Jump to content

THCMinister

Active Members
  • Posts

    256
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by THCMinister

  1. I believe there are projects to get freeradius built for OpenWRT but I myself am not familiar with it.
  2. I don't think what you are trying is possible.
  3. Great video, Glad I could be of assistance.
  4. Very interesting. Looking into some useful(legal) applications.
  5. I have been running Linux for quite some time now, from Arch to Xiaopan and everything in between. I have played the traditional minimalistic games that come preinstalled such as kbounce or frozen bubble, to installing UT2004, Postal 2, Counterstrike and Gary's Mod via wine. Wine becomes buggy and games don't always play smoothly. I'm aware of Steam being available for Linux now, but I'm looking more for games that are developed to run on specific to linux/multiplatorm. and preferably games not involving Steam. What games would you guys recommend? Also what specs would you have for the games you recommended?
  6. Create the wireless config copy it to a directory and then have a DIP switch copy it to the config directory.
  7. This may assist you in understanding. Source: http://en.wikipedia.org/wiki/Certificate_authority
  8. THCMinister

    Wcidf

    "PCZombie" is in reference to the name of the AP, I understand you are connecting to the "BigPond" but are you not flooding the SSIDs and using the MAC of the actual AP?
  9. THCMinister

    Wcidf

    In my opinion Kali is better. Try bully for wps attacks. Faster/better code.
  10. THCMinister

    Wcidf

    I will fire up my BT laptop when I get home, hopefully be able to answer your questions. What's in the wicdf preferences? I'm Out in the field right now with Kali.
  11. THCMinister

    Wcidf

    print screen should do it, they should do it, the pictures should be auto saved. the screen should react like a shutter to a camera. Are you on a virtual machine?
  12. THCMinister

    Wcidf

    Screenshots would be helpful. Are you on a virtual machine?
  13. THCMinister

    Wcidf

    Sounds like the hostname of the machine.
  14. What browser are you using? Any plugins? Try clearing your cache/history.
  15. My company uses BMC's Footprints. Overall it is a fantastic product, in my opinion. Different user access roles, charts and graphs to represent response times/number of tickets/resolved by/ etc.. It has the ability to generate tickets from email, this is helpful for have monitoring software auto open tickets/close them when thresholds are met. With that being said , our instance was set up poorly, people didnt take time to understand the product before diving in. This makes it convoluted with unnecessary data/users/tickets/etc..
  16. Here is a start of a script I had written a while ago that I haven't had time to finish. It is designed to run on kali linux, it will not work on the pineapple unless altered due to it spawning a new gnome terminal. A bit more needs to be added and functions created to handle the looping, etc.. Hope this helps, I can assist you when I have time. Feel free to shoot me a message/post here. Bully.sh Edit: Code removed. I accidently posted test code, many error not to mention it wouldn't function, I will post as soon as I get time to locate my partially functioning script. Sorry.
  17. Try using bully, I tend to have better luck with it over reaver. I have written similar scripts in bash for reaver/bully. Happy to assist.
  18. Reaver is reading the responses. When reaver attempts a pin, the router responds. How else would reaver teacher know if the attempt was successful or not.
  19. Why don't you first try determine the client(s) connecting that could be doing this. Then maybe scan those client(s) and see what's going on. Are they connecting from the same MAC every time? Things like that. Do recon.
  20. There is no "magic button", but things can be scripted to do almost just that. Look into SSL Strip and fake login pages. Although posting fake login pages on these forums are against the rules.
  21. THCMinister

    SELinux

    It was just SELinux. Most of the security we ran was network software/hardware based security. Routers/switches/etc.. Root was disabled but there were users with elevated privileges. Developers never had access to Production, and in Dev, they very seldom had elevated privileges. We mainly set them up with RSA keys. We had a lot of monitoring applications for linux(and windows) that was primarily for security.
  22. A little more information would be helpful. Such as: What is you end goal with the pcap? How are you obtaining the .bfs file? why do you need it converted to pcap?
  23. Monitor mode allows the card to passively collect raw data, no frames are transmitted. All packets captured are unfiltered. Some cards that allow transmitting of packets while monitoring(packet injection) allows you to obtain unfiltered packets that contain data relating to the injected data you're transmitting. This in turn allows the cracking/info gathering programs to function.
×
×
  • Create New...