Showing posts with label kali. Show all posts
Showing posts with label kali. Show all posts

2021-09-22

Kali Desktop Experience for Windows Subsystem for Linux

Win-KeX | Kali Linux Documentation

Kex adds the Kali GUI on WSL.  Click the link above for instructions on how to intall WSL, Kex and how to run it.  The notes below are extra settings provided by Riverside of the Wall of Sheep.  The notes are beta at best but it might help for what you need WSL for.










Let the unfuckery begin. 

2018-07-29

Hacker Summer Camp Check List - 2018


UPDATED: 2018.0731

Every year I go through an exercise of sorting through all my gear to figure out which ones I will bring to hacker summer camp.  I always end up bringing more than I need.  But just like any of you, I go by “it’s better to have and not need than to need and not have”.  Don’t deny it… you can all look in your garages, basements and storage units and see how much hacking stuff you’ve accumulated through the years.  And if you’re just starting out, give it a couple of years, and you’ll see what I mean.

NOTE: It's your first DEF CON!?! Awesome, welcome to hacker summer camp! See the DEF CON 3-2-1 Rules below.


Here is my basic hacker summer camp check list:

CASH:
Bring cash, you'll need it for registration.  Using ATMs in or near the con's vicinity is not advised.

LAPTOP and CELL PHONE: (Don't use your work issued laptop or cell)
(1) Burner Laptop
I dual-boot with Kali and Windows. Kali being my main OS, I would also setup a variety of backup VMs in Virtual Box.  Test and get familiar with your VMs before you go.

(1) Burner Cellphone
You'll need one to constantly be in touch with your hacker group. Also helps in keeping tabs on happenings during the con. (Note: If you have an Android, you can look into creating a separate user profile with limited functionality.)


<<eBay is your friend when looking for gear for occasional use.  Remember that these are not your daily comm gear.  You do not need the latest or greatest models or versions.>>

(2) Baofeng Radios UV5R

POWER / ELECTRICITY:
(1) Portable Charger
You’ll need it to charge your phone, and power your #badgelife addiction.

(2) Power Strips
Get a small one to carry around with you, and a big one for your hotel room.  It'll be a plus if your power strip has built in USB charging ports.

<<This is the power strip I use.  The USB ports are 2.4v each.  It saves you from bringing a bunch of power adapters when travelling.>>

(20+) Batteries – AAA, AA, 9-Volts, CR2032, Li-Po
Batteries are always a premium at the con. Bring a lot and share...


STORAGE:
(1) Portable External Hard Drive 1-2 TB
I'd keep all things downloaded from the con in this drive.  Including files and tools you used on your burner  laptop during the con. 

(10-15) Variety of Memory Cards - I know it's a lot. You really never know what you'll need until you get deep into some challenges.  The only ones I actually end up using are the bootables with the Linux distros.


<<I use an Altoids can with 3D printed dividers, a pill box and an actual SD card case I found at the local Daiso.>>

NETWORKING:
(1) 5-Port Switch
(1) Portable WiFi Travel Router
(1) Hi-Gain USB Wireless Long Range Network Adapter
(1) Network Tap
(1) HackRF
(1) Ubertooth
I like network packets, so I need all of these.

CABLES:
(2) 15’ network cables
(Variety) USB cables all kinds – mini, micro, USB-C etc. If you can find an all-in-one cable even better.

<<Here's the one I use.  It'll charge an Apple, Android and USB-C phones.

(1) HDMI cable

MISC:

  • RFID Blocking Sleeve - you are attending hacking con.
  • Duct Tape - if you can't fix it...
  • Super Glue - broke it? glue it back together.
  • Zip Ties - for keeping things together and other security applications.
  • Multi-Tool with Pliers - brute force tools and cutting tools are most welcome.
  • Masking Tape - see Duct Tape
  • Hot Glue Gun - level up for Super Glue
  • Screwdriver Set - level up for multi-tool
  • Permanent Markers - someone always needs one.
  • Portable Speakers - some #badgelife toys might need it.



EXTRAS: (Village Specific Tools)

  • Lock Pick Set

<<Don't forget your lock pick set. Your first DEF CON? Drop-by LPV and grab a starter set.>>


  • Soldering kit
  • Multimeter

SWAG:
Stickers to trade
Hacker Challenge Coins and Poker Chips
Hacker T-Shirts to trade
Booze for goon bribery.

==========================================================

DEF CON 3-2-1 Rule 
In addition to the list of gear, you will also need personal items.  Let the DEF CON 3-2-1 Rule be your guide.  Please take note the guide is a minimum recommendation.  Let's get started...

