Search the Community
Showing results for tags 'detection'.
So I tried testing a few payloads against a Windows 10 Machine running Kaspersky. It seems many network attacks are blocked by any decent firewall/virus scan. Has anyone considered putting together a list of processes in a text file to reference for killing potential anti-virus before running payloads?
Hi, I've been wetting my feet in penetration testing. I've been ramping up on metasploit and aircrack, etc. Now I know that detection evasion is a big topic when it comes to pentesting computers, and servers, etc, but I'm curious about guidelines and evasion techniques for wifi hacking. I've used systems like wifite and aircrack, but how susceptible are these types of attacks to detection, and are there any guidelines to avoid detection? Thank you
Was just curious if anyone has ever tried to use the WiFi Pineapple, or several of them to try and detect any rogue WAPs in the building? I have seen this in commercial WiFi products, but would find this as a cheap solution if I could use a few of these in a building, and feeding into a central management system. Then basically have the option to send deauthentication packets as needed by adding them to the jammer blacklist. Might be a little much for the pineapple but thought I would check. The key might be having a centralized management. Systems like these are becoming a requirement for s
PROBLEM Smart system administrators can setup their IPS/IDS to detect, block and/or alert them at the precense of a pineapple within the area by simply setting up a rule to alert them when a pineapple mac address pops up anywhere on their network. WORKAROUND I have wrote a very clunky script that changes the hostname and mac address automatically on boot to but it's somewhat buggy at the moment and doesn't work every time. SOLUTION There are people here that are much smarter than myself and can do a much better job at writing scripts. Can someone here help the community out and write a si