Forwarded from UNDERCODE NEWS
Not a whirlwind and we're done: there is no single technology that will stop the corona.
#international
#international
β β β Uππ»βΊπ«Δπ¬πβ β β β
Practice Reverse Engineering with malwares :
[Crackmes.de](http://www.crackmes.de/)
OSX Crackmes
[ESET Challenges](http://www.joineset.com/jobs-analyst.html)
Flare-on Challenges
[Github CTF Archives](http://github.com/ctfs/)
Reverse Engineering Challenges
[xorpd Advanced Assembly Exercises](http://
www.xorpd.net/pages/xchg_rax/snip_00.html)
Virusshare.com
[Contagio](http://contagiodump.blogspot.com/)
Malware-Traffic-Analysis
[Malshare](http://malshare.com/)
Malware Blacklist
[malwr.com](https://malwr.com/)
vxvault
β β β Uππ»βΊπ«Δπ¬πβ β β β
Practice Reverse Engineering with malwares :
[Crackmes.de](http://www.crackmes.de/)
OSX Crackmes
[ESET Challenges](http://www.joineset.com/jobs-analyst.html)
Flare-on Challenges
[Github CTF Archives](http://github.com/ctfs/)
Reverse Engineering Challenges
[xorpd Advanced Assembly Exercises](http://
www.xorpd.net/pages/xchg_rax/snip_00.html)
Virusshare.com
[Contagio](http://contagiodump.blogspot.com/)
Malware-Traffic-Analysis
[Malshare](http://malshare.com/)
Malware Blacklist
[malwr.com](https://malwr.com/)
vxvault
β β β Uππ»βΊπ«Δπ¬πβ β β β
Reverse Engineering
Crackmes
A collection of crackmes for OS X. Send them to me if you have new ones to add!
User submitted (keepβem coming!):
CrackMe_nr1_qwertyoruiop.app.zip
SHA256(CrackMe_nr1_qwertyoruiop.app.zip)= 9a09b12b29f5a76a70dcaa863f777eaceaba68e10d51e20df3ca213df4ac4fcc
β¦
User submitted (keepβem coming!):
CrackMe_nr1_qwertyoruiop.app.zip
SHA256(CrackMe_nr1_qwertyoruiop.app.zip)= 9a09b12b29f5a76a70dcaa863f777eaceaba68e10d51e20df3ca213df4ac4fcc
β¦
Forwarded from UNDERCODE NEWS
The three major operators' fixed-line broadband users have reached 481 million and 4.99 million gigabit users.
#international #Analytiques
#international #Analytiques
Forwarded from UNDERCODE NEWS
Want to set a new high again? Bitcoin "tragically" cutting leek time is coming again!
#Analytiques
#Analytiques
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Nginx server adds Systemd custom service process analysis:
1) Nginx installed using yum command
The systemd service file ends with .service. For example, if you want to create nginx for booting up, if you use the yum install command to install, the yum command will automatically create the nginx.service file. Use the command directly:
systemcel enable nginx.service //starts after booting
Compile and install using source code
2) Manually create the nginx.service service file. And put it in the /lib/systemd/system folder.
3) The content of nginx.service is as follows:
[Unit]
Description=nginx
After=network.target
[Service]
Type=forking
ExecStart=/data/nginx/sbin/nginx
ExecReload=/data/nginx/sbin/nginx -s reload
ExecStop=/data/nginx/sbin/nginx -s quit
PrivateTmp=true
[Install]
WantedBy=multi-user.target
PS: Note that the above ExecStart/ExecReload/ExecStop must be based on your own
Corresponding key description
4) After: Describe the service category
[Service] The setting of service operating parameters
Type=forking is the form of background operation.
ExecStart is the specific operation command of the service.
ExecReload is the restart command.
ExecStop is the stop command.
PrivateTmp=True indicates that the service is assigned an independent temporary Space
Note: The start, restart, and stop commands of [Service] all require the use of absolute paths.
[Install] The related settings of the service installation under the run level can be set to multi-user, that is, the system run level is 3.
Save and exit.
5) Set boot up
systemctl enable nginx.service
Other service commands
systemctl start nginx.service (start nginx service)
systemctl stop nginx.service (stop nginx service)
systemctl enable nginx.service (set boot to start automatically)
systemctl disable nginx.service (stop boot to start automatically)
systemctl status nginx.service (view service Current status)
systemctl restart nginx.service (Restart service)
systemctl list-units --type=service (View all started services)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Nginx server adds Systemd custom service process analysis:
1) Nginx installed using yum command
The systemd service file ends with .service. For example, if you want to create nginx for booting up, if you use the yum install command to install, the yum command will automatically create the nginx.service file. Use the command directly:
systemcel enable nginx.service //starts after booting
Compile and install using source code
2) Manually create the nginx.service service file. And put it in the /lib/systemd/system folder.
