Jump to content

digip

Dedicated Members
  • Posts

    8,919
  • Joined

  • Days Won

    144

Contact Methods

  • Website URL
    http://www.ticktockcomputers.com/
  • ICQ
    0

Profile Information

  • Gender
    Male
  • Location
    RnVjayBPZmYh 192.168.100.1
  • Interests
    Forum Rules - https://web.archive.org/web/20150402012023/https://forums.hak5.org/index.php?/topic/7499-read-me-first/

Recent Profile Visitors

76,697 profile views

digip's Achievements

Newbie

Newbie (1/14)

  • Well Followed Rare

Recent Badges

  1. Everyone loves a mentor, but 99% of hacking, is trying something, failing, and then trying again. Best hands-on is by doing. Watching someone do it, still requires the muscle memory, and that only comes from repeatedly doing it over and over. Head over to Vulnhub, download a free VM and then follow the guides that come with them, even if they don't make sense at first. Once you have done a few of them, try one without using a guide and only go on your instinct and ability to recon and assess the objective. The link above that Rkiver gave will also help get you pointed to some fundamentals more specific to a category you may have interest in, such as programming in C, other languages, or various other topics related to the field. Can't run before you walk. Having an understanding of networking alone will be a huge help, so basics like Network+, can help understand the "why" behind how something works, not just the "what did he type next when I get here?"
  2. Nothing to exploit, but if you want to learn search for URL encoding and how it works.
  3. What desktop manager are you using? If Gnome with the default hidden taskbar, go into the tweak tool and enable the taskbar and programs to show in it. That is if I'm following what you're describing.
  4. Boot off a live disc like Kali linux and use chntpw to reset it to whatever you want. You could also use Konboot to do the same thing.
  5. Try airmon-ng to put a network card in monitor mode and survey your location using airodump-ng. With only one network card, you'll have to test per channel one at a time, then stop and start the airodump-ng tool again with a new channel each time, since hopping on all channels, will give poor results and not work properly. Once you locate all the SSID's and can see the signal strength get stronger as you get closer, then try probing for your AP at each location. If anything comes back with a MAC address(BSSID) not supposed to be on your manufacturer list, this is most likely a rouge AP, but not a perfect solution for testing since they can also be spoofed. Ideally scanning locally on the intranet with tools like nmap, would be a quicker way to identify all devices and their MAC addresses, and you can then work out what matches to what location of each AP and the associated SSID when comparing them to the nmap results and an airodump-ng scan, sort of match them together. Once that's mapped out, figure out what doesn't belong if you end up with an a MAC address in airodump-ng, that wasn't on the nmap scan. There are probably better ways or tools to do this for a wifi survey, but I'm just throwing this out there off the top of my head. Documentation from when they were setup would also help you eliminate your devices against rouge ones, other than those that impersonate the MAC of an AP, which is also quite difficult to detect if that is what someone decides to do but you can use airodump-ng to sort them by signal strength and then as you walk closer observe more where they are. If you find that one is really far from where it should be, like at an edge wall of the office, then try doing the same from outside and start narrowing down where it is to find it. Others may say use kismet, as it can do this as well and has some more tools for surveying signal strengths, but I'm not really familiar with the tool, so you'd have to dig in on that one.
  6. No one is going to help you attack someone else's network. Please don't ask questions for help with these types of scenarios.
  7. The executable you created for windows, is it 32 or 64 bit? make sure it matches the victims system.
  8. In bridged mode, you're virtual adapter for the VM gets an IP on the network like a real machine would. It shares the main hosts adapter for real connectivity at all times in any mode, but in bridged, it can be treated like it's another machine on the network. host-only adapter, is so that the VM can only talk between the host machine(windows) and the guest machine(VM), and is isolated - not supposed to be able to see the rest of the network, even if on same subnet. In theory you could setup routes to reach elsewhere, but pretty sure the host-only setup will block this until you add in a bridged adapter and add routes. If you want it in both host-only and on the regular network, you use 2 NIC interfaces, with a bridged interface able to see everything, and the host-only, only sees the host. If a tool you use fails to work, some let you assign an interface to it, so if you want to test something outside the host-only network, you need to tell the tool to use the bridged adapter. For example, netdiscover tool can be assigned to an interface before running, by default I believe it takes eth0 or the first adapter, but to find machines on the network, you'd need to assign it to the bridged adapter. If you set any to NAT, it's as if it's behind a router, which means port forwarding issues and reaching it from other machines becomes a problem, similar to host-only connections, but you can use NAT on multiple VM's in VBOX to create a new network subnet where the HOST machine acts as the router/gateway and then the other VM's only see each other and the HOST. Adding in then a bridged adapter on one of those machines, lets you then pivot between the different networks/subnets. Might be a good idea to read up on networking in general, routes, subnets, network masks, etc. Will make more sense when you have a better understanding of network fundamentals.
  9. digip

    Kali linux

    What desktop interface and theme are you using? Check the second one down -https://bugzilla.redhat.com/show_bug.cgi?id=1329311 May be a bug with the theme, try a different theme or layout
  10. digip

    WPA3

    needs more tinfoil. and bacon.
  11. digip

    WPA3

    WPA3, while being announced, still needs adoption and testing and then support for devices and OS's, which is probably still a year away or more. WPA2 is also still getting updates and patches. Hopefully I'll be able to keep my existing routers and just get updates to support WPA3, but I have a feeling vendors aren't going to be so nice.
  12. digip

    Kali linux

    Yup. We just put that up yesterday.
  13. Offsec has a sample pentest report on their site - https://www.offensive-security.com/reports/sample-penetration-testing-report.pdf It's not however a template, but something to at least see how one company has theirs formatted. I think SANS may also have something on their site, but you'd have to google for it.
  14. I think they also had a storm, lot of rain? http://appleinsider.com/articles/18/01/10/2018-las-vegas-consumer-electronics-show-stymied-by-blackout-heavy-rain-and-flooding
  15. The \r is a carriage return, and \n is new line(line feed). Linux generally treats \n as both in scripts, but if you ever download and open in windows, things like regular notepad, will make it all one line, which windows wants both the carriage return and new line. Notepad++ will treat \n like \r\n depending on how you have the settings, but you can also ctrl+h and set it to extended, to change \r\n to \n and then save it. If you click the icon to show all characters, you will see it adds a CR LF at the end of new lines. Also edit > EOL conversions, change to Unix, will remove CR LF and replace with LF ;)
×
×
  • Create New...