The following chipsets are supported by default in most, if not all, NetHunter kernels:
Atheros
▪️ATH9K_HTC (AR9271, AR7010)
▪️ATH10K
Ralink
▪️RT73
▪️RT2800USB
▪️RT3070
Realtek
▪️RTL8188EUS
▪️RTL8188CU
▪️RTL8188RU
▪️RTL8192CU
▪️RTL8192EU
▪️RTL8723AU
▪️RTL8811AU
▪️RTL8812AU
▪️RTL8814AU
▪️RTL8821AU
▪️RTW88-USB
MediaTek
▪️MT7601U (Product may come with Ralink Technology Corp.)
▪️MT7612U
Qualcomm internal wifi chipsets (wlan0)
▪️QCACLD-2.0 (fully supported✅)
▪️QCACLD-3.0 (Monitor mode only)
The following devices are confirmed to be working with a NetHunter build:
TP-Link TL-WN722N v1 (Please note that v2 & v3 have unsupported chipsets) but v2 and v3 may be supported using RTL8812AU drivers.)
▪️TP-Link TL-WN822N v1 - v4
▪️Alfa Networks AWUS036ACH
▪️Alfa Networks AWUS036NEH (recommended by @jcadduono)
▪️Alfa Networks AWUS036NHA
▪️Alfa Networks AWUSO36NH
▪️Panda PAU05 Nano
The following devices are confirmed to be partially working with a NetHunter build:
Alfa Networks AWUS051NH (dual band 5 GHz support may be unreliable)
Atheros
▪️ATH9K_HTC (AR9271, AR7010)
▪️ATH10K
Ralink
▪️RT73
▪️RT2800USB
▪️RT3070
Realtek
▪️RTL8188EUS
▪️RTL8188CU
▪️RTL8188RU
▪️RTL8192CU
▪️RTL8192EU
▪️RTL8723AU
▪️RTL8811AU
▪️RTL8812AU
▪️RTL8814AU
▪️RTL8821AU
▪️RTW88-USB
MediaTek
▪️MT7601U (Product may come with Ralink Technology Corp.)
▪️MT7612U
Qualcomm internal wifi chipsets (wlan0)
▪️QCACLD-2.0 (fully supported✅)
▪️QCACLD-3.0 (Monitor mode only)
The following devices are confirmed to be working with a NetHunter build:
TP-Link TL-WN722N v1 (Please note that v2 & v3 have unsupported chipsets) but v2 and v3 may be supported using RTL8812AU drivers.)
▪️TP-Link TL-WN822N v1 - v4
▪️Alfa Networks AWUS036ACH
▪️Alfa Networks AWUS036NEH (recommended by @jcadduono)
▪️Alfa Networks AWUS036NHA
▪️Alfa Networks AWUSO36NH
▪️Panda PAU05 Nano
The following devices are confirmed to be partially working with a NetHunter build:
Alfa Networks AWUS051NH (dual band 5 GHz support may be unreliable)
👍1
¶¶ wordlist
#termux
Generateing wordlist using python.
Execute these commands one by one to install sudo.
Installation :
📍apt update
📍apt upgrade
📍apt install python
📍pip install wordlist
📍wordlist -h [to see all options]
📍wordlist -m 4 -M 6 -o wordlist.txt 12345678
-m = minimum length
-M = maximum length
wordlist.txt = to save all words
12345678 = here you can type alphabets also to make wordlist.
name : wordlist.txt
📍ls
📍cat wordlist.txt
here you get all words means passwords list...
#termux
Generateing wordlist using python.
Execute these commands one by one to install sudo.
Installation :
📍apt update
📍apt upgrade
📍apt install python
📍pip install wordlist
📍wordlist -h [to see all options]
📍wordlist -m 4 -M 6 -o wordlist.txt 12345678
-m = minimum length
-M = maximum length
wordlist.txt = to save all words
12345678 = here you can type alphabets also to make wordlist.
name : wordlist.txt
📍ls
📍cat wordlist.txt
here you get all words means passwords list...
👍2
¶¶ Explore more than 2000 hacking articles saved over time as PDF. BROWSE HISTORY.v👇👇
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE
GitHub
GitHub - blaCCkHatHacEEkr/PENTESTING-BIBLE: articles
articles. Contribute to blaCCkHatHacEEkr/PENTESTING-BIBLE development by creating an account on GitHub.
