Jump to content

i8igmac

Dedicated Members
  • Posts

    939
  • Joined

  • Last visited

  • Days Won

    22

Posts posted by i8igmac

  1. this wont be hard to do as a ugly dirty function... no live streaming. A simple upload and execute. Nothing fancy.  don't allow duplicate cracking  processes to start or your system will crash...

     

    a more practical approach and safer route. make the upload forum.php then login to ssh and start a screen session. With screen running you can start a background process of hashcat, disconnect and reconnect at later times to view the progress.

     

    I'm working on this type of web interface with live streaming of console based applications like reaver or aircrack and Automation of WPA_supplicant. Its a lot of work and many complicated situations to overcome. I'm using ruby on rails.

  2.  

    Another addiction I had was building a autoit aimbot. This was simply a test video. testing the performance while recording the screen at 30fps, playing a blue ray, running cs1.6 and also running the aimbot.

     

    This aimbot scans the screen for a specific color then moves the mouse to that location. Its Very gpu demanding and this desktop performed very well.

     

    [Auto FIRE]

    when the color is found, the mouse moves to the location and burst 3 rounds, pulls down on the mouse for a bit of anti recoil and then sleeps for 3 seconds.

     

    shift key and left mouse button also have a few Auto fire functions of there own. 

     

    The color shades that are scanning for are 15 different shades in the smoke, during flash bang, in the dark and in the light. this was important for good results.

     

    I should have recorded this with sound... sorry.

  3. grep'able logs. 

    Cat the log file for specific strings.

     

    Edit... my best method is to import the xml file to metasploit then you can use msf search options. Way clean and organized. I have a video where I did this import and configured a exploit on a large list of ip's:8080

  4. On 6/14/2018 at 8:50 AM, aciighost said:

    So about 10 months ago i started learning pen testing and not like being a hacker or anon or mr robot type but like a decent security analyst since i am a 2nd year software engineer with some weakness in the field of programming which i am  trying to improve;

    main story is that i took an online course to learn ethical hacking but the course was designed in 2015 and i took it in 2017 and  80% of those hacks are obsolete(even day by day) but respecting the fact that i am able to now work 90% of my work around those  pen testing tools on my own but i feel really upset for the fact that i am making those exploits from the old 2015 course work 5x faster and more efficient using the help of github i know its not right but i am still really far behind so i want to know from you the top security analysts that is at times using github to work efficiently with your pen testing a helpful way to start? sure as time will pass i am starting to develop my own exploits like a keylogger which i have recently developed on my own.

    is it a good way to start from github and then develop using my own ignoring what i have learned which is now useless since everything gets patched daily

     

    I made a script kiddy video. Its a technique that is my goto first method. I find good success when this method is suited.

     

    Ill make a new thread with simplified example code.

    • Like 1
  5. 1 hour ago, bolus said:

    @i8igmac-  you've cracked it!  Added the sleep command and it's working a treat now.  thank you for your assistance and suggestions, really appreciate it

    I have experience this same thing. When I made my reaver drop box.

     

    I think its the lack of cpu power, the time it takes to start up all the services is extremely slow. If netcat launches before your wlan is Up and configured then netcat will pop a error 'device not up'

     

    Glad it worked for you.

    • Like 1
  6. 20 hours ago, bolus said:

    Thanks for the quick suggestion @i8igmac - appreciate it.

    Unfortunately, that's not worked.  I've edited /etc/rc.local and added

    
    netcat  192.168.1.215 443 -w 10

    On reboot - nothing.  If I run the command stand alone, it connects fine, so I've ruled out a connectivity issue there.

    Could it be anything to do with the user that the pi boots with?  I've tried adding sudo in front of the netcat command - nothing.

    any suggestions from you guys is appreciated 

    I hope you try what I suggested above to confirm what I suspect is happening.

     

    You should also try this. pipe the netcat data to a file to see if there is a error logged. With out the 'sleep 15'

     

    netcat 192.168.69.1 -w 10 > /tmp/nc.log

    exit 0

    • Like 1
  7. 7 hours ago, Dave-ee Jones said:

    Do you WiFi hotspot often from your phone? 9/10 the phone can only make a 2.4 GHz WiFi hotspot and I've never had problems with it. Mind you, at the moment it's set to 5 GHz because OP phone (pun intended - not everyone will get it, though).

