Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

91 total results found

1. Monitor Mode & Randomized MAC

wireless

Check Network Adapters iwconfig Cofigure Monitor Mode Standard Mode should be Mode:Managed and Power Management: off Powerdown wifi card ifconfig wlan0 down Kill all programs using the wireless card: airmon-ng check kill change mode to Monitor iwconfig wlan...

2. Pre Connection Attacks

wireless

I am assuming you already did this: >>you need to prepare your network card like here<< Scan Networks airodump-ng wlan0 You should see something like this: let's break this down: BSSID Is the MAC Address of the Network PWR Is the signal strenght or power. Th...

3. WiFi Bands and Frequencies

wireless

Now I'd like to talk about WiFi Bands. The Band defines what frequencies it uses to broadcast the signal. That means it also defines the Frequency the Client must have to be able to support and use in order to connect to the network. The most common frequencie...

4. Targeted Packet Sniffing

wireless

After scanning via airodump-ng you get like previous stated a similar output like this: Pic a target network like shown in the ESSID airodump-ng --bssid 11:22:33:44:55:55 --channel 5 --write ~/test-01 wlan0 You will see someting like this: Now you'll get se...

5. Gaining Access - WEP Cracking

wireless

Basics WEP means: Wired Equvalent Privacy It's an old encryption Uses an algorythm called RC4 Still used in some networks Can be cracked easily How Encryption works Each Package is encrypted via a unique Keystream Random Initialization Vector (IV) is used ...

8. WPA and WPA2 Cracking

wireless

Both, WPA and WPA2 can be cracked using the same methods. They are made ti adress the issues in WEP and made much more secure. Each packet is encrypted using a unique tempoary key. Packets contain no useful information WPA and WPA2 Cracking both can be crac...

6. Fake Authentication Attack

wireless

Why do we the fake Auth? APs can only communicate with connected Clients If we aren't connected, we even cant start the attack therefore we need the Fake Auth Attack Scan networks airodump-ng wlan0 Get desired BSSID from Network you want to attack Collect...

7. WEP Cracking

wireless

If the Network isn't busy we need to force the AccessPoint to generate new packages. We are doing that via ARP Request Replay. We wait for an ARP packet, capture it and replay it. This causes the AP to produce another packet with a new IV. We are doing this un...

9. Practice

wireless

I am assuming you already have Monitor Mode active We want to check all the networks which have WPS Activated: wash --interface wlan0

Part 1: Prerequisites

How - To GPU - Passtrough

Before we begin, let's install some necessary packages: sudo apt install libvirt-daemon-system libvirt-clients qemu-kvm qemu-utils virt-manager ovmf Enable required services sudo systemctl enable --now libvirtd You should add your user to libvirt group (many ...

Alpaca Electron

Alpaca LLAMA

Alpaca Electron Alpaca Electron is built from the ground-up to be the easiest way to chat with the alpaca AI models. No command line or compiling needed! 📃 Features + to-do Runs locally on your computer...

[need review] Stable Diffusion AMD Debian ROCm

Stable Diffusion AMD - rocm Debian

I assume you already have Docker installed Create Stable Diffusion Folder ROCm mkdir SD cd SD Clone ROCm via Docker sudo docker pull rocm/composable_kernel:ck_ub20.04_rocm5.7 Run the Docker container docker run --name rocm -it -v $HOME/Software/docker/sd --d...

apt-mirror

Local Apt-Mirror

Download neccessary packages apt install apt-mirror dpkg-dev apache2 Edit your /etc/apt/mirror.list ############# config ################## # set base_path /var/spool/apt-mirror set mirror_path $base_path/mirror set skel_path $base_path/skel set var_path $bas...

Skip Twitters Ratelimiting

Nitter server - Pass Rate Limiting

Mitigating Unauthorized Web Scraping Bot Traffic The current design of Nitter, along with its methodology for accessing the Twitter service, necessitates heightened vigilance on the part of instance operators to manage unwarranted access by web scraping bots. ...

LXC set mountpoint

Proxmox

pct set 103 -mp0 /host/dir,mp=/container/mount/point

Autostart VM on Boot

Virtualbox

In this guide, we are going to learn how to autostart VirtualBox VMs on system boot on Linux. On a Linux system with VirtualBox installed, you can start VMs automatically during system boot. AutoStart VirtualBox VMs on System Boot on Linux There are multiple w...

Create offline apt-mirror

apt

Deploying a product in an offline environment is a challenge in itself. Software development has evolved around the very concept of the internet, many deployments happen in the Cloud nowadays, and deploying a tool without having any access to it is unusual for...

Reset Local Windows 10 Password (german)

Windows

Startet euren Rechner mit dem Windows 10-Installationsmedium und klickt im Begrüßungsbildschirm "Weiter". Klickt danach unten links auf "Computerreparaturoptionen". In diesem Bildschirm wählt ihr "Problembehandlung". Unter "Erweiterte Optionen" öffn...