👍1
Termux
¶¶ ESP8266-CH340 Developmemt board Its like a wifi jammer & Disconnect all nearby wifi . #NodeMCU #5v Scan for WiFi devices, block selected connections, create dozens of networks and confuse WiFi scanners install drivers (windows) according to your item…
#airgeddon (VIF) not supported problem
use it to disconnect wifi networks ...
#esp8266 #wifiphishing
--nojamming option. This will turn off the de-authentication attack though.
use it to disconnect wifi networks ...
#esp8266 #wifiphishing
--nojamming option. This will turn off the de-authentication attack though.
wifite2.zip
4.6 MB
Current version: 2.6.2
installation:-
cp /sdcard/Download/Telegram/wifite2.zip ./ ;unzip wifite2.zip;rm -rf wifite2.zip;cd wifite2;ls
sudo python3 setup.py install
cp wordlist-probable.txt /usr/share/dict
required packages:
make deps
make hcxtools
make hcxdumptool
make bully
make reaver
make hashcat
make pyrit
installation:-
cp /sdcard/Download/Telegram/wifite2.zip ./ ;unzip wifite2.zip;rm -rf wifite2.zip;cd wifite2;ls
sudo python3 setup.py install
cp wordlist-probable.txt /usr/share/dict
required packages:
make deps
make hcxtools
make hcxdumptool
make bully
make reaver
make hashcat
make pyrit
❤1👍1
Termux
wifite2.zip
manually:
📍git clone https://github.com/kimocoder/wifite2
📍cd wifite2
📍sudo python3 setup.py install
📍make help
📍make iw: : pull latest iw from git and install
📍make reaver : pull latest reaver from git and install
📍make hashcat : pull latest hashcat from git and install
📍make bully : pull latest bully from git and install
📍make hcxdumptool : pull latest hcxdumptool from git and install
📍make hcxtools : pull latest hcxtools from git and install
skip if you want below two coomands
make ath_masker : download and build/install ath_masker
make modwifi : download and build/install modwifi
2. Update installed tools or dependencies
📍make update : update tools/dependencies installed from steps above.
skip also
📍make deps : install dependencies needed to compile/run all tools
3. Clean / Tests (
¶¶ To uninstall wifite
¶¶only run make test
📍make test : run runtests.sh 📍make clean : clean setup files / tmp
📍make uninstall : completely remove wifite2 from system
📍make help : THIS HELP MENU!
📍git clone https://github.com/kimocoder/wifite2
📍cd wifite2
📍sudo python3 setup.py install
📍make help
📍make iw: : pull latest iw from git and install
📍make reaver : pull latest reaver from git and install
📍make hashcat : pull latest hashcat from git and install
📍make bully : pull latest bully from git and install
📍make hcxdumptool : pull latest hcxdumptool from git and install
📍make hcxtools : pull latest hcxtools from git and install
skip if you want below two coomands
make ath_masker : download and build/install ath_masker
make modwifi : download and build/install modwifi
2. Update installed tools or dependencies
📍make update : update tools/dependencies installed from steps above.
skip also
📍make deps : install dependencies needed to compile/run all tools
3. Clean / Tests (
¶¶ To uninstall wifite
¶¶only run make test
📍make test : run runtests.sh 📍make clean : clean setup files / tmp
📍make uninstall : completely remove wifite2 from system
📍make help : THIS HELP MENU!
