Jump to content

i8igmac

Dedicated Members
  • Posts

    939
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by i8igmac

  1. In that case. hack the planet! Hack the planet! Hack the planet!
  2. The way I see it... if the water sprays over the fence onto your property, you can do what you wish with that water... Same goes for wifi.
  3. https://unix.stackexchange.com/questions/353137/run-a-command-on-startup-in-kali Looks like the ticket
  4. No one called out 'warcraft ||| reign of chaos' old school dota was insane. I did a reverse engineer of the tcp protocol, created a ddos style attack to shut down all servers on battle.net by connecting thousands of fake clients to every public server. And when I created a user list of known admins, these clients where un-kickable/un-bann-able... After I did this. I felt confident I could accomplish anything.
  5. Ill suggest alfa Nha, its autheros chip works with karma mana attack. does any one own the awus036ach? Dual band 5.8ghz? what chip is it? Does it work out of the box?
  6. I use airbase-ng as a quick generic hotspot, it works with almost any wifi card. airbase-ng can also be used to spoof all probe requests with the use of -P -c 30 lets assume you have 2 devices. One device is simply your internet source and the second device will be your evil hotspot. I will assume your already connected to the internet with device 1. It can be a wifi connection or Ethernet...(eth0) in this example. echo 'interface=at0' > /etc/dnsmasq.conf echo 'dhcp-range=192.168.69.50,192.168.69.150,12h' >> /etc/dnsmasq.conf airmon-ng start wlan0 airbase-ng -P -c 30 wlan0mon [Open new console] ifconfig at0 up 192.168.69.1 dnsmasq iptables --flush && iptables --table nat --flush && iptables --delete-chain && iptables --table nat --delete-chain iptables --table nat --append POSTROUTING --out-interface eth0 -j MASQUERADE iptables --append FORWARD --in-interface at0 -j ACCEPT echo 1 > /proc/sys/net/ipv4/ip_forward you will need to change eth0 to the proper internet device name. at this point if you check ifconfig, you should see at0 has ip address of 192.168.69.1 and you should have 2 process running (airbase-ng) and (dnsmasq) you can now deauth other machines( I would use mdk3 for deauth) if the machine is outdated enough it will auto connect to your airbase-ng assuming that signal strength is higher. edit. you may also need to service stop network-mamager
  7. I don't think you have it properly setup. I can try to post commands from memory... (today on my lunch break)
  8. looks like your trying to deauth and force clients to reconnect to airbase-ng first confirm that a machine can connect to this access point and establish a proper ip. Dnsmasq is quicker and cleaner...
  9. try mdk3. It should do the trick. By the way. Change this part. -0 0 -0 10 Send ten packets instead of zero.
  10. What if jim carry finds it. Lol... I llike what you did here. using the tools and services already available To the current user to perform automated tasks. I agree that user level remote access still can be dangerous.
  11. On linux I use freecad to design, after watching a few tutorials on part design utility I practice with a feww simple projects like a bearing to hold my spool of plastic. Then I export the abject for use with slic3r. This piece of software creates printer gcode x,y,z locations. You can adjust speed, fill material patterns, temperatures and all kinds of printing options. its all trial and error, once I got proper slic3r options that would produce a proper print I had to save this as a config ffor use with future prints. If you have the funds, I would check out prusa.
  12. I got mine last Christmas, I had no issues so far... the biggest print size bed for the price I paid 350$ https://www.monoprice.com/product?p_id=13860&gclid=Cj0KCQiAp8fSBRCUARIsABPL6JZHHKQB-sAR6pBvduky_Dhlj-1xsXchrY7XpLs6VTX3qK3u8i836-saAn4aEALw_wcB the price went down and there are new versions... The best one I think is the prusa... huge amount of reading before I purchased mine. Took me 20 minutes to assemble. There are horror stories I read about other printers taking 24 hours to assemble and pieces did not fit.
  13. my soldering is not the best but what is important here is how precise the copper is cut to 13.05mm I made my cuts at 14mm and then file down until 13.05 is measured... the yellow mounts snap into place, with this design I can reprint new feeder designs and reuse the reflector. this reflector was my first print from about 1 year ago. You may notice the condition my 3d printed pc case has melted due to a hot summer sitting in the window. I'm getting some new spools of abs and pla. Im installing some lights and a camera for my printer. Ill try and make some time lapse videos with signal quality comparison... If some one would like to test this with a drone, i can design a proper mount for the controller and a trade could be made. I would like to see if this could outperform a expensive drone antenna. I also have a 5.8ghz double biquad design that has better performance, I have been using for a full year but also melted.