3) The content of nginx.service is as follows:
[Unit]
Description=nginx
After=network.target
[Service]
Type=forking
ExecStart=/data/nginx/sbin/nginx
ExecReload=/data/nginx/sbin/nginx -s reload
ExecStop=/data/nginx/sbin/nginx -s quit
PrivateTmp=true
[Install]
WantedBy=multi-user.target
PS: Note that the above ExecStart/ExecReload/ExecStop must be based on your own
Corresponding key description
4) After: Describe the service category
[Service] The setting of service operating parameters
Type=forking is the form of background operation.
ExecStart is the specific operation command of the service.
ExecReload is the restart command.
ExecStop is the stop command.
PrivateTmp=True indicates that the service is assigned an independent temporary Space
Note: The start, restart, and stop commands of [Service] all require the use of absolute paths.
[Install] The related settings of the service installation under the run level can be set to multi-user, that is, the system run level is 3.
Save and exit.
5) Set boot up
systemctl enable nginx.service
Other service commands
systemctl start nginx.service (start nginx service)
systemctl stop nginx.service (stop nginx service)
systemctl enable nginx.service (set boot to start automatically)
systemctl disable nginx.service (stop boot to start automatically)
systemctl status nginx.service (view service Current status)
systemctl restart nginx.service (Restart service)
systemctl list-units --type=service (View all started services)
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Best Prank Apps FOR IOS :
https://itunes.apple.com/us/app/crack-break-it/id448925179?mt=8
https://itunes.apple.com/us/app/prank-stun-gun-app-real-sound-and-vibration/id1120127309?mt=8
https://itunes.apple.com/us/app/dude-your-car/id358055270?mt=8
https://itunes.apple.com/us/app/ghost-lens-scary-photo-video-edit-collage-maker/id860011430?mt=8
http://itunes.apple.com/us/app/optimum/id387231038?mt=8
https://itunes.apple.com/us/app/epic-police-siren-cop-lights-sound-effects/id634138229?mt=8
https://itunes.apple.com/us/app/ifart-the-original-fart-sounds-app/id293760823?mt=8
https://itunes.apple.com/us/app/scary-prank-scary-cam-scary-to-scare-your-friend/id1089549058?mt=8
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Best Prank Apps FOR IOS :
https://itunes.apple.com/us/app/crack-break-it/id448925179?mt=8
https://itunes.apple.com/us/app/prank-stun-gun-app-real-sound-and-vibration/id1120127309?mt=8
https://itunes.apple.com/us/app/dude-your-car/id358055270?mt=8
https://itunes.apple.com/us/app/ghost-lens-scary-photo-video-edit-collage-maker/id860011430?mt=8
http://itunes.apple.com/us/app/optimum/id387231038?mt=8
https://itunes.apple.com/us/app/epic-police-siren-cop-lights-sound-effects/id634138229?mt=8
https://itunes.apple.com/us/app/ifart-the-original-fart-sounds-app/id293760823?mt=8
https://itunes.apple.com/us/app/scary-prank-scary-cam-scary-to-scare-your-friend/id1089549058?mt=8
β β β Uππ»βΊπ«Δπ¬πβ β β β
App Store
Crack & Break it !
Do you like to prank your friends and parents? Have you ever dreamed to crack window, break light bulbs, fluorescent lamps or glass blocks? Did you love to break glass things in your childhood? If yes then this app is for you and it's FREE !!!
Game includesβ¦
Game includesβ¦
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Viewing and clearing metadata
> Meta-information is such an important issue that it was worth covering it already in the first part, but it turned out to be already extensive.
> If you want to know what meta information is and how it can harm, then I will give additional links for reading a little lower, but for now, for now, a brief instruction on how to view and delete meta information from an office file, photo or any other.
