Jump to content

0phoi5

Dedicated Members
  • Posts

    702
  • Joined

  • Last visited

  • Days Won

    20

Everything posted by 0phoi5

  1. I would assume 'done' or 'clear' are closing your terminal, unsure why though.
  2. For other's info, this is the script and the below is the lines directly after the 'Are you satisified with this configuration?' bit. https://github.com/0x90/wps-scripts/blob/master/ReVdK3-r1.sh read -p "Are you satisified with this configuration? if not, input 'r' and you will be returned to Reaver's Configuration Wizard": SATISFIED_OPTION; done if [ -e /etc/reaver_tmp.txt ]; then rm -f /etc/reaver_tmp.txt fi if [ -e /etc/aireplay_tmp.txt ]; then rm -f /etc/aireplay_tmp.txt fi clear
  3. Unfortunately Parrot / a lot of Linux distros initially recognise the on-board graphics card, rather than any added GPU. I've come across tutorials previously online, doing a search maybe try one of the following. I think they call it 'GPU passthrough' if you need to search Google; https://medium.com/@dubistkomisch/gaming-on-arch-linux-and-windows-10-with-vfio-iommu-gpu-passthrough-7c395dde5c2 https://www.reddit.com/r/linuxmasterrace/comments/2z30dq/gpu_passthrough_or_how_to_play_any_game_at_near/ Be aware that I don't believe you can get the full graphic card's potential released through passthrough though. You'll lose some of the computational power from Linux having work out how to use the GPU.
  4. Already done this; RPi with Parrot / Kali installed, in a backpack / pocket. Install Raspberry SSH on your phone. Raspberry SSH works with Android smart watches, so you'll get any created buttons show up on your watch. Buttons = Send any command to the RPi. Create a button to start a BASh script. Profit.
  5. You need to speak with Yahoo's / Facebook's Customer Service department. Do not attempt to pentest without written permission from a company, which in this case, they would not give.
  6. "'If you're not paying for the product, you are the product" - Andrew Lewis (paraphrase) This used to be true. Now it's more like; "'Whether you're paying for the product or not, you are still a product yourself"
  7. I wouldn't know specifically, however I would keep these points in mind; It's a wireless communication method. Wireless communication can be picked up by any appropriately created device within range. It uses TLS encryption, for which there are multiple known attack vectors. It is possible to embed malicious code in images/video, yes. If a device isn't completely and utterly air-gapped from the outside world, it's externally hackable. Period. Without knowing how one would go about it, yes, it's hackable. Most things are, it's just a case of working out how.
  8. 0phoi5

    AWUS036H

    The throughput and USB 2 really isn't a problem for pentesting. I could quite happily hack with a potato and a piece of copper wire, if it gets the job done. No 802.11n support could be a pain, I guess, but I've personally yet to come across a situation where I've needed this.
  9. 0phoi5

    AWUS036H

    Probably already covered this replying to another topic, but I have 2 x AWUS036H myself and they are excellent. The AWUS036H works out-of-the-box with Kali & Parrot and the range is fine. Using a Yagi and line-of-sight, they'll cover a 1 mile range with an OK signal acquisition. Using the default antenna they come with, you'll still get 100 meters line-of-sight, which is good for most pentest scenarios. And yes, they inject and monitor.
  10. You shouldn't need to with most, if not all, Linux distros. Certainly Kali, Parrot, Raspbian, Debian and Mint all recognise the AWUS036H as soon as it's plugged in.
  11. Not sure what you mean by install, sorry. What OS? I use Kali/Parrot for pentesting and both are just 'plug'n'play' with the Alfa cards. Just plug it in and use lsusb / ifconfig to confirm it's there and it's designation (usually wlan1).
  12. I stick to the AWUS036H. Can't go wrong.
  13. Wenger Gigabyte backpack Lenovo Thinkpad T430 (SSD, 8GB RAM, internal WiFi card can handle monitor and injection on it's own), Parrot OS and various VMs diskAshur iStorage HDD - 250GB Alfa AWUS036H plus various antennas A RPi with some accessories Spare mobile - Android Galaxy S2, rooted and with a Linux OS installed Various cables / USB sticks / misc.
  14. Funny, I went to rob a bank a few days ago, but got arrested after security realised I was holding up some sort of router. Small world... This cell is comfy.
  15. This. Use PowerShell (Invoke-Command), SCCM, batch files, PSEXEC and Group Policy to get things done quickly, easily and remotely.
  16. You'd be better off just using an old satellite dish, or one of these.
  17. I use a T430, in fact I'm on it now. It's perfect for pentesting, if that what you need it for. Got a refurb for just over £200 ($280 ish), 250GB SSD, 8GB RAM, i5 processor. I love it.
  18. I guess they took the joke 'I'm a Linux Admin, so I get laid as often as I have to reboot' and thought they better reboot more often
  19. Potentially not an option, but does your business do Disaster Recovery test days, or similar? When they power down all systems and then power them back up? If so, use this to your advantage. With everything on the estate powered down, they'll be a lot less APs to look at, and you'll know the ones that have disappeared are definitely connected to your buildings power (take a reading before power down and after power down). For future, maybe set up a dedicated PC (something little will do, like a Pi) to constantly monitor APs in the area and keep a decent log. Maybe use Kismet or airodump-ng. You can then see the APs that stick around long-term and the ones that have cropped up recently.
  20. Thank you. Doh, silly me, couldn't see the wood for the trees I'm now attempting to pipe this to Remove-WMIObject; Get-WMIObject -Computer $computer -Class Win32_UserProfile | where {($_.LocalPath -eq $profile)} | Remove-WMIObject But it get... Remove-WMIObject : + ... q $profile)} | Remove-WMIObject + ~~~~~~~~~~~~~~~~ + CategoryInfo : NotSpecified: (:) [Remove-WmiObject], ArgumentException + FullyQualifiedErrorId : System.ArgumentException,Microsoft.PowerShell.Commands.RemoveWmiObject
  21. Hi all, This works fine... Get-WMIObject -Class Win32_UserProfile | Select -Expandproperty LocalPath However, the following does not. What am I doing wrong with the syntax here? Get-WMIObject -Class Win32_UserProfile | where {($.LocalPath -eq 'C:\Users\JoeBloggs')} $.LocalPath : The term '$.LocalPath' is not recognized as the name of a cmdlet, function, script file, or operable program. Check the spelling of the name, or if a path was included, verify that the path is correct and try again. At line:1 char:50 + Get-WMIObject -Class Win32_UserProfile | where {($.LocalPath -eq 'C:\Users\JoeBloggs ... + ~~~~~~~~~~~ + CategoryInfo : ObjectNotFound: ($.LocalPath:String) [], CommandNotFoundException + FullyQualifiedErrorId : CommandNotFoundException
  22. https://www.aircrack-ng.org/ has everything you'll ever need. Click 'Wiki' on the left, then scroll down to the 'Documentation' header.
  23. 0phoi5

    WPA3

    I smell exploits for this on the horizon.
×
×
  • Create New...