    Also, my old PCIe WiFi adapter was 2.4 GHz only and that never faltered.

    I would look at your most-likely-DIY setup or your source of WiFi ? Could also be channel interference. 

    It is exactly interference. The source is a combination of things in the neighborhood, also more noticeable with the amount of range involved.

     

    but again. 5.8ghz brings me a solid long range stable 40mb per second. both radios operate in different frequency. the device is in fact broadcasting 2.4ghz  from device1 ? and 5.8ghz blows right threw all the nearby congested airwaves.

     

  8. I did some skiddy stuff this weekend. Got some real quick results. If I get some free time ill post a video tutorial and the ruby code.

     

    Ill show the steps I took. Starting with a empty text file ill write a small amount of code to produce a skiddy but powerful web exploit tool using applications already available.

     

    ill show a technique I learned by following a hacker by the name of mulciber. Ten years ago I watched him root hackforums dot net.

  9. On 6/12/2018 at 4:57 AM, haze1434 said:

    You're committing a bit of an anecdotal fallacy there.

    Actually physics will confirm you're incorrect. 2.4ghz will always reach further than 5ghz, as per the wavelength. It will also always punch through objects better, as per the wavelengths.

    Potentially, yes, it can lose more packets than 5ghz, due to the nature of longer distances equalling a higher possibility of this happening, but certainly not to the extent you are experiencing, generally. I agree with barry, there must be a reason for this interference, and it isn't the fact that the signal is 2.4ghz.

    I'm not doubting the distance achievable on 2.4ghz in a perfect world.

     

     Its the crowded channels that cause unstable conditions. 

     

    There might be 11 channels to choose from but in actuality there are only three available. because of channel width at 20mhz.

    attachment.php?attachmentid=522&d=131719

    rule of thumb is not to be on the same channel as your neighbor or within the overlapping channel width. This works perfectly if you have only 2 Neighbors. Maybe in the 1990s this was perfect when only 3 people had wifi.

     

    if your neighbor on the left uses channel 2 and the house on your right uses Channel 7. Then you might experience horrific packet loss and extreme amounts of retries. Depending on how many devices you have in your home fighting and competing for wifi this condition will be more apparent.

     

    Currently I see 20 access points running on 2.4ghz. Channels 1 6 and 11 are most popular. Devices now days will scan and then choose a channel with the least amount of noise. I also see 3 turds using channel 2 7 8 and 9... 

     

    Microwaves, baby Monitors,  security cameras, tow cars. All other items also operating on the same frequency.

     

    So yah. its crowded and outdated. Maybe not yet obsolete as I stated ?

     

    now. Blasting through walls With a proper directional antenna. reaching out and connecting to the office router or the free cafe Wi-Fi, maybe running some arp spoofing sessions on a house in the distance. This nice powerful antenna will now increase the amount of access points visible thus increasing noise.

     

    I guess what I'm doing is directly related to the above. a stable connection is not possible with 2.4ghz... 5.8ghz is like I'm standing in the living room of the distant building 100% stable.tNytrqd.jpg

    5.8ghz 2x2 mimo long range blasting through walls.

    A point to point link typically is line of site rooftop mounted decent hardware on both ends. Not blasting through walls and certainly not congested residential neighborhoods.

     

    Anyways. introduce your self to 5.8ghz... 

  10. 12 hours ago, haze1434 said:

    Wow, definitely not.

    It's slower, but much better at distance and punching through objects.

    2.4ghz = dropped packets or packet loss.

    The more distance the more interference.

     

    With 5.8ghz I can achieve almost" the same distance. 

    I can achieve 20 Times the download speed and completely eliminate packet loss... a long distance and long term stable connection.

     

    2.4ghz. At the same distance, identical parabolic 2x2 mimo design. completely identical setup. 2.4 will crawl on the floor and deauthenticate every 5 minutes.

     

    if you have the experience or knowledge to agree with the above. Do share plz

     

     

  11. 7958661109946400884391936

    7,958,661,109,946,400,884,391,936

    Does this look like a kabillion?

    katrillion?

    36**16

    36 characters. a-z + 0-9

    26+10=36

    A onion link looks Looks typically 16 characters long

    So 36 to the 16th power

    36**16=7958661109946400884391936
     

    Kazillion dns queries. impossible.

    there are already onion search engines. You can pull millions of working onions.