At a minimum, 3 hours of sleep a day. Sleep, yes, sleep.  Your brain needs it. <Pajamas, toothpaste, tooth brush..etc.> 

At a minimum, 2 meals a day. You will need to eat for energy. Booze and beer all day will only take you so far....  Have snacks <Trail mix, power bars, beef jerky, breath mints,...etc.> in your bag because with everything happening around you will most likely contract a case of *FOMO.  Set aside a couple of hours to eat. Drink water! It helps if you plan to party all night.

At a minimum, 1 shower a day. Showers are good not only for you but also for the rest of us. <3-4 days worth of change of clothes (includes under garments, socks...etc.), shampoo, soap, deodorant, mouthwash ...etc.> "You plus deodorant = everyone wins." Try to avoid crowded elevators on the 3rd day of hacker summer camp. You can thank me later.


*FOMO - "Fear of missing out"
 




2016-01-28

2016.0128.WHY.FIGHT

SOURCE: 
http://resources.infosecinstitute.com/wifite-walkthrough-part-1/#article
http://resources.infosecinstitute.com/wifite-walkthrough-part-2/#article

WHAT IS IT?
In this article series, we will look at a tool named Wifite suitable for automated auditing of wireless networks. Most of you who have experience in wireless pentesting would use tools like airmon-ng, aireplay-ng, airodump-ng, aircrack-ng to crack wireless networks. This would involve a sequence of steps, like capturing a specific numbers of IV’s in case of WEP, capturing the WPA handshake in case of WPA etc, and then subsequently using aircrack-ng to crack the password required for  authentication to the network. Wifite aims to ease this process by using a wrapper over all these tools and thus making it super easy to crack Wifi networks.
Ethical Hacking Training – Resources (InfoSec)

Here is a list of features of Wifite as per its official homepage.
  • sorts targets by signal strength (in dB); cracks closest access points first
  • automatically de-authenticates clients of hidden networks to reveal SSIDs
  • numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc)
  • customizable settings (timeouts, packets/sec, etc)
  • “anonymous” feature; changes MAC to a random address before attacking, then changes back when attacks are complete
  • all captured WPA handshakes are backed up to wifite.py’s current directory
  • smart WPA de-authentication; cycles between all clients and broadcast deauths
  • stop any attack with Ctrl+C, with options to continue, move onto next target, skip to cracking, or exit
  • displays session summary at exit; shows any cracked keys
  • all passwords saved to cracked.txt
  • built-in updater: ./wifite.py -upgrade

RECOMMENDED WIRELESS CARD
Before we start using wifite, make sure you have a proper wireless card that supports packet injection. If you don’t have one, i would suggest that you buy this card.

ALFA 1000mW 1W 802.11b/g USB Wireless WiFi network Adapter with 5dBi Antenna

 

"aireplay-ng" bug info and fix
Note that there is a bug in Wifite that may or may not be there in your particular version of Wifite. The bug basically doesn’t aireplay-ng to function properly and displays an error like aireplay-ng exited unexpectedly . In order to fix this, you will have to make slight modifications in the code of wifite. You can install gedit (apt-get install gedit) which is a text editor and then edit the wifite python script (found in /usr/bin/wifite) using the steps mentioned here. To open wifite, use the command gedit /usr/bin/wifite. This will open up the source code of wifite. Then replace every occurence of cmd = [‘aireplay-ng’, with cmd = [‘aireplay-ng’,’–ignore-negative-one’,

UPDATE to the latest version
Wifite can be found under Applications -> Kali Linux -> Wireless Attacks -> 802.11 Wireless Tools. Also, note that if you are running wifite in a different VM than Kali Linux, then you have to make sure that tools like airmon-ng, aireplay-ng, airodump-ng, aircrack-ng are already installed on that system. This is because Wifite is nothing but a wrapper over all these tools. Before we even start using Wifite, it is better to update to the latest version.



LIST ALL THE COMMANDS and SWITCHES 
In my case, i already have the latest version. In this tutorial, we will be targeting a simple Wifi network with WEP encryption. Just using the command wifite -h will give you a list of all the commands.


Crack some WEP
A very tempting option would be -all which tries to attack every network that it finds. We will try it in later articles in this series. However, first lets take a look at all the targets that we have. To do that, use the command wifite -showb


Once this is done, we can see that wifite has put our network interface card into monitor mode (using airmon-ng) and started to look for clients. After a few more seconds, it will start displaying the list of access points.