GitHub
GitHub - kimocoder/wifite2: Rewrite of the popular wireless network auditor, "wifite" - original by @derv82
Rewrite of the popular wireless network auditor, "wifite" - original by @derv82 - kimocoder/wifite2
❤1👍1👌1
Termux
#wifiphisher #kali #WiFi #hacking #phishing #macchanger #wirelessusbadapter 2.4/5G By creating a fake login page .its old but work ¶¶ wifiphisher 📍git clone https://github.com/wifiphisher/wifiphisher.git 📍cd wifiphisher 📍sudo python3 setup.py install 📍sudo…
#fixwifiphisher
#update #cm
📍sudo apt-get update && sudo apt-get upgrade
📍apt install wifiphisher
📍apt-get install libnl-3-dev libnl-genl-3-dev
📍pip install setuptools
📍python -m pip install --upgrade pip setuptools
📍apt-get install python-setuptools
|| if you want to install from git
📍git clone https://github.com/wifiphisher/wifiphisher.git
📍apt-get install libnl-3-dev libnl-genl-3-dev
📍cd wifiphisher
📍sudo python setup.py install
|| connect your wifi adapter
in new ternimal
sudo airmon-ng start wlan1
~# wifiphisher -i wlan1 (if you get any error try below command)(Reboot)
roguehostapd -----|||
cd
📍git clone https://github.com/wifiphisher/roguehostapd.git
📍cd roguehostapd
📍python setup.py install
exit
📍sudo wifiphisher --force-hostapd
This Will Start wifiphisher
¶¶ Use firmware update method
#update #cm
📍sudo apt-get update && sudo apt-get upgrade
📍apt install wifiphisher
📍apt-get install libnl-3-dev libnl-genl-3-dev
📍pip install setuptools
📍python -m pip install --upgrade pip setuptools
📍apt-get install python-setuptools
|| if you want to install from git
📍git clone https://github.com/wifiphisher/wifiphisher.git
📍apt-get install libnl-3-dev libnl-genl-3-dev
📍cd wifiphisher
📍sudo python setup.py install
|| connect your wifi adapter
in new ternimal
sudo airmon-ng start wlan1
~# wifiphisher -i wlan1 (if you get any error try below command)(Reboot)
roguehostapd -----|||
cd
📍git clone https://github.com/wifiphisher/roguehostapd.git
📍cd roguehostapd
📍python setup.py install
exit
📍sudo wifiphisher --force-hostapd
This Will Start wifiphisher
¶¶ Use firmware update method
GitHub
GitHub - wifiphisher/wifiphisher: The Rogue Access Point Framework
The Rogue Access Point Framework. Contribute to wifiphisher/wifiphisher development by creating an account on GitHub.
👍1
Kunyu:-- More Efficient Corporate Asset Collection.
Application scenario:-
1. Forgotten and isolated assets in the enterprise are identified and added to security management.
2. Perform quick investigation and statistics on externally exposed assets of the enterprise.
3. Red and blue are used against related requirements, and batch inspections of captured IPs are performed.
4. Collect vulnerable assets in batches (0day/1day) for equipment and terminals within the impact.
5. Information on sites involved in new-type cybercrime cases is quickly collected and merged for more efficient research, judgment, and analysis.
6. Statistic and reproduce the fragile assets on the Internet that are affected by related vulnerabilities.
#Download #Link:-
https://github.com/knownsec/Kunyu
Visit Us : https://ncybersecurity.com
Twitter : https://twitter.com/NationalCyberS1
LinkedIn : https://in.linkedin.com/company/national-cyber-security-services
Application scenario:-
1. Forgotten and isolated assets in the enterprise are identified and added to security management.
2. Perform quick investigation and statistics on externally exposed assets of the enterprise.
3. Red and blue are used against related requirements, and batch inspections of captured IPs are performed.
4. Collect vulnerable assets in batches (0day/1day) for equipment and terminals within the impact.
5. Information on sites involved in new-type cybercrime cases is quickly collected and merged for more efficient research, judgment, and analysis.
6. Statistic and reproduce the fragile assets on the Internet that are affected by related vulnerabilities.
#Download #Link:-
https://github.com/knownsec/Kunyu
Visit Us : https://ncybersecurity.com
Twitter : https://twitter.com/NationalCyberS1
LinkedIn : https://in.linkedin.com/company/national-cyber-security-services
👍2👌1
This media is not supported in your browser
VIEW IN TELEGRAM
|| Wifi-Crack
#handshake #pkmid #aAuth #dauth #bflood #etwin
#phishing
📍git clone https://github.com/Gurpreet06/Wifi-Crack
📍cd Wifi-Crack
📍ls
📍pip3 install -r requirements.txt
📍python3 wifiCrack.py
[!] Usage: sudo python3 wifiCrack.py -i <Network interface> -m <Attack mode
[-i] Network interface
[-m] Attack mode
Handshake (Capture a handshake)
PKMID (Clientless attack)
AAuth (Authentication Denial-Of-Service)
DAuth (Deauthentication attack)
BFlood (Beacon flooding attack)
ETwin (Evil Twin attack)
Usage : sudo python3 wifiCrack.py -i wlan0 -m handshake / PKMID / AAuth / DAuth / BFlood / ETwin
📍sudo python3 wifiCrack.py -i wlan1 -m ETwin
#handshake #pkmid #aAuth #dauth #bflood #etwin
#phishing
📍git clone https://github.com/Gurpreet06/Wifi-Crack
📍cd Wifi-Crack
📍ls
📍pip3 install -r requirements.txt
📍python3 wifiCrack.py
[!] Usage: sudo python3 wifiCrack.py -i <Network interface> -m <Attack mode
[-i] Network interface
[-m] Attack mode
Handshake (Capture a handshake)
PKMID (Clientless attack)
AAuth (Authentication Denial-Of-Service)
DAuth (Deauthentication attack)
BFlood (Beacon flooding attack)
ETwin (Evil Twin attack)
Usage : sudo python3 wifiCrack.py -i wlan0 -m handshake / PKMID / AAuth / DAuth / BFlood / ETwin
📍sudo python3 wifiCrack.py -i wlan1 -m ETwin
❤2👌1
DNSdumpster.com is a FREE domain research tool that can discover hosts related to a domain. Finding visible hosts from the attackers perspective is an important part of the security assessment process 👇👇
📍https://dnsdumpster.com/
¶¶ Use Nmap to find open ports on Internet facing systems with this online port scanner.
