Jump to content

vailixi

Active Members
  • Content Count

    377
  • Joined

  • Last visited

  • Days Won

    3

1 Follower

About vailixi

  • Rank
    Hak5 Pirate

Recent Profile Visitors

2,949 profile views
  1. vailixi

    Good Password List

    This is correct. If you are collecting wordlists here's a compilation I put together from about 1200 sources. 8-63 character list for cracking WPA. Over a billion entries. https://drive.google.com/file/d/0B8Mz8bu8fJ4kTnJXWlZLMUtmRkk/view?usp=sharing
  2. vailixi

    Types of Hackers?

    Neoconservative rhetoric Fox pushes is basically controlled opposition to neomarxist propaganda of CNN, CBS, MSNBC, etc. Basically every shill on mainstream media belongs to same ethno-religious collective. Tough gun laws were instituted in places like the UK, Australia, etc and they lost freedom of speech about 20 years later. Now they want to take away your encryption. When the Bill of Rights was written by 56 white men and signed in English back in 1776, civilians owned the same weapons as the military. That was the intent of the founding fathers. The right to bear arms isn't about hunting, sport shooting, or home defense, it's to defend you from a tyrannical government. If you are thinking otherwise you are missing the point. Countries that submit gun rights loose their other rights down the road. On a personal note I'm politically blacklisted from having a real cybersecurity job but I know how to hack br0. I write multi-vector blended threats for fun. That doesn't make me a bad person. But it's true. I'm sick to death of every moralfag cybersecurity blogger using images of hackers in hoodies and balaclavas as if they are making back ally deals wtih drug dealers and sex workers. I'm also sick of cyberpunk graphics that have nothing to do with hacking. The majority of hackers are generally unskilled curiosity seekers. I don't really care what kind of hat they wear because most "white hats" while pretending to have the moral high ground will stock, d0x, and harass anyone they don't like. Security researchers will steal your work and report it to microshaft for goodboy points. Also I can nearly guarantee someone on this forum has a digital profile on you by now. Deal with it. The hacker's world is a little more cloak and dagger than muh white hats, black hats, and skids.
  3. vailixi

    Python3 convert StringVar() to string?

    I figured this. .get() will give you the text of the entry box so you can set that as a variable like so. package=e.get()
  4. I'm learning tkinter for python3. I'm trying to use a StringVar() from Entry (txtbox) txtvara = StringVar() c=Button(root) photo1=PhotoImage(file="/root/install.gif") c.config(image=photo1,width="100",height="30",activebackground="#f2f1f0",bg="#f2f1f0",command=sysinstall) c.place(x = 100,y = 92) e=Entry(root, width=12,textvariable=txtvara) e.place(x = 3, y = 92) I want to use the text in the system call but I can't even get it to print the variable to console. It just prints PY_VAR1 which I don't really understand. def sysinstall(): txtvarb = str(txtvara) print(txtvarb) Question: How do I convert StringVar() into string and use that to change label text in a system call?
  5. vailixi

    Help with PMKID cracking script? BASH

    Also on Ubuntu there is a daemon you have to uninstall to get aircrack suite to work now. I can't remember the name of it right off hand.
  6. I have a hypothetical. I was running a script as system service . The script makes calls to networking tools. Some of those tools are getting no route to host errors. I'm pretty sure the network is up. I can login on all of the test machines and scan them. There's definitely network services on all of the machines. I think the problem is with the service having permissions on certain ports or systemd not allowing services to use certain ports or services. But I'm not really sure I haven't ran into this problem before. What are some possible problems systemd services can have with permissions on networking services and how do I fix? Besides the unit file (.service) are there some other configuration files I need to edit to make networking services available to my script? Sorry if this is a little vague. What are some good references on system services and networking permissions?
  7. vailixi