Note that as it is mentioned in its feature list (automatically de-authenticates clients of hidden networks to reveal SSIDs), this list will also include hidden access points. Hence, wifite can also be used to find hidden access points. In this case we will attack an access point with the BSSID 00:26:75:02:EF:65 that i have set up for testing purposes. The access point has a simple WEP password 1234567890.


To start attacking an access point, just press Ctrl+C. Wifite will now ask you to choose a target number from the list. The target number for my test network is 1, so let me enter that. Note that if you press Ctrl+C again, it will quit Wifite.


You can now see that Wifite will start attempting to crack the WEP access point using the different known techniques for cracking WEP encryption. After some unsuccessful tries, it has finally begun to start attacking the access points using different techniques for cracking WEP.


Once enough IV’s are being captured, it will automatically start cracking the password.


As we can see, Wifite has successfully figured out the WEP key for the access point. Wifite is an extremely useful tool for cracking wireless networks. As i mentioned previously, you need to have all the tools like airmon-ng, aireplay-ng, airodump-ng, aircrack-ng already installed on your system. To further prove the point, let’s dive into the source code of Wifite.


As we can see, the python code has mentions of calling aireplay-ng. Hence, it is recommended to run Wifite inside Kali linux.  


Crack some WPA
In this article, we will look at cracking access points using WPA-PSK or WPA2-PSK using Wifite.
If you have used tools like airodump-ng, aircrack-ng etc to crack WPA access points before, you would know that the required thing to successfully crack a WPA-PSK network is a captured WPA four-way handshake.


To start wifite for cracking a WPA access point, give it the option -wpa to only target WPA networks. Also, give it a dictionary file as an input for cracking the WPA passphrase with the -dict option. In kali linux, the wordlists are stored at the location /usr/share/wordlists. Wifite will now start scanning for WPA access points.

Press Ctrl+C to give a target number. In my case, the target number is 2 which is an access point i have configured for testing purposes. The access point uses WPA2-PSK encryption with the key as “password”.

Wifite will now start listening for the handshake. Once it has found it, it will automatically start cracking the passphrase using the dictionary file that we supplied.

And as you can see, Wifite has successfully found the passphrase for the access point.
Sometimes, things may not work as smoothly. In order to capture a WPA handshake between the client and the access point, the client has to connect to the wireless network during that period when we are monitoring the network. If the client is already connected, there will be no handshake that is captured. Wifite does this by automatically sending deauthentication packets to a particular client or a broadcast deauthentication packet if it is required. You can specify the time between deauthentication packets using the -wpadt flag. Hence, when the client tries to reconnect to the access point, the handshake is captured.
You can also specify which tool you want to use to crack the passphrase once the four-way handshake has been successfully captured. By default, aircrack-ng is selected. You can also use cowpatty, pyrit or tshark to crack the passphrase.

Another cool option in Wifite is to anonymize your MAC address using the -mac option. Even though it is quite trivial using simple commands or macchanger utility to change the MAC address for a specific interface, it is good to have this feature in the tool itself. However, in order to make this work, you first have to take that specific interface for which you want to change the MAC address down to managed mode if it is in monitor mode previously. You can use the command iwconfig to check all the interfaces that are in monitor mode and then take them down using the command airmon-ng stop interface-name command. As we can see from the image below, the mon0 interface is in monitor mode.

Hence, lets take it down using the command airmon-ng stop mon0
.
Now we can add the -mac option to anonymize the MAC address. As you can see, Wifite is intelligent enough to change the MAC address to something that is similar the existing MAC address of the interface and not to something ridiculous (for e.g AA:BB:CC:DD:EE:FF) which is a giveaway.

And when you stop the capture, Wifite is nice enough to change the MAC address back to the original one.

PHV.DCXXIV.2016.0128


2014-09-26

Nexus 7 (2012) Multi-boot with Kali NetHunter

09/26/2014 - NOTE: Kali NetHunter was just released a few days ago.  As of this time, I'm working on adding the NetHunter as another boot option for the Pwn Pad, therefore triple booting the poor Nexus 7 (2012) with 16GB (no expansion slots).  
Current ROMS:
1. internal (stock Nexus 7) - operational
2. Pwn Pad - operational
3. Kali NetHunter - currently broken (would not boot)
=========Stay Tuned=========

2014-09-14

KALI: the latest and greatest

When new Kali versions are released, won't it be cool if you didn't have to download and reload your current setup from scratch?  Especially when a whole bunch of tool updates, a new kernel, and some cool new features are available.
Well, just run the  commands below from your preferred terminal emulation, and you can update to the latest and greatest using these simple commands:
apt-get update
apt-get dist-upgrade
# If you've just updated your kernel, then:
reboot