Test servers, firewalls and network perimeters with Nmap Online providing the most accurate port status of a systems Internet footprint. It is simply the easiest way to perform an external port scan.👇👇
📍https://hackertarget.com/nmap-online-port-scanner/
📍https://dnsdumpster.com/
¶¶ Use Nmap to find open ports on Internet facing systems with this online port scanner.
Test servers, firewalls and network perimeters with Nmap Online providing the most accurate port status of a systems Internet footprint. It is simply the easiest way to perform an external port scan.👇👇
📍https://hackertarget.com/nmap-online-port-scanner/
👍1
Termux
Install ALFA AC1200 AWUS036ACH Driver On Kali Linux #adapter #kalitools #wifiadapter wifiadapter ¶¶ Realtek rtl8812au ¶¶kali https://cybersudo.org/install-alfa-ac1200-awus036ach-driver-on-kali-linux/ ¶¶ For windows https://docs.alfa.com.tw/Product/AWUS036ACH/
YouTube
Best Wifi Adapter for Ethical Hacking
In this video I talk about the best wifi adapters for ethical hacking based in my experience with the tool, als with other professionals opnion and review.
Discord link:
https://discord.gg/8nZWhQhT
Discord link:
https://discord.gg/8nZWhQhT
Termux
¶¶ Router scan v.26/ Crack WPS link= http://stascorp.com open on chrome change lang to english Click on download and get latest version (2.6) install on system extract all . change timeOut setting according to your need let it run and wait . add extra keys…
Media is too big
VIEW IN TELEGRAM
¶¶ RouterScan v2.6 Beta by Stas'M (1994215-master build on 20201018-2022)
#update
for router default username and password
it collects bssid/essid /key/wps-pin/
to Crack wps pin click on Wireless Network and enable discovery . use alfa adapter if u have it has list of default wps pin for many routers..
¶¶ On google search ip range with country. or search for a city and collect as many .
add like this
122.254.89.0-122.254.89.255
57.73.208.0-57.73.208.255
49.244.0.1-49.244.0.255
------------------------
192.168.1.1 ----single ip address
192.168.1.0-192.168.1.255 -- plain range, 1st & lsst
172.16.0.0/12 --- masked range/ip - mask bits
10.0-4.0.1,125 ---- nmal style octet range
add as many for good result .it might take 1 to 5hours depending on the list added .
¶¶ Youtube link : https://youtu.be/zFzl_f9LSEs
#update
for router default username and password
it collects bssid/essid /key/wps-pin/
to Crack wps pin click on Wireless Network and enable discovery . use alfa adapter if u have it has list of default wps pin for many routers..
¶¶ On google search ip range with country. or search for a city and collect as many .
add like this
122.254.89.0-122.254.89.255
57.73.208.0-57.73.208.255
49.244.0.1-49.244.0.255
------------------------
192.168.1.1 ----single ip address
192.168.1.0-192.168.1.255 -- plain range, 1st & lsst
172.16.0.0/12 --- masked range/ip - mask bits
10.0-4.0.1,125 ---- nmal style octet range
add as many for good result .it might take 1 to 5hours depending on the list added .