Start by installing the mat2 program :
(HTML COMMANDSΒ» RUN WITH TERMINAL)
1) <font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo apt install mat2</font></font>
To view the metadata of any file, run a command like (with the -s option ):
2) <font style="vertical-align: inherit;"><font style="vertical-align: inherit;">mat2 -s / PATH / TO / FILE</font></font>
To clear metadata in files, run a command like this:
3) <font style="vertical-align: inherit;"><font style="vertical-align: inherit;">mat2 / PATH / TO / FILE</font></font>
4) As we remember from the section " How to open a Windows file in Linux ", to access the file system, you need to use mounted disks located along the / mnt / path , for example, the C: / drive is mounted in the / mnt / c directory .
5) For example, I want to view the metadata of the 20191110_080512.jpg file located in the C: \ Users \ MiAl \ Documents \ testing \ foto \ folder . Then the path from Kali Linux to WSL to it will be as follows: /mnt/c/Users/MiAl/Documents/testing/foto/20191110_080512.jpg
6) We substitute this path into the command given above:
<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">mat2 -s /mnt/c/Users/MiAl/Documents/testing/foto/20191110_080512.jpg</font></font>
And here it is - metadata!
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Viewing and clearing metadata
> Meta-information is such an important issue that it was worth covering it already in the first part, but it turned out to be already extensive.
> If you want to know what meta information is and how it can harm, then I will give additional links for reading a little lower, but for now, for now, a brief instruction on how to view and delete meta information from an office file, photo or any other.
Start by installing the mat2 program :
(HTML COMMANDSΒ» RUN WITH TERMINAL)
1) <font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo apt install mat2</font></font>
To view the metadata of any file, run a command like (with the -s option ):
2) <font style="vertical-align: inherit;"><font style="vertical-align: inherit;">mat2 -s / PATH / TO / FILE</font></font>
To clear metadata in files, run a command like this:
3) <font style="vertical-align: inherit;"><font style="vertical-align: inherit;">mat2 / PATH / TO / FILE</font></font>
4) As we remember from the section " How to open a Windows file in Linux ", to access the file system, you need to use mounted disks located along the / mnt / path , for example, the C: / drive is mounted in the / mnt / c directory .
5) For example, I want to view the metadata of the 20191110_080512.jpg file located in the C: \ Users \ MiAl \ Documents \ testing \ foto \ folder . Then the path from Kali Linux to WSL to it will be as follows: /mnt/c/Users/MiAl/Documents/testing/foto/20191110_080512.jpg
6) We substitute this path into the command given above:
<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">mat2 -s /mnt/c/Users/MiAl/Documents/testing/foto/20191110_080512.jpg</font></font>
And here it is - metadata!
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Lastest reports is India's blackout last month, caused by cyber attacks?
#Analytiques
#Analytiques
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Best wifi card fr hackingβ Avaible anywhere, and not the lastest but 100% Kali Linux compatible models:
Acorp WUD-150N (Ralink RT3070L)
Alfa AWUS036H (Realtek RTL8187L)
