Advanced Search
Search Results
156 total results found
Virtualbox
Stable Diffusion AMD Linux ROCm
This repository contains instructions on how to host your own AI for image generation using stable diffusion with an 8GB VRAM AMD GPU on Linux. This is an affordable and efficient alternative to using Google Colab, which can be quite expensive. Watch this YouT...
My Setup
Install Packages apt install vim curl wget tor torsocks torbrowser-launcher vokoscreen-ng wireshark filezilla thunderbird keepassxy ssh openvpn network-manager-openvpn-gnome kolourpaint zsh tmux screen rsync rclone bridge-utils virt-manager qbittorrent aria2 k...
GPU Passtrough on Linuxmint 21
0: Pretext This Setup requires 2 Graphic Cards (1ntegrated and one internal PCI Graphicscard - or - two internal PCI Graphic Cards) Also I am using and AMD CPU, remember to use the equivalents if you have an intel CPU. Also the Sound setup is for Pulseaudio. I...
Dav Servers
New Page
Fill disks with zeroes dd if=/dev/zero bs=1M of=/dev/sda status=progress Fill disks with random numbers dd if=/dev/urandom bs=1M of=/dev/sda status=progress
FreeBS Server
QubesOS
1. Monitor Mode & Randomized MAC
Check Network Adapters iwconfig Cofigure Monitor Mode Standard Mode should be Mode:Managed and Power Management: off Powerdown wifi card ifconfig wlan0 down Kill all programs using the wireless card: airmon-ng check kill change mode to Monitor iwconfig wlan...
UFW
2. Pre Connection Attacks
I am assuming you already did this: >>you need to prepare your network card like here<< Scan Networks airodump-ng wlan0 You should see something like this: let's break this down: BSSID Is the MAC Address of the Network PWR Is the signal strenght or power. Th...
Set up a Kubernetes cluster
3. WiFi Bands and Frequencies
Now I'd like to talk about WiFi Bands. The Band defines what frequencies it uses to broadcast the signal. That means it also defines the Frequency the Client must have to be able to support and use in order to connect to the network. The most common frequencie...
4. Targeted Packet Sniffing
After scanning via airodump-ng you get like previous stated a similar output like this: Pic a target network like shown in the ESSID airodump-ng --bssid 11:22:33:44:55:55 --channel 5 --write ~/test-01 wlan0 You will see someting like this: Now you'll get se...
5. Gaining Access - WEP Cracking
Basics WEP means: Wired Equvalent Privacy It's an old encryption Uses an algorythm called RC4 Still used in some networks Can be cracked easily How Encryption works Each Package is encrypted via a unique Keystream Random Initialization Vector (IV) is used ...
8. WPA and WPA2 Cracking
Both, WPA and WPA2 can be cracked using the same methods. They are made ti adress the issues in WEP and made much more secure. Each packet is encrypted using a unique tempoary key. Packets contain no useful information WPA and WPA2 Cracking both can be crac...
6. Fake Authentication Attack
Why do we the fake Auth? APs can only communicate with connected Clients If we aren't connected, we even cant start the attack therefore we need the Fake Auth Attack Scan networks airodump-ng wlan0 Get desired BSSID from Network you want to attack Collect...
7. WEP Cracking
If the Network isn't busy we need to force the AccessPoint to generate new packages. We are doing that via ARP Request Replay. We wait for an ARP packet, capture it and replay it. This causes the AP to produce another packet with a new IV. We are doing this un...