Jump to content

i8igmac

Dedicated Members
  • Content Count

    924
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by i8igmac

  1. Most data recovery i run into is with pictures. Ive lost photos of my kids on three occasions before i setup my own cloud desktop running raid5 and 3 hard drives minimum. Even to pretect from spontaneous situations like the weather may cause incredible spikes. I install a over current protection device on my desktop circuit. On a live USB, I have Linux Mint and Kali on a few USB devices. If you need to install recovery software it will only take a second to have what ever you need from a live os. `Apt-cache search File | grep recovery` I also like to search my Repository for keyword searches. Example above There are live operating systems designed for file recovery. they offer the same tools kali may already have or already exist in the repo. Do the research and decide what tool suits your needs, Google Linux file recovery tools. That's your first place to start. Then document here what you did and how you did it. What tools you used and how you installed them or what operating system you use. It's almost like writing yourself an instructional tutorial, for when 5 years down the road, you have to perform these procedures again. That's how I learneded everything I know.
  2. I'm running hostapd, dnsmasq, iptable rules and ip forwarding. been running for years with out any issues. I shut down all networking services. WPA_supplicant networking network-manager I assume this is running on a computer or labtop? this error with the adapter, when it happens check dmesg to see what other errors are reported. could check for firmware updates. I would start off with a basic config. see if you can get a open wifi hotspot to work properly. then you can incorporate encryption and performance options. (from a glance your config looks fine) you mention nothing about dnsmasq or iptable. I can post my full configuration. possibly tonight. there are other config files involved, your not giving enough information. my guess is the client can't establish a ip with the host. so a dnsmasq config is needed with also running ifconfig <DEVICE> up 192.168.69.1
  3. it was pre installed on backtrack 3 if I remember. see how much information you can gather... read and watch tutorials
  4. I think the tool is called metagoofil. its a advanced search google gui that will scrape information together in a nice organized way. install it on kali. test it out
  5. the devices you are deauthing are updated and wont connect to the spoofed hotspot.
  6. I run a desktop at home. Linux mint with all my favorite tools like metasploit and ports cinfigurednto accept reverse tcp oayloads on port 4444. Your looking to get a device on a network and then launch post exploitation modules or a better term is pivot your exploits onto the network. The device you place on the network could be anything like a android phone, raspberry pi, bash bunny, network turtle or any device that can run meterpreter_reverse_tcp. Long story short, you have a device on the target network, install meterpreter on your device and connect back to your metasploit desktop at home. meterpreter already has pivot functionality that would allow your desktop to launch exploits like autopwn onto the target network using your bash-bunny-meterpreter as a tcp pivot point. DESKTOP-> (Exploit-code:445)-> bashbunny Bashbunny-(exploit-code:445)-> [node-10.0.0.105] [Node-10.0.0.105]->(payload-shell:4444)-> DESKTOP the point of this, your little devices trying to run metasploit is like a slug racing a rabbit... its just not practical. The performance gains of simply using your turtle as a tcp relay point are huge.
  7. Ill suggest trying burp suit, connect your browser to burps proxy and accept the agent. If your trying to sidejack traffic. It seems doable. at some point you should be able to make the system think you are already a authenticated machine. burp will give you the best control and view of each header and the ability to modify the header. A controlled test environment.
  8. share with ethernet or wifi. How does your linux machine connect to the network Dnsmasq and some ip tables will do it with eth0 Same concept with wifi but u would need hostapd to broadcast wifi.
  9. I doubt its a driver issue with kali. Its fully loaded with wifi adapter firmware. But I guess upgrade for fun. maybe a virtual box driver issue, check for updates. My opinion, a bootable kali usb or dual boot with internal ssd. Try other wifi adapters. Install kali. Change to gnome-shell and its a slick operating system... Or I run linux mint19 on all my machines and I just install all thools I want from kali
  10. https://youtu.be/qwZsCRcUsFA