¶¶ Youtube link : https://youtu.be/zFzl_f9LSEs
This media is not supported in your browser
VIEW IN TELEGRAM
📍git clone https://github.com/CyBerGuArD-cell/CyBerGuArD-cell.git
📍cd CyBerGuArD-cell
📍python2 systemboom.py
📍 target ip :
📍port :
📍cd CyBerGuArD-cell
📍python2 systemboom.py
📍 target ip :
📍port :
SQL-injection – GUI Java Application for Automatic SQL Database Injection
jSQL Injection is a Java application for automatic SQL database injection with multiple injection strategies and also inject webshell and also lightweight application used to find database information from a distant server.
Installation : https://xploitlab.com/jsql-injection-gui-java-application-for-automatic-sql-database-injection/
jSQL Injection is a Java application for automatic SQL database injection with multiple injection strategies and also inject webshell and also lightweight application used to find database information from a distant server.
Installation : https://xploitlab.com/jsql-injection-gui-java-application-for-automatic-sql-database-injection/
|| Wifi-Cracking (Part 1 to 4)
Target Hidden networks
Bypass MAC filtering
Methods to gain access on
Captive portals
WEP, WPA, WPA2
Fake Access Points
WPA Enterpris
https://github.com/noob-atbash/wifi-cracking
https://github.com/noob-atbash/wifi-cracking/blob/master/wifi-crackingP2.md
https://github.com/noob-atbash/wifi-cracking/blob/master/wifi-crackingP3.md
https://github.com/noob-atbash/wifi-cracking/blob/master/wifi-crackingP4.md
Target Hidden networks
Bypass MAC filtering
Methods to gain access on
Captive portals
WEP, WPA, WPA2
Fake Access Points
WPA Enterpris
https://github.com/noob-atbash/wifi-cracking
https://github.com/noob-atbash/wifi-cracking/blob/master/wifi-crackingP2.md
https://github.com/noob-atbash/wifi-cracking/blob/master/wifi-crackingP3.md
https://github.com/noob-atbash/wifi-cracking/blob/master/wifi-crackingP4.md
👍1
How to Enable Monitor Mode on
TP-LINK TL-WN722N V2/V3 in 2022?
#wifiadapter wifiadapter
plug in
📍lsusb ( to check if its connected
📍sudo apt update && sudo apt upgrade
reboot
¶¶ Now Install Kali Linux headers for your kali Linux
📍sudo apt install linux-headers-$(uname -r)
📍sudo apt install bc
📍sudo rmmod r8188eu.ko
📍cd Dekstop
📍git clone https://github.com/aircrack-ng/rtl8188eus
📍cd rtl8188eus
📍echo "blacklist r8188eu" > "/etc/modprobe.d/realtek.conf"
reboot
📍cd Desktop
📍cd rtl8188eus
📍make ( in here if you get any error search google or its not supported )
📍sudo make install
📍sudo modprobe 8188eu
¶¶ Enabled Monitor Mode
Every time when you want to enabled monitor mode. run the following commands.
📍sudo ifconfig wlan0 down
📍sudo airmon-ng check kill
📍sudo iwconfig wlan0 mode monitor
📍sudo ifconfig wlan0 up
📍sudo iwconfig
¶¶ Method-2 =
https://youtu.be/tYnjMiTTdms
https://www.tp-link.com/en/support/download/archer-t2u/v1/
TP-LINK TL-WN722N V2/V3 in 2022?
#wifiadapter wifiadapter
plug in
📍lsusb ( to check if its connected
📍sudo apt update && sudo apt upgrade
reboot
¶¶ Now Install Kali Linux headers for your kali Linux
📍sudo apt install linux-headers-$(uname -r)
📍sudo apt install bc
📍sudo rmmod r8188eu.ko
📍cd Dekstop
📍git clone https://github.com/aircrack-ng/rtl8188eus
📍cd rtl8188eus
📍echo "blacklist r8188eu" > "/etc/modprobe.d/realtek.conf"
reboot
📍cd Desktop
📍cd rtl8188eus
📍make ( in here if you get any error search google or its not supported )
📍sudo make install
📍sudo modprobe 8188eu
¶¶ Enabled Monitor Mode
Every time when you want to enabled monitor mode. run the following commands.
📍sudo ifconfig wlan0 down
📍sudo airmon-ng check kill
📍sudo iwconfig wlan0 mode monitor
📍sudo ifconfig wlan0 up
📍sudo iwconfig
¶¶ Method-2 =
https://youtu.be/tYnjMiTTdms
https://www.tp-link.com/en/support/download/archer-t2u/v1/