added network section
This commit is contained in:
parent
a5ad1fda21
commit
0ee761dbc6
@ -1,42 +1,7 @@
|
|||||||
-Qt for wayland requires qt5-wayland package and "export QT_QPA_PLATFORM=wayland"
|
-Qt for wayland requires qt5-wayland package and "export QT_QPA_PLATFORM=wayland"
|
||||||
|
|
||||||
-"https://www.iplocation.net/" is pretty useful
|
|
||||||
|
|
||||||
-Changing the MAC address:
|
|
||||||
Using macchanger:
|
|
||||||
The general usage is "macchanger [OPTIONS] interface", the most common options being
|
|
||||||
-A for a random MAC,
|
|
||||||
-r to reset to the original one,
|
|
||||||
-a to change it to a random MAC of some type (same vendor),
|
|
||||||
-b to set the "locally administered" bit set to false or
|
|
||||||
-m XX:XX:XX:XX:XX:XX to manually set the MAC address.
|
|
||||||
Using ifconfig:
|
|
||||||
First disable the interface using "ifconfig <interface> down"
|
|
||||||
Then change the MAC address using "ifconfig <interface> hw ether 00:XX:XX:XX:XX:XX"
|
|
||||||
it has to begin with 00:*
|
|
||||||
Then finally re-enable the interface with "ifconfig <interface> up"
|
|
||||||
To prevent the MAC address from reverting to its original state you can configure the network manager
|
|
||||||
to not scan for other networks using a random MAC address (that is done for security by many OSs and
|
|
||||||
also by phones), to achieve this you have to change the conf. file for your network manager:
|
|
||||||
For GNOME (kali) add {
|
|
||||||
[device]
|
|
||||||
wifi.scan-rand-mac-address=preserve
|
|
||||||
|
|
||||||
[connection]
|
|
||||||
ethernet.cloned-mac-address=preserve
|
|
||||||
wifi.cloned-mac-address=preserve
|
|
||||||
}
|
|
||||||
to /etc/NetworkManager/NetworkManager.conf
|
|
||||||
|
|
||||||
-The network interfaces are named "wlp3s0" for the internal one and "wlp0s20u2" for the alpha networks msfconsole
|
|
||||||
|
|
||||||
-You still have tor and "arm" to monitor it
|
-You still have tor and "arm" to monitor it
|
||||||
|
|
||||||
-IP forwarding:
|
|
||||||
Arch page: https://wiki.archlinux.org/index.php/Internet_sharing_(Italiano)
|
|
||||||
"echo 1 > /proc/sys/net/ipv4/ip_forward"
|
|
||||||
thank me later
|
|
||||||
|
|
||||||
-Docker is pretty cool you should use it, https://www.kali.org/news/official-kali-linux-docker-images/
|
-Docker is pretty cool you should use it, https://www.kali.org/news/official-kali-linux-docker-images/
|
||||||
also works with wifite2, it basically is a shell-oriented low-weight high-performance virtual machine
|
also works with wifite2, it basically is a shell-oriented low-weight high-performance virtual machine
|
||||||
wich can run prebuilt docker images or your personal docker images. Docs: https://docs.docker.com/
|
wich can run prebuilt docker images or your personal docker images. Docs: https://docs.docker.com/
|
||||||
@ -75,11 +40,6 @@
|
|||||||
|
|
||||||
-https://github.com/trustedsec/social-engineer-toolkit
|
-https://github.com/trustedsec/social-engineer-toolkit
|
||||||
|
|
||||||
-Surface programs: Leonardo (drawing), Dolby access (you payed for it)
|
|