  14. Well. The data that I stream is raw, the method I use leaves the tcp connection with the client/server always open state. because of this the data will be seen at the same time it happens. If you run 'ping google', the client will see each line print in real time. I Simply wrap the data with bootstrap tags for a slick looking display.
  15. There is a console.php demo. I can't find the link... its a basic console you can imbed on your site. I have a similar project. Running console applications and displaying live io stream to the web client in html form. Things like signal stregth, reaver attacks, mdk attacks, configuring of wifi devices etc. For example if a button was clicked I could run `iwlist scan` and display the content in html format with a button for each essid and a connect button. I'm using ruby on rails. Action::controller::live is the method for streaming live content... this allows me more control of the content I want to stream. A basic example could be `ping google.com` and display the content to the web client. I could make you a working example. so, my suggestion is ruby on rails.
  16. I spent 30 minutes trying to compile openssl on the pi b+. Then the wife shut it down... all was lost...
  17. That is a well written tutorial. I recently compiled a hi-world program and attempt to run on mips but failed as expected... Can you setup a vm specifically for cross compiling?
  18. the simplest and best performing Mod you could make is a wind surfer. a parabolic curve can focus radio waves a long distance. Andrew McNeil on youtube I suggest you watch all his videos. This is my old setup, just a example of a 3d printed wind surfer. You could use cardboard and aluminum foil and have something working in 15 minutes. My next suggestion is to not bother with 2.4ghz. packet loss is a huge factor with crowded interfering networks. with 5.8 ghz and a parabola I can achieve insane download speeds from a long distance. Typically 5.8ghz wont even reach the front yard. I'm roughly 500 feet away and streaming hd movies with out a single packet lost. My current antenna setup is 2 hand made 5.8ghz dipole antennas, both are mounted to a single 3d printed Parabolic dish. 8inch tall 10inch wide 40mm focal point.
  19. I see this kind of activity when I look at porn. ads popup telling me to install some malware.
  20. every once in a while I might check the kali tools list to see what's been added or if im looking to perform a task ill check the list for tools on that subject https://tools.kali.org/tools-listing Sorry for the big paste. acccheck ace-voip Amap arp-scan Automater bing-ip2hosts braa CaseFile CDPSnarf cisco-torch Cookie Cadger copy-router-config DMitry dnmap dnsenum dnsmap DNSRecon dnstracer dnswalk DotDotPwn enum4linux enumIAX EyeWitness Faraday Fierce Firewalk fragroute fragrouter Ghost Phisher GoLismero goofile hping3 ident-user-enum InSpy InTrace iSMTP lbd Maltego Teeth masscan Metagoofil Miranda nbtscan-unixwiz Nmap ntop OSRFramework p0f Parsero Recon-ng SET SMBMap smtp-user-enum snmp-check SPARTA sslcaudit SSLsplit sslstrip SSLyze Sublist3r THC-IPV6 theHarvester TLSSLed twofi URLCrazy Wireshark WOL-E Xplico Vulnerability Analysis BBQSQL BED cisco-auditing-tool cisco-global-exploiter cisco-ocs cisco-torch copy-router-config DBPwAudit Doona DotDotPwn HexorBase Inguma jSQL Lynis Nmap ohrwurm openvas Oscanner Powerfuzzer sfuzz SidGuesser SIPArmyKnife sqlmap Sqlninja sqlsus THC-IPV6 tnscmd10g unix-privesc-check Yersinia Exploitation Tools Armitage Backdoor Factory BeEF cisco-auditing-tool cisco-global-exploiter cisco-ocs cisco-torch Commix crackle exploitdb jboss-autopwn Linux Exploit Suggester Maltego Teeth Metasploit Framework MSFPC RouterSploit SET ShellNoob sqlmap THC-IPV6 Yersinia Wireless Attacks Airbase-ng Aircrack-ng Airdecap-ng and Airdecloak-ng Aireplay-ng Airmon-ng Airodump-ng airodump-ng-oui-update