    Help with PMKID cracking script? BASH

    I was grabing the MAC addresses from airodump's output.
  8. I was working on a script that would get MAC addresses from a text file then indentify their make. I ran into a problem with grep while trying to use a variable for pattern matching. Firstly I was getting the MACs from a file and save them to a separate file. #I suck at regular expressions so you know a shorter way to write this please tell me. grep -io '[A-Z0-9]\{2\}:[A-Z0-9]\{2\}:[A-Z0-9]\{2\}:[A-Z0-9]\{2\}:[A-Z0-9]\{2\}:[A-Z0-9]\{2\}' /root/air/NPC-01.csv | sort -u > /root/air/macs.txt The following statement works if I want to retrieve a single manufacturer. grep $(echo 00:20:8C:30:40:60 | cut -d ':' -f 1,2,3 | sed 's/:/-/g') /etc/unicornscan/oui.txt | cut -d ':' -f 2 But really I want to to something like this. The problem is I'm not sure if grep will even work like this. Basically I want to take $line from mac.txt (where macs.txt is simply a list of MAC addresses) and get the first three hexadecimal pairs and check them against oui.txt cat /root/air/macs.txt | while read line; do grep $(echo $line | cut -d ':' -f 1,2,3 | sed 's/:/-/g') /etc/unicornscan/oui.txt | cut -d ':' -f 2; done I tried this a couple of different ways. I wasn't sure how to make grep or egrep take variables. Basically the problem I've been having is grep will want to puke out the entire contents of oui.txt or nothing at all.
  9. You can get MAC addresses from a file with a statement like this. grep -io '[A-Z0-9]\{2\}:[A-Z0-9]\{2\}:[A-Z0-9]\{2\}:[A-Z0-9]\{2\}:[A-Z0-9]\{2\}:[A-Z0-9]\{2\}' /root/air/NPC-01.csv | sort -u > /root/air/NPC.txt And you can get the manufacturer information with a statement like. grep $(echo 00:20:8C:30:40:60 | cut -d ':' -f 1,2,3 | sed 's/:/-/g') /etc/unicornscan/oui.txt | cut -d ':' -f 2 I was trying to figure out a way to loop through the text file containing the MACs and grepping each line from oui.txt. But I can't figure out a way to get grep to play nice with variables and loops.
  10. Can anyone suggest a command line tool to convert any calendar date to an epoch time? I don't want current time as epoch. I want to be able to input a calender date and get epoch. I noticed there are a lot of Javascript tools that do this but I was wonder if there is a command line tool. I'll code it if I have to, but time would be better spent elsewhere if it already exists. I noticed date time groups are easiest to work with as epoch time. At least for doing comparison operators. Here's a python snippet that essentially does what I'm looking for. Is there a native Linux application that does this? #!/usr/bin/python import datetime import calendar aprilFirst=datetime.datetime(2012, 11, 12, 0, 0) print(calendar.timegm(aprilFirst.timetuple())) This works for now. #!/usr/bin/python import sys from sys import argv import datetime import calendar year = int(argv[1]) month = int(argv[2]) day = int(argv[3]) minute = int(argv[4]) second = int(argv[5]) aprilFirst=datetime.datetime(year, month, day, minute, second) #usage py_epoch.py year month day minute second print(calendar.timegm(aprilFirst.timetuple()))
  11. iw dev |grep -i interface | cut -d ' ' -f 2 Perfect. Thanks. Actually there are plenty of automated wireless attack scripts available already. I'm trying to learn how to code deeper system automation. I need to be able to deal with outputs. I started working with python because python is easy compared to other languages. I'll probably port some of my BASH scripts over to python once I get a better handle on that. It seems to be what the cool kids are doing.
  12. I'm trying to get the output of a command as a variable and use it for a system call. Mostly I'm trying to get the concept of this by doing something easy like changing a MAC address. Firstly I want to get the wireless interface. I know I can make <iface> a command line option and I'm sure that's a better way to go but it's not really the point. There are several ways to get the wireless interface. Some of the stuff I tried. cat /proc/net/wireless | tail -n 1 | cut -d ' ' -f 2 | tr -d ':' | sed '/^\s*$/d' #this method is completely unreliable ifconfig | tail | head -2 | sed '/^\s*$/d' | cut -d ":" -f 1 #this seems to work ip link show | tail -n 2 | head -n 1 | cut -d ':' -f 2 | cut -d ' ' -f 2 #maybe Then I tried iwfconfig I think it is several outputs instead of one. So head, tail, and grep don't seem to work on it. I tried readarray as well. I didn't want to write to a file then cat the file into read array or read the file from the python script because usually there is a more elegant way of doing things. I just don't know how to do it. Question is there a more elegant way of doing this stuff? import subprocess from subprocess import call batcmd="cat /proc/net/wireless | tail -n 1 | cut -d ' ' -f 2 | tr -d ':'" wlan = subprocess.check_output(batcmd.strip(), shell=True) print(wlan).strip() call(["ifconfig", wlan.strip(), "down"]) call(["macchanger", "-r", wlan.strip()]) call(["ifconfig", wlan.strip(), "up"]) I tried this and it works sometimes. But sometimes fails because cat fails to return the wireless interface. import subprocess from subprocess import call batcmd="ifconfig | tail | head -2 | sed '/^\s*$/d' | cut -d ':' -f 1" wlan = subprocess.check_output(batcmd.strip(), shell=True) print(wlan).strip() call(["ifconfig", wlan.strip(), "down"]) call(["macchanger", "-r", wlan.strip()]) call(["ifconfig", wlan.strip(), "up"]) I wasn't sure if subprocess is the best of way of doing this. What I really need is ways to get stdout and use it in a system call.
  13. For whatever reason the text file I ended up with had some extra carriage return or newline characters and crunch was counting some of those as extra characters so crunch was throwing errors. So I wrote a quick python script to write out all of the digits. #!/usr/bin/python import sys l = ["0", "1", "2", "3", "4", "5", "6", "7", "8", "9"] for a in range(0, 9): for b in range(0, 9): for c in range(0, 9): for d in range(0, 9): with open("/root/Desktop/areacodes/one.txt") as f: for line in f: i=(line.strip())+(l[a])+(l[b])+(l[c])+(l[d]) print i It took about 11 minutes to generate the list. 1,090,503,810 lines and a little under 12GB which is about 11% of the 10,000,000,000 lines and 102 GB that crunch would have produced. At any rate generating a rainbow table that size would probably take months so splitting it into lists with local numbers then generating the tables would probably be the way to go. I'll put the list of up for download like with my other wordlists because it took a little bit of work to put together.
  14. Kinda seems like the information would be out there already and readily available. It's weird, you used to be able to find this stuff easily. Seems there more websites there are the harder it is to find useful information. your suggestion on scripting seems to be right course of action. Maybe something like this: #!/bin/bash SITE="https://www.allareacodes.com/" cat /root/Desktop/areacodes.txt | while read line; do URL=$SITE$line sleep 15 wget $URL; done grep -o '([0-9]\{3\})[^\s][0-9]\{3\}' /root/Desktop/areacodes/ > areaprefix.txt
×