ASUS USB-N11 (Ralink RT2770)
ASUS USB-N53 (Ralink RT3572)
ASUS USB-N66 (Ralink RT3573)
ASUS WL-160N (Ralink RT2870)
ASUS WL-167g (rev v1, Ralink RT2571)
ASUS WL-167g (rev v2, Ralink RT2571W)
D-Link DWA-110 (rev A1, Ralink RT2571W)
D-Link DWA-121 (rev A1, RalinkRTL8188CUS)
D-Link DWA-123 (rev A1, Ralink RT3370)
D-Link DWA-123 (rev B1, Ralink RT5370)
D-Link DWA-125 (rev A1, Ralink RT3070)
D-Link DWA-125 (rev A2, Ralink RT3070)
D-Link DWA-125 (rev A3, Ralink RT5370)
D-Link DWA-125 (rev B1, Ralink RT5370)
D-Link DWA-126 (Atheros AR9271)
D-Link DWA-127 (rev A1, Ralink RT3070)
D-Link DWA-130 (rev B1, Ralink RT2870)
D-Link DWA-130 (rev D, Atheros AR9170)
D-Link DWA-140 (rev B3, Ralink RT5372)
D-Link DWA-140 (rev C1, Ralink RT2870)
D-Link DWA-160 (rev A1, Atheros AR9170)
D-Link DWA-160 (rev A2, Atheros AR9170)
D-Link DWA-160 (rev B1, Ralink RT2870)
D-Link DWA-160 (rev B2, Ralink RT5572)
D-Link DWL-G122 (rev B1, Ralink RT2571)
D-Link DWL-G122 (rev C1, Ralink RT2571W)
D-Link DWL-G122 (rev E1, Ralink RT2070)
GEMBIRD WNP-UA-002 (Ralink RT3072)
Linksys AE1000 (Ralink RT3572)
Linksys AE3000 (Ralink RT3573)
Linksys WUSB100 (rev v1, Ralink RT2770)
Linksys WUSB100 (rev v2, Ralink RT3070)
Linksys WUSB600N (rev v1, Ralink RT2870)
Linksys WUSB600N rev v2, Ralink RT3572)
Netgear WN111 (rev v2, Atheros AR9170)
Netgear WNA1000 (Atheros AR9170)
Netgear WNA1100 (Atheros AR9271)
Netgear WNDA4100 (Ralink RT3573)
Proware PW-DN4210D (Atheros AR9271)
Sitecom WLA-5000 (Ralink RT3572)
Spark AD-600Z (ZyDAS ZD1211B)
Tenda UH150 (Ralink RT3070)
Tenda W322U (rev v3, Ralink RT5372)
Tenda W322UΠ (rev v1 Ralink RT3072)
Tenda W322UA (Ralink RT3072)
TP-LINK TL-WN322G (ZyDAS ZD1211B)
TP-LINK TL-WN322G (rev v3, Atheros AR9271)
TP-LINK TL-WN422G / NC (rev v1, ZyDAS ZD1211B) *
TP-LINK TL-WN422G / NC (rev v2, Atheros AR9271) *
TP-LINK TL-WN7200ND (rev v1, Ralink RT3070)
TP-LINK TL-WN721N / NC (rev v1, Atheros AR9271) *
TP-LINK TL-WN722N / NC (rev v1, Atheros AR9271) *
TP-LINK TL-WN722N / NC (rev v1, Atheros AR9271) *
TP-LINK TL-WN727N (rev v1, Ralink RT3070)
TP-LINK TL-WN727N (rev v3, Ralink RT5370)
TP-LINK TL-WN821N (rev v2, Atheros AR9170)
TP-LINK TL-WN821N (rev v3, Atheros AR7010)
TP-LINK TL-WN821N (rev v4, Realtek RTL8192CU)
TP-LINK TL-WN822N (rev v1, Atheros AR9170)
TP-LINK TL-WN822N (rev v2, Atheros AR7010)
TRENDnet TEW-424UB (rev v3, Realtek RTL8187B)
TRENDnet TEW-624UB (rev B1, Ralink RT2870)
TRENDnet TEW-624UB (rev D1, Realtek RTL8192CU)
TRENDnet TEW-644UB (Ralink RT2770)
TRENDnet TEW-645UB (Ralink RT2770)
TRENDnet TEW-664UB (rev v1, Ralink RT2870)
U-MEDIA WUB-375L (Ralink RT2770)
Z-Com XN-791 (Ralink RT2770)
ZyXEL NWD2205 (Realtek RTL8192CU)
ZyXEL ZyAIR G-202 (ZyDAS ZD1211B)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Best wifi card fr hackingβ Avaible anywhere, and not the lastest but 100% Kali Linux compatible models:
Acorp WUD-150N (Ralink RT3070L)
Alfa AWUS036H (Realtek RTL8187L)
ASUS USB-N11 (Ralink RT2770)
ASUS USB-N53 (Ralink RT3572)
ASUS USB-N66 (Ralink RT3573)
ASUS WL-160N (Ralink RT2870)
ASUS WL-167g (rev v1, Ralink RT2571)
ASUS WL-167g (rev v2, Ralink RT2571W)
D-Link DWA-110 (rev A1, Ralink RT2571W)
D-Link DWA-121 (rev A1, RalinkRTL8188CUS)
D-Link DWA-123 (rev A1, Ralink RT3370)
D-Link DWA-123 (rev B1, Ralink RT5370)
D-Link DWA-125 (rev A1, Ralink RT3070)
D-Link DWA-125 (rev A2, Ralink RT3070)
D-Link DWA-125 (rev A3, Ralink RT5370)
