Jump to content

b0N3z

Dedicated Members
  • Posts

    1,451
  • Joined

  • Last visited

  • Days Won

    41

Posts posted by b0N3z

  1. @chrizree I would get that when plugging in the Tetra to my pc. Idk if it is something on the pc itself that is causing it or not.  Foxtrot told me that he does not get that ever so I'm thinking a pc thing.

     

    @newbi3 I'm messing with Targeted portals and I'm a little confused.  When making Officeportal.php and coffeeportal.php is the index.php just used to call those files depending on the criteria for the target.  Most basic portals ive seen use the index.php for the html also.

    • Upvote 1
  2. What operating system are you using?  I experienced this same thing and it was a hard drive failure. The first time it was a secondary hdd that was used for storage and the second time it was my main OS hdd.  How many hdd or ssd do you have in your pc? the 3rd time this happened to me, it was a motherboard failure which sucked.  Try the hdd first.

  3. 8 hours ago, skulland said:

    Hello

    thanks for your work ! first ?

    I have a issue when I tried to preview the portal I have a beautiful 403

    and no way to connect to the evil portal

    any solution ?

    thanks ?

    deactivate it then reactivate.  also helps if your on the nano to put the portal your using on the device and not the sd card.

    • Like 1
  4. if you think your girlfriend is cheating on you then obviously you dont trust her and you should move on.  In any relationship, if you dont trust the other person or they dont trust you.... it wont work and will be a lot of stress and heartache.  Find somebody that you trust and show them the world.  

    for the app thing, nobody will help with that because its not your account and that is considered illegal and we dont do illegal things on this forum.  

  5. Hallo, ich benutze einen Google-Übersetzer. Wenn du verstehen kannst, was ich sage, dann sei dir sicher, auf jede mögliche Weise zu helfen. Wenn du es nicht verstehen kannst, tut mir leid. Ich werde mein Bestes geben mit dem eingebauten Übersetzer, den ich habe, und mit einigem gesunden Menschenverstand darüber, mit was Sie versuchen, Hilfe zu bekommen.

  6. As i'm still a newb at adding paths and so on, here is what im trying to do.  On my RPI3, using raspbian, im trying to add my golang path to the root directory so that I can use bettercap with the sudo command.  I know im probably overlooking something or just not quite understanding something.  but bettercap will run without sudo but always tells me it doesnt have permission and when I try to use $ sudo bettercap , my pi tells me that the command is not found.  

    So i need to add my go path to root but im at a loss on how.  I have already added the go path in my .bashrc file from my home directory but being a pi that is not root.   I would just use kali on my pi, but I also want to learn more about linux while im stuck, id still like to learn for future programs.

  7. 3 hours ago, haze1434 said:

    Most of the time, you'll want to go for a Mask Attack.

    Using Windows CMD, this would be something like;

    
    oclHashCat.exe -m 2500 HASHES.txt -a 3 -1 ?l?d?u ?1?1?1?1?1?1?1?1

    (run Hashcat) (hash type is WPA/WPA2) (use HASHES.txt for the hashes to be cracked) (mode Brute-Force) (create '1' as meaning lowercase, uppercase and numbers) (set password as 8 characters in length, so 1 repeated 8 times)

    The above will (I think, I'd need to double check the syntax) crack a WPA2 password that is up to 8 characters in length and contains uppercase, lowercase and numbers.

    You should research the default passwords for the router being pentested; the above mask should be amended to match initially. For example, if you knew the password was 5 letters and 4 numbers, you could use;

    
    -1 ?l?u -2 ?d ?1?1?1?1?1?2?2?2?2

     

    Note the above is a brute-force example, you should exhaust your password files first, such as rockyou, via a dictionary attack;

    
    oclHashCat.exe –m 2500 HASHES.txt DICTIONARY.txt

     

    I go in this order;

    1. Dictionary attacks, using the smallest/quickest dictionary first and the slowest last
    2. Mask attack using likely default password layout
    3. Mask attack using incremental lowercase letters, uppercase letters and numbers, up to 12 digits
    4. Anything past this usually takes too long, so if the above fails, I tend to stop there and admit defeat. You can judge this based on your rig.

    you went further than I. I normally just run a wordlist and call it a day. If I get it cool, if not I move on.  

    • Like 1
  8. my biggest hurdle was figuring out hashcat and converting the pcap to hccapx.  once I had that figured out, it was smooth sailing from there.  Im also going to have to dig into it a bit more and make notes this time lol

  9. 1 minute ago, haze1434 said:

    Could you explain the steps to do this at all? To be honest, I've not really bothered with this in the past. Does it make much of a difference in time to crack?

    Thank you.

    The only reason I exported the individual handshake was because I had multiple handshakes in the same pcap and I wanted to separate each one to its on individual pcap file.  I dont know the exact filter I used in wireshark but you can google wireshark filter for wifi handshake and give it a try.  You only need the first 3 packets of the handshake to crack.  this will make the file smaller and I dont really know if it makes much of a difference unless your pcap is huge, as in it took forever to get the handshake and the file is very large.   Sry I cant be more specific, I quit messing with it after I figured it out and for some reason didnt make any notes on the subject.  probably because beer lol

    • Upvote 1
×
×
  • Create New...