Airolib-ng Airserv-ng Airtun-ng Asleap Besside-ng Bluelog BlueMaho Bluepot BlueRanger Bluesnarfer Bully coWPAtty crackle eapmd5pass Easside-ng Fern Wifi Cracker FreeRADIUS-WPE Ghost Phisher GISKismet Gqrx gr-scan hostapd-wpe ivstools kalibrate-rtl KillerBee Kismet makeivs-ng mdk3 mfcuk mfoc mfterm Multimon-NG Packetforge-ng PixieWPS Pyrit Reaver redfang RTLSDR Scanner Spooftooph Tkiptun-ng Wesside-ng Wifi Honey wifiphisher Wifitap Wifite wpaclean Forensics Tools Binwalk bulk-extractor Capstone chntpw Cuckoo dc3dd ddrescue DFF diStorm3 Dumpzilla extundelete Foremost Galleta Guymager iPhone Backup Analyzer p0f pdf-parser pdfid pdgmail peepdf RegRipper Volatility Xplico Web Applications apache-users Arachni BBQSQL BlindElephant Burp Suite CutyCapt DAVTest deblaze DIRB DirBuster fimap FunkLoad Gobuster Grabber hURL jboss-autopwn joomscan jSQL Maltego Teeth PadBuster Paros Parsero plecost Powerfuzzer ProxyStrike Recon-ng Skipfish sqlmap Sqlninja sqlsus ua-tester Uniscan Vega w3af WebScarab Webshag WebSlayer WebSploit Wfuzz WPScan XSSer zaproxy Stress Testing DHCPig FunkLoad iaxflood Inundator inviteflood ipv6-toolkit mdk3 Reaver rtpflood SlowHTTPTest t50 Termineter THC-IPV6 THC-SSL-DOS Sniffing & Spoofing Burp Suite DNSChef fiked hamster-sidejack HexInject iaxflood inviteflood iSMTP isr-evilgrade mitmproxy ohrwurm protos-sip rebind responder rtpbreak rtpinsertsound rtpmixsound sctpscan SIPArmyKnife SIPp SIPVicious SniffJoke SSLsplit sslstrip THC-IPV6 VoIPHopper WebScarab Wifi Honey Wireshark xspy Yersinia zaproxy Password Attacks acccheck BruteSpray Burp Suite CeWL chntpw cisco-auditing-tool CmosPwd creddump crowbar crunch DBPwAudit findmyhash gpp-decrypt hash-identifier Hashcat HexorBase THC-Hydra John the Ripper Johnny keimpx Maltego Teeth Maskprocessor multiforcer Ncrack oclgausscrack ophcrack PACK patator phrasendrescher polenum RainbowCrack rcracki-mt RSMangler SQLdict Statsprocessor THC-pptp-bruter TrueCrack WebScarab wordlists zaproxy Maintaining Access CryptCat Cymothoa dbd dns2tcp http-tunnel HTTPTunnel Intersect Nishang polenum PowerSploit pwnat RidEnum sbd shellter U3-Pwn Webshells Weevely Winexe Hardware Hacking android-sdk apktool Arduino dex2jar Sakis3G smali Reverse Engineering apktool dex2jar diStorm3 edb-debugger jad javasnoop JD-GUI OllyDbg smali Valgrind YARA Reporting Tools CaseFile cherrytree CutyCapt dos2unix Dradis KeepNote MagicTree Metagoofil Nipper-ng pipal RDPY
  21. I'm excited to see more of your work... just for fun my encryption project was more of a attempt to compress files to save hd space like tv show silicon valley. I ran into ram limitations per my coding skills I have never ran into this kind of limitation. I plan to build a machine with as much affordable ram as possible. I will eventually implement proper ram buffer size management. but my attempt deals with a large buffer to achieve maximum compression.
  22. This is the second time I seen you mention rust... I gave it a quick look at ssh examples and almost resembles ruby... As mentioned above, I would like to see gpu examples, I had a encryption project I was working on but fail with using gpu libraries... I would likw to see some example code of rust and gpu crunching.
  23. maybe 6 ysars ago I chose ruby. I was interested in writing metasploit modules. Pthon has less limitations. I wouldn't bother with c++ until you figure out a years worth of python or ruby
  24. I'm not doubting the idea here just pointing out the configuration I have explained with the use of a kid-safe-wifi-access point... All devices associated will be effected by the iptable rules with out the need to configure proxy settings on each machine or each application... You can forward the traffic to pi-hole or squid... the access point running iptable rules is simply a control point... full control of traffic is full control.
×
×
  • Create New...