     

    Makes me think about scanning these onions for sqli/lfi injections...

     

    Anyways if you had 500 botnet GIG devices.  you might accomplish this. I wish I had government access to perform this kind of scanning.

     

    I diverse a government job after this post.

  12. The bottle neck is waiting on that 200 response from 10million dns request that will fail. 

     

    16^(32) = kabillion possibilities

    my math is inaccurate but this is crazy amount of bandwidth.

     

    Its not a practical approach... ill bet you will discover 1 working Domain per day (or maybe even 1 working dns per week. )

     

    I have a practical approach for you. google search dorks...  this can be automated pretty quickly with perl/python/ruby or even wget and bash.

     

    google search allintext:.onion.

    Crawl Google's results.

    use google query modifiers to adjust how much results are display or fine tune by date of relevance.

     

    lets say you scrape from google 10,000 domains that have this http;//*.onion written on there page.

     

    Then you crawl each of these domains and scrape together your list of possible working onions.

     

    Next you run this list through a tcp scan onto the tor network.

     

    If I find the time I can build a tool that does the hard work/crawling.

     

    But I'm not the type to give tools I make away for free. ?

  13. I used to love pyrit. I was frustrated by its failure to log data and after 8 hours of cracking and excessive heat (seg fault) with no way to recover or see its last know attempt.

     

    I have had a lot of success with pyrit, its a incredible addictive feeling.

     

    But there are basic functions that are missing. Pause, stop, restart and zero logging that is the most frustrating part.

     

    Move onto hashcat. 

  14. When the segment fault happens you can also get information from dmesg. 

     

    Sudo dmesg -C

    (Clear the system log)

     

    Then run pyrit. After seg fault simply run dmesg with out -C. Might find more information here.

  15. CaBz8Mz.jpg

     

    oczYUZa.png

     

    (Above pictures)

    (Notice the Noise level 16dB)

    here are two 7inch tall maybe (5 - 7dbi) possibly a coil dipole  2.4  / 5.8ghz.

    this connection from 120 foot. 5.8ghz access point to my repeater.

    this connection is unstable with these antennas, constantly disconnects and reconnects at channel 40 

     

    FgxHcIa.png
     
    YFRP8bN.jpg
     
    RzHUFrF.jpg
     
     

    (3 pictures above)

    (Notice the noise level 25dB)

    same connection from 120 foot. 5.8ghz access point to my repeater.

    new and improved. PETG printed at a higher temperature to prevent warping in sunlight.

    i used a vinyl sticker cutting machine(cricket) to get a perfect cutout of copper the two biquad 5.8ghz elements. :cool:

    there is a 40mm focal point, this time i soldered the reflector to the coax using a tube of copper. (check pictures)

    there is a gap across the middle of the reflector you see a long blue line. both are soldered separately to the coax.

     

    this change i thought might cause issues because the distance from the reflector to the element at this frequency should be 5mm and im at 40mm, i dont see any problems so far.

    im not sure how to measure db gain from linux i use wavemon as you see the pictures above...

    Fuck It ill call this a 25dbi antenna :grin:

    this thing downloads files as if i was standing right next to the router.

    all my machines in my house connect on 2.4ghz and then out this antenna through 5.8ghz. 

    im just going to dump a bunch of photos. i wish i had my camera and lighting setup for a 3dprinter video... would have been fun. im still working on lighting and a camera setup.

     

     
    w3zTjgG.jpg
     
     
    RzHUFrF.jpg
     
     
    YFRP8bN.jpg
     
     
    p5mGP3F.jpg
     
     
    8QelxC4.jpg
     
     
    Kxg1F31.jpg
     
     
    K6GK5Z3.jpg
     
     
    zyN9hTe.jpg
     
     
    4zkKMEK.jpg
     
     
    SUzYIRr.jpg
     
     
    UT4GGGc.jpg
     
     
    uZ3a9Fs.jpg
     
     
    jsQav2j.jpg
     
     
    wIB1zfB.jpg
     
     
    73XRM1k.jpg
     
     
    iX4Bk9p.jpg
     
     
    NdB1u3b.jpg
     
     

     

  16. I don't know the solution. I have ran into this issue. Seg faults at startup or even at about 4hours into a crack.

     

    reinstall nvidia drivers and cuda. I went through this many times. I have a kali usb stick with working pyrit.

×
×
  • Create New...