Jump to content


Dedicated Members
  • Posts

  • Joined

  • Last visited

  • Days Won


Everything posted by i8igmac

  1. I made a script kiddy video. Its a technique that is my goto first method. I find good success when this method is suited. Ill make a new thread with simplified example code.
  2. netcat.rb While true system("nc -w 10") sleep 5 end You can make netcat retry every 5 seconds with a ruby script like above. Or bash/perl/python. If netcat session breaks or drops this will be persistent. rc.local sleep 15 ruby /home/projects/netcat.rb & Exit 0
  3. I have experience this same thing. When I made my reaver drop box. I think its the lack of cpu power, the time it takes to start up all the services is extremely slow. If netcat launches before your wlan is Up and configured then netcat will pop a error 'device not up' Glad it worked for you.
  4. I hope you try what I suggested above to confirm what I suspect is happening. You should also try this. pipe the netcat data to a file to see if there is a error logged. With out the 'sleep 15' netcat -w 10 > /tmp/nc.log exit 0
  5. i have experience this same thing. I believe netcat starts up before your networking services completely configured. What worked for me. Sleep 15 netcat . . . 192. Exit 0
  6. place your netcat command in rc.local Or are you trying to explore new methods? Like schedule tasks
  7. It is exactly interference. The source is a combination of things in the neighborhood, also more noticeable with the amount of range involved. but again. 5.8ghz brings me a solid long range stable 40mb per second. both radios operate in different frequency. the device is in fact broadcasting 2.4ghz from device1 ? and 5.8ghz blows right threw all the nearby congested airwaves.
  8. I did some skiddy stuff this weekend. Got some real quick results. If I get some free time ill post a video tutorial and the ruby code. Ill show the steps I took. Starting with a empty text file ill write a small amount of code to produce a skiddy but powerful web exploit tool using applications already available. ill show a technique I learned by following a hacker by the name of mulciber. Ten years ago I watched him root hackforums dot net.
  9. I'm not doubting the distance achievable on 2.4ghz in a perfect world. Its the crowded channels that cause unstable conditions. There might be 11 channels to choose from but in actuality there are only three available. because of channel width at 20mhz. rule of thumb is not to be on the same channel as your neighbor or within the overlapping channel width. This works perfectly if you have only 2 Neighbors. Maybe in the 1990s this was perfect when only 3 people had wifi. if your neighbor on the left uses channel 2 and the house on your right uses Channel 7. Then you might experience horrific packet loss and extreme amounts of retries. Depending on how many devices you have in your home fighting and competing for wifi this condition will be more apparent. Currently I see 20 access points running on 2.4ghz. Channels 1 6 and 11 are most popular. Devices now days will scan and then choose a channel with the least amount of noise. I also see 3 turds using channel 2 7 8 and 9... Microwaves, baby Monitors, security cameras, tow cars. All other items also operating on the same frequency. So yah. its crowded and outdated. Maybe not yet obsolete as I stated ? now. Blasting through walls With a proper directional antenna. reaching out and connecting to the office router or the free cafe Wi-Fi, maybe running some arp spoofing sessions on a house in the distance. This nice powerful antenna will now increase the amount of access points visible thus increasing noise. I guess what I'm doing is directly related to the above. a stable connection is not possible with 2.4ghz... 5.8ghz is like I'm standing in the living room of the distant building 100% stable. 5.8ghz 2x2 mimo long range blasting through walls. A point to point link typically is line of site rooftop mounted decent hardware on both ends. Not blasting through walls and certainly not congested residential neighborhoods. Anyways. introduce your self to 5.8ghz...
  10. 2.4ghz = dropped packets or packet loss. The more distance the more interference. With 5.8ghz I can achieve almost" the same distance. I can achieve 20 Times the download speed and completely eliminate packet loss... a long distance and long term stable connection. 2.4ghz. At the same distance, identical parabolic 2x2 mimo design. completely identical setup. 2.4 will crawl on the floor and deauthenticate every 5 minutes. if you have the experience or knowledge to agree with the above. Do share plz
  11. 7958661109946400884391936 7,958,661,109,946,400,884,391,936 Does this look like a kabillion? katrillion? 36**16 36 characters. a-z + 0-9 26+10=36 A onion link looks Looks typically 16 characters long So 36 to the 16th power 36**16=7958661109946400884391936 Kazillion dns queries. impossible. there are already onion search engines. You can pull millions of working onions. Makes me think about scanning these onions for sqli/lfi injections... Anyways if you had 500 botnet GIG devices. you might accomplish this. I wish I had government access to perform this kind of scanning. I diverse a government job after this post.