D-Link DWA-125 (rev B1, Ralink RT5370)
D-Link DWA-126 (Atheros AR9271)
D-Link DWA-127 (rev A1, Ralink RT3070)
D-Link DWA-130 (rev B1, Ralink RT2870)
D-Link DWA-130 (rev D, Atheros AR9170)
D-Link DWA-140 (rev B3, Ralink RT5372)
D-Link DWA-140 (rev C1, Ralink RT2870)
D-Link DWA-160 (rev A1, Atheros AR9170)
D-Link DWA-160 (rev A2, Atheros AR9170)
D-Link DWA-160 (rev B1, Ralink RT2870)
D-Link DWA-160 (rev B2, Ralink RT5572)
D-Link DWL-G122 (rev B1, Ralink RT2571)
D-Link DWL-G122 (rev C1, Ralink RT2571W)
D-Link DWL-G122 (rev E1, Ralink RT2070)
GEMBIRD WNP-UA-002 (Ralink RT3072)
Linksys AE1000 (Ralink RT3572)
Linksys AE3000 (Ralink RT3573)
Linksys WUSB100 (rev v1, Ralink RT2770)
Linksys WUSB100 (rev v2, Ralink RT3070)
Linksys WUSB600N (rev v1, Ralink RT2870)
Linksys WUSB600N rev v2, Ralink RT3572)
Netgear WN111 (rev v2, Atheros AR9170)
Netgear WNA1000 (Atheros AR9170)
Netgear WNA1100 (Atheros AR9271)
Netgear WNDA4100 (Ralink RT3573)
Proware PW-DN4210D (Atheros AR9271)
Sitecom WLA-5000 (Ralink RT3572)
Spark AD-600Z (ZyDAS ZD1211B)
Tenda UH150 (Ralink RT3070)
Tenda W322U (rev v3, Ralink RT5372)
Tenda W322UΠ (rev v1 Ralink RT3072)
Tenda W322UA (Ralink RT3072)
TP-LINK TL-WN322G (ZyDAS ZD1211B)
TP-LINK TL-WN322G (rev v3, Atheros AR9271)
TP-LINK TL-WN422G / NC (rev v1, ZyDAS ZD1211B) *
TP-LINK TL-WN422G / NC (rev v2, Atheros AR9271) *
TP-LINK TL-WN7200ND (rev v1, Ralink RT3070)
TP-LINK TL-WN721N / NC (rev v1, Atheros AR9271) *
TP-LINK TL-WN722N / NC (rev v1, Atheros AR9271) *
TP-LINK TL-WN722N / NC (rev v1, Atheros AR9271) *
TP-LINK TL-WN727N (rev v1, Ralink RT3070)
TP-LINK TL-WN727N (rev v3, Ralink RT5370)
TP-LINK TL-WN821N (rev v2, Atheros AR9170)
TP-LINK TL-WN821N (rev v3, Atheros AR7010)
TP-LINK TL-WN821N (rev v4, Realtek RTL8192CU)
TP-LINK TL-WN822N (rev v1, Atheros AR9170)
TP-LINK TL-WN822N (rev v2, Atheros AR7010)
TRENDnet TEW-424UB (rev v3, Realtek RTL8187B)
TRENDnet TEW-624UB (rev B1, Ralink RT2870)
TRENDnet TEW-624UB (rev D1, Realtek RTL8192CU)
TRENDnet TEW-644UB (Ralink RT2770)
TRENDnet TEW-645UB (Ralink RT2770)
TRENDnet TEW-664UB (rev v1, Ralink RT2870)
U-MEDIA WUB-375L (Ralink RT2770)
Z-Com XN-791 (Ralink RT2770)
ZyXEL NWD2205 (Realtek RTL8192CU)
ZyXEL ZyAIR G-202 (ZyDAS ZD1211B)
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Israeli researchers have identified: Hackers broke into Spotify to forge wiretapping numbers.
#Vulnerabilities
#Vulnerabilities
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WIFI HACKING-KALI-PARROT...
Homemade Pwnbox π / Rogue AP π‘ based on Raspberry Pi β WiFi Hacking Cheatsheets + MindMap π‘
A) WHAT YOU NEED ?
Raspberry Pi 3 Model B+
Micro SD Memory Card 64 Go
Raspberry Pi Case
Alfa WiFi USB Adapter AWUS036NEH
Alfa WiFi USB Adapter AWUS036ACH
BrosTrend WiFi USB Adapter AC1L AC1200 (can be replaced by any adapter supporting AP mode)
USB cable Male to Female
Rii Mini Wireless Keyboard (optional)
Powerbank
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) Download Kali Linux ARM Image for Raspberry Pi: https://www.offensive-security.com/kali-linux-arm-images/
2) Flash Kali Linux ARM Image for Rapberry Pi onto Micro SD Card.
3) Make sure to have Internet connection on PwnBox.
4) Download install scripts/configurations on the PwnBox:
5) git clone https://github.com/koutto/pi-pwnbox-rogueap.git
Important: Edit install script configuration at the top of scripts/install-system.shfile:
Choose Guacamole passwords.
