs ram, ssd drive lubuntu installed and 4 cores. I run rails websever, ssh, vnc, ftp, squid socks proxy, anything you throw at this machine it will handle it. Some If you have spent enough time with wifi attacks then creating a hotspot and some ip tables to masquerade eth0 <-> wlan0-1 This should be a simple enough task, or run a vm with open wrt. you could manage to keep the price under 150$
×
×
  • Create New...