||||||
|
|
||||||
-Remember that you have a GL-AR150 mini router with tor, openvpn support and that it is based on openwrt, also:
|
|
||||||
https://github.com/d1slact0r/pineapple-ar150
|
|
||||||
|
|
||||||
-Make some bash scripts you idiot, oh and this could be useful http://patorjk.com/software/taag/#p=display&f=Graffiti&t=Type%20Something%20
|
-Make some bash scripts you idiot, oh and this could be useful http://patorjk.com/software/taag/#p=display&f=Graffiti&t=Type%20Something%20
|
||||||
|
|
||||||
-Upon installing linux, to add locales uncomment them in /etc/locale.gen and then run "locale-gen" as sudo
|
-Upon installing linux, to add locales uncomment them in /etc/locale.gen and then run "locale-gen" as sudo
|
||||||
@ -119,8 +79,6 @@
|
|||||||
Also the same thing has to be done with the xtensa-lx6 compiler (esp32)
|
Also the same thing has to be done with the xtensa-lx6 compiler (esp32)
|
||||||
"https://dl.espressif.com/doc/esp-idf/latest/get-started/linux-setup.html"
|
"https://dl.espressif.com/doc/esp-idf/latest/get-started/linux-setup.html"
|
||||||
|
|
||||||
-Pay attention of those sneaky KDE bastards, mostly everything which begins with k is EVIL
|
|
||||||
|
|
||||||
-Fixing Arduino permissions:
|
-Fixing Arduino permissions:
|
||||||
Source: https://www.howtogeek.com/50787/add-a-user-to-a-group-or-second-group-on-linux/
|
Source: https://www.howtogeek.com/50787/add-a-user-to-a-group-or-second-group-on-linux/
|
||||||
"ls -la /dev/tty*" and see which group TTYs are in, then add yourself to that group:
|
"ls -la /dev/tty*" and see which group TTYs are in, then add yourself to that group:
|
||||||
@ -194,15 +152,6 @@
|
|||||||
use hamster to set session cookies and then in browser set the proxy settings to manual giving the address
|
use hamster to set session cookies and then in browser set the proxy settings to manual giving the address
|
||||||
provided by hamster and finally open that link
|
provided by hamster and finally open that link
|
||||||
|
|
||||||
-To restart network interfaces: "ifdown <interface>" "ifup <interface>" "/etc/init.d/networking restart"
|
|
||||||
(tested working on Ubuntu server and Debian)
|
|
||||||
|
|
||||||
-If airmon-ng doesn't work use "ifconfig <inerface> down" then "iwconfig <interface> mode monitor" and finally
|
|
||||||
"ifconfig <interface> up"
|
|
||||||
|
|
||||||
-To note that "iwconfig" and "ifconfig" are basically equivalent, iwconfig can be used as "iwconfig <interface>"
|
|
||||||
to mask just one interface and it gives more information like the status and mode (managed, monitor)
|
|
||||||
|
|
||||||
-Who are you? "whoami"
|
-Who are you? "whoami"
|
||||||
|
|
||||||
-Where am I? "groups"
|
-Where am I? "groups"
|
||||||
@ -262,3 +211,77 @@
|
|||||||
WantedBy=multi-user.target
|
WantedBy=multi-user.target
|
||||||
}
|
}
|
||||||
And then enable it using "systemctl whatever.service enable"
|
And then enable it using "systemctl whatever.service enable"
|
||||||
|
|
||||||
|
# NETWORK SECTION
|
||||||
|
|
||||||
|
-Gathering information on network cards ie IP, MAC, status, etc.