6) Set WiFi interfaces persistent names based on their MAC addresses: wlxaabbccddeeff for a device with MAC address aa:bb:cc:dd:ee:ff.
7) Set MAC addresses of eth0 & wlan0 (built-in interfaces).
8) Set WiFi connection settings.
9) Run install script (will pause at the end of each step in order to allow for manual inspection of command outputs)
10) cd pi-pwnbox-rogueap/scripts
11) ./install-system.sh
Reboot & check correct configuration of network interfaces:
ip a
iwconfig
12) Built-in wired and wireless interfaces should be named eth0 and wlan0 respectively.
13) WiFi USB Adapters should use persistent naming (modern naming convention).
14) AP (PWNBOX_ADMIN) should be started on appropriate wlx*interface.
Configure VNC-over-HTTP on Guacamole:
15) Connect to Guacamole at http://<ip_pwnbox>:8080/guacamole/
16) Go to guacadmin (top right) > Settings > Connections
17) Click on New Connection
Fill connection settings as follows:
Name = pwnbox-vnc
Location = ROOT
Protocol = VNC
Maximum number of connections = 3
Maximum number of connections = 3
Guacamole Proxy Hostname = 127.0.0.1
Guacamole Proxy Port = 4822
Network Hostname = 127.0.0.1
Network Port = 5901
Authentication Password = (password chosen at install when running install-system.sh)
Color depth = True color (32-bit)
Change default credentials:
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WIFI HACKING-KALI-PARROT...
Homemade Pwnbox π / Rogue AP π‘ based on Raspberry Pi β WiFi Hacking Cheatsheets + MindMap π‘
A) WHAT YOU NEED ?
Raspberry Pi 3 Model B+
Micro SD Memory Card 64 Go
Raspberry Pi Case
Alfa WiFi USB Adapter AWUS036NEH
Alfa WiFi USB Adapter AWUS036ACH
BrosTrend WiFi USB Adapter AC1L AC1200 (can be replaced by any adapter supporting AP mode)
USB cable Male to Female
Rii Mini Wireless Keyboard (optional)
Powerbank
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) Download Kali Linux ARM Image for Raspberry Pi: https://www.offensive-security.com/kali-linux-arm-images/
2) Flash Kali Linux ARM Image for Rapberry Pi onto Micro SD Card.
3) Make sure to have Internet connection on PwnBox.
4) Download install scripts/configurations on the PwnBox:
5) git clone https://github.com/koutto/pi-pwnbox-rogueap.git
Important: Edit install script configuration at the top of scripts/install-system.shfile:
Choose Guacamole passwords.
6) Set WiFi interfaces persistent names based on their MAC addresses: wlxaabbccddeeff for a device with MAC address aa:bb:cc:dd:ee:ff.
7) Set MAC addresses of eth0 & wlan0 (built-in interfaces).
8) Set WiFi connection settings.
9) Run install script (will pause at the end of each step in order to allow for manual inspection of command outputs)
10) cd pi-pwnbox-rogueap/scripts
11) ./install-system.sh
Reboot & check correct configuration of network interfaces:
ip a
iwconfig
12) Built-in wired and wireless interfaces should be named eth0 and wlan0 respectively.
13) WiFi USB Adapters should use persistent naming (modern naming convention).
14) AP (PWNBOX_ADMIN) should be started on appropriate wlx*interface.
Configure VNC-over-HTTP on Guacamole:
15) Connect to Guacamole at http://<ip_pwnbox>:8080/guacamole/
16) Go to guacadmin (top right) > Settings > Connections
17) Click on New Connection
Fill connection settings as follows:
Name = pwnbox-vnc
Location = ROOT
Protocol = VNC
Maximum number of connections = 3
Maximum number of connections = 3
Guacamole Proxy Hostname = 127.0.0.1
Guacamole Proxy Port = 4822
Network Hostname = 127.0.0.1
Network Port = 5901
Authentication Password = (password chosen at install when running install-system.sh)
Color depth = True color (32-bit)
Change default credentials:
β β β Uππ»βΊπ«Δπ¬πβ β β β
Kali Linux
Get Kali | Kali Linux
Home of Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.
Forwarded from UNDERCODE NEWS
A large number of users complained about the compatibility of Apple M1 notebook software on the Internet.
#Bugs
#Bugs
Hack facb theorical.pdf
373.1 KB
How to Hack into Facebook without being a Hacker