  12. The bottle neck is waiting on that 200 response from 10million dns request that will fail. 16^(32) = kabillion possibilities my math is inaccurate but this is crazy amount of bandwidth. Its not a practical approach... ill bet you will discover 1 working Domain per day (or maybe even 1 working dns per week. ) I have a practical approach for you. google search dorks... this can be automated pretty quickly with perl/python/ruby or even wget and bash. google search allintext:.onion. Crawl Google's results. use google query modifiers to adjust how much results are display or fine tune by date of relevance. lets say you scrape from google 10,000 domains that have this http;//*.onion written on there page. Then you crawl each of these domains and scrape together your list of possible working onions. Next you run this list through a tcp scan onto the tor network. If I find the time I can build a tool that does the hard work/crawling. But I'm not the type to give tools I make away for free. ?
  13. I used to love pyrit. I was frustrated by its failure to log data and after 8 hours of cracking and excessive heat (seg fault) with no way to recover or see its last know attempt. I have had a lot of success with pyrit, its a incredible addictive feeling. But there are basic functions that are missing. Pause, stop, restart and zero logging that is the most frustrating part. Move onto hashcat.
  14. When the segment fault happens you can also get information from dmesg. Sudo dmesg -C (Clear the system log) Then run pyrit. After seg fault simply run dmesg with out -C. Might find more information here.
  15. Any backdoors shell access vnc or rootkits. Any one tested anything?
  16. Re install libllvm then reinstall pyrit. Have you tested on a fresh kali install? Do you get the same results?
  17. (Above pictures) (Notice the Noise level 16dB) here are two 7inch tall maybe (5 - 7dbi) possibly a coil dipole 2.4 / 5.8ghz. this connection from 120 foot. 5.8ghz access point to my repeater. this connection is unstable with these antennas, constantly disconnects and reconnects at channel 40 (3 pictures above) (Notice the noise level 25dB) same connection from 120 foot. 5.8ghz access point to my repeater. new and improved. PETG printed at a higher temperature to prevent warping in sunlight. i used a vinyl sticker cutting machine(cricket) to get a perfect cutout of copper the two biquad 5.8ghz elements. there is a 40mm focal point, this time i soldered the reflector to the coax using a tube of copper. (check pictures) there is a gap across the middle of the reflector you see a long blue line. both are soldered separately to the coax. this change i thought might cause issues because the distance from the reflector to the element at this frequency should be 5mm and im at 40mm, i dont see any problems so far. im not sure how to measure db gain from linux i use wavemon as you see the pictures above... Fuck It ill call this a 25dbi antenna this thing downloads files as if i was standing right next to the router. all my machines in my house connect on 2.4ghz and then out this antenna through 5.8ghz. im just going to dump a bunch of photos. i wish i had my camera and lighting setup for a 3dprinter video... would have been fun. im still working on lighting and a camera setup.
  18. Oh yah, sorry. I'm a nvudia guy. The installation process maybe identical. Maybe start with a fresh kali usb stick? Check if the LIST_cores works.
  19. I don't know the solution. I have ran into this issue. Seg faults at startup or even at about 4hours into a crack. reinstall nvidia drivers and cuda. I went through this many times. I have a kali usb stick with working pyrit.
  20. I used to love pyrit. But had better performance with the well maintained hashcat
  21. 5.8ghz is best. 2.4 is obsolete. I just have to upgrade my kodi pi to support 5.8ghz. Then ill completely remove 2.4 from my property.
  22. You can perform a tcp scan from almost any device. Your cell phone could install a network scanning tool. You should maybe slow down with metasploit. learn the 3way hand shake and nmap from irongeeks website video tutorial. You need some networking knowledge to continue. Install a server. Anything like a game or webserver and learn how to properly configure so its accessible publicly.
  23. Run your exploit handler this should open port 4444. From another computer run nmap -p 4444 Is the port responding?
  24. Here was a old video I made 9 years ago. Was a lot of fun. hope you guys enjoy. I won a hackers video contest with this video.
  25. Yes meterpreter is installed on my phone. i could pivot my kali desktop into any network.
  • Create New...