|
||||||
|
With ifconfig, just type "ifconfig" and it will give:
|
||||||
|
ether: the MAC address
|
||||||
|
inet: the network ip address
|
||||||
|
netmatsk: the netmask duh
|
||||||
|
inet6: the network ipv6
|
||||||
|
With iwconfig (specifically for wireless cards), just type "iwconfig" and it will give:
|
||||||
|
Mode: monitor or managed
|
||||||
|
ESSID: the ESSID (name) of the connected network
|
||||||
|
Frequency
|
||||||
|
Access Point: the MAC address of the AP
|
||||||
|
Signal level: the power/quality of the signal
|
||||||
|
Among other informations
|
||||||
|
Sites for public IP discovery and information gathering:
|
||||||
|
https://www.iplocation.net/
|
||||||
|
http://www.whatsmyip.org/
|
||||||
|
|
||||||
|
-Changing the MAC address:
|
||||||
|
Using macchanger:
|
||||||
|
The general usage is "macchanger [OPTIONS] interface", the most common options being
|
||||||
|
-A for a random MAC,
|
||||||
|
-r to reset to the original one,
|
||||||
|
-a to change it to a random MAC of some type (same vendor),
|
||||||
|
-b to set the "locally administered" bit set to false or
|
||||||
|
-m XX:XX:XX:XX:XX:XX to manually set the MAC address.
|
||||||
|
Using ifconfig:
|
||||||
|
First disable the interface using "ifconfig <interface> down"
|
||||||
|
Then change the MAC address using "ifconfig <interface> hw ether 00:XX:XX:XX:XX:XX"
|
||||||
|
it has to begin with 00:*
|
||||||
|
Then finally re-enable the interface with "ifconfig <interface> up"
|
||||||
|
To prevent the MAC address from reverting to its original state you can configure the network manager
|
||||||
|
to not scan for other networks using a random MAC address (that is done for security by many OSs and
|
||||||
|
also by phones), to achieve this you have to change the conf. file for your network manager:
|
||||||
|
For GNOME (kali) add {
|
||||||
|
[device]
|
||||||
|
wifi.scan-rand-mac-address=preserve
|
||||||
|
|
||||||
|
[connection]
|
||||||
|
ethernet.cloned-mac-address=preserve
|
||||||
|
wifi.cloned-mac-address=preserve
|
||||||
|
}
|
||||||
|
to /etc/NetworkManager/NetworkManager.conf
|
||||||
|
|
||||||
|
-Changing interfaces to monitor mode:
|
||||||
|
Not mandatory but best use is to first use "airmon-ng check kill", this kills all processes
|
||||||
|
that could interfere with the process and later with the attacks
|
||||||
|
Using airmon-ng:
|
||||||
|
Simply use "airmon-ng start <interface>" to put it in monitor mode
|
||||||
|
And "airmon-ng stop <interface>" to revert it to managed
|
||||||
|
NOTE: when using airmon-ng it will change the interface name by adding *mon to its name
|
||||||
|
for example wlan0 becomes wlan0mon
|
||||||
|
Using iwconfig (useful since first method is not always reliable):
|
||||||
|
Disable interface using "ifconfig <interface> down" or "ifdown <interface>"
|
||||||
|
Change to minitor mode with "iwconfig <interface> mode monitor"
|
||||||
|
Re-enable interface with "ifconfig <interface> up" or "ifup <interface>"
|
||||||
|
To revert it back to managed disable the interface then do "iwconfig <interface> mode managed"
|
||||||
|
then re-enable the interface
|
||||||
|
|
||||||
|
-Restarting network interfaces:
|
||||||
|
Without ssh:
|
||||||
|
Disable and re-enable the interface with "ifdown <interface>" and then "ifup <interface>"
|
||||||
|
or "ifconfig <interface> down" and then "ifconfig <interface> up"
|
||||||
|
On ssh:
|
||||||
|
Non systemd "/etc/init.d/networking restart"
|
||||||
|
Systemd (Arch) "systemctl restart NetworkManager"
|
||||||
|
|
||||||
|
-Enabling IP forwarding:
|
||||||
|
Arch page: https://wiki.archlinux.org/index.php/Internet_sharing_(Italiano)
|
||||||
|
"echo 1 > /proc/sys/net/ipv4/ip_forward"
|
||||||
|
To revert it back:
|
||||||
|
"echo 0 > /proc/sys/net/ipv4/ip_forward"
|
||||||
|
Reference in New Issue
Block a user