  11. I have been messing with some ram tweaks. If you had 30 gigs free of ram. Your system can boot to ram with the remaining 2 gigs. Store a 30 gig wordlist in ram, run it in hashcat64.bin... I only have a machine with 8gigs of ram. Ill run some performance test on my machines. A kali or linuxmint bootable usb stick with the boot parameter 'toram'
  12. Lol I like him. cpanel suports basic Authentication on its login page. I forget what port it is. 2082 maybe. there are default firewall rules. You will need a socks5 proxylist. If you alternate each ip addressys between each login attempt, you can slide past the firewall. Proxychains wget http:/sitedomain:2082/ --USER=admin --PASSWORD=passw0rd1 proxychains can be configured to alternate socks5 proxies. I installed cpanle in a vm and tested the default firewall rules. If your serious, install the OS in a vm and build a brute force tool. Study the systems default firewall rules. And document what you find or the tools you build. You can even brute force usenames. the server will respond with user exist or not. The most fun I had on my laptop was doing what was said above. Building tools and watching them work with successful results at the maximum speed capable. Ill post a video soon. Um. I already have a cpan video. Let me find it.
  13. yah the pipe lol. Wpatools Has a lot of eordlist for default routers like netgear. 1800 numbers also is a default set by the isp I would suggest phone numbers and 1800 numbers first for a quick check.
  14. After recently discovering the admin of the wifi I've acquired have changed the default gateway password. I typically hosts my web servers from my personal machines. if I can't find a free. Web hosting service that supports ruby on rails, then ill have to acquire machines that are currently apart of the bot net with root access and port forwarding capabilities that with some pipes ill be forced to demon eyes a bunch of reverse TCP proxies. rofl. Um any hosting suggestions.
  15. Has any one tried wpatools. I had some success with this word list.. The most success I had was with crunch and phone numbers. Old people use there phone for wifi passwords Crunch 10 10 -t 253%%%%%%% | hashcat64.bin 2500 out.hccap Ill make a video of the process this weekend. The hole process, starting from capturing a handshake, gpu cracking, manual configuration of wpa_supplicant config, authenticate with wpa_cli using the passphrase and then a failed attempt to brute force the router admin page...
  16. I forgot there was v4 last night I captured some handshakes and converted to hccapx with hashcat-utils. wordlist suggestions. Phone numbers with crunch I have success before. ill make a mobile raspPi wps-pin-brute/handshake-grabber. A multithreaded automated solution.
  17. with mdk3 ill run some test maybe tonight to see what router models can be forced to reboot and unlock the wps pin module to allow for further progress of pin attempts... im excited to post some example code and explanation of my techniques.
  18. its been a while since i have messed around, but the time has come that i document what im doing... wash reaver wps pin attacks deauth and capture handshakes hashcat gpu cracking wpa word list's 'couch potato 123' comcast word generator type of password attacks that are router specific. wifi antennas 2.4 ghz and 5.8ghz it looks like nonsense but ill do some automation in my favorite language (ruby) ill do some multi threaded task like clock work to automate almost the hole process. ill start with small simple snippets. if people want to make comments on techniques that have worked for them that are related to wifi cracking/reaver/gpu-cracking. please for example post your reaver commands. if any one has seen mdk3 attacks work to reset routers, make comments on this as well.
  19. Nothing to worry about unless your looking at porn in the bathroom lol... he will only see http like advertisement... everything is secure...
  20. Linux mint 19 running on all my machines. My asus chromebook boots mint19 gnome shell all in ram for a supper snappy experience.
  21. Mdk3 has good deauth attacks.
  22. I also have it on my router... build your self a thin mini itx linux router... I have dual wifi chips, both atheros to support most all wifi attacks, 4 gigs ram, ssd drive lubuntu installed and 4 cores. I run rails websever, ssh, vnc, ftp, squid socks proxy, anything you throw at this machine it will handle it. Some If you have spent enough time with wifi attacks then creating a hotspot and some ip tables to masquerade eth0 <-> wlan0-1 This should be a simple enough task, or run a vm with open wrt. you could manage to keep the price under 150$
  23. I run metasploit from my desktop then ssh to the machine for access.
  24. Learn a few registry keys and othere methods to start a program at startup. Knowing thses locAtions you can effectively remove infections on othere people's computer.
×
×
  • Create New...