Monthly Archives: November 2019

Home »  2019 »  November

Comments Off on Truck Raspberry Pi Kali – for using besside-ng

Story: I wanted a mobile besside-ng instance running in my truck, why? because I can! First I image kali for raspberry pi to an SD card, and I am not going full headless on this install so be aware of that, although I might be able to now that I think of it…..Hold my zipfizz! (I don’t drink beer or soda) dd if=kali-linux-2019.3-rpi.img of=/dev/sdc status=progress bs=1M I am going to run two wifi devices on this kali, which gets interesting with power…so I hope you already have that figured out. In my example I am running an older raspberry pi device with two lower power usb wifi devices, but I am using a special usb cable that supplements the power to the devices – make sure you don’t just plug both ends into the raspberry pi…… now mount the SD card mount /dev/sdc2 /mnt/ now we want to copy a […]

Comments Off on Build a Pwnagotchi…or two

Still looking at wifi cracking, updating myself on stuff and finding that much of what I taught back in 2015 is still relevant, especially when we tie in the password audit fundamentals…. Anyway, in the process of things me and some friends found pwnagotchi These are fun, almost toys, that help people understand a little bit about wifi networks all around us, and capturing handshakes. I have found that the 2.4ghz wifi on the pi-zero is perfect, and with the screen and a 3d printed case you are in pwnagotchi heaven. Here is my config: main: name: ‘pwnagotchi’ whitelist: – ‘mynet1’ – ‘mynet2’ plugins: grid: enabled: false report: false exclude: – ‘mynet1’ – ‘mynet2’ auto-update: enabled: true AircrackOnly: enabled: true memtemp: enabled: true ui: display: enabled: true type: ‘waveshare_2’ I like to use the AircrackOnly plugin so I get more of the handshakes I have a solid method to crack, […]

Comments Off on UPDATE – Netgear default WPA password..and others

So, I did my work on building those netgear wordlists and cracking rules…and then I fine tuned my google-fu and found “another way” actually a better way really….. Here are a few good links but the essence is that all these wifi router people have specific process to generate default WPA passwords for their devices, and some smart people have figured them out. Netgear seems to follow a process, if your default SSID is NETGEARXX where XX is a number then the common password layout is adjective + noun + 1 to 3 digit number….Here are the links to check out:

Comments Off on SIOCSIFFLAGS: Operation not possible due to RF-kill

Easy enough fix…keep in mind I usually am running Kali linux but this will get many other distros and get you probably 90% there on others. rfkill list all # rfkill list all0: hci0: Bluetooth Soft blocked: yes Hard blocked: no 1: phy0: Wireless LAN Soft blocked: yes Hard blocked: no 2: phy1: Wireless LAN Soft blocked: yes Hard blocked: no now do this to actually turn the block off: rfkill unblock wifirfkill unblock all now you can list it again to make sure, you may need to reboot as well # rfkill list all0: hci0: Bluetooth Soft blocked: no Hard blocked: no 1: phy0: Wireless LAN Soft blocked: no Hard blocked: no 2: phy1: Wireless LAN Soft blocked: no Hard blocked: no

Comments Off on Observation – netgear default wifi

I was having a discussion with a friend of mine on netgear default password for wifi, you know the ones they put on a sticker on the bottom….or top….of a netgear router. More than just Netgear are doing this but that was the one we were particularly discussing. Anyway, we discovered, or I guess it could be just a theory right now because we don’t have enough information actually, that the password consists of two words and a 3 digit number. More specifically it appears to be made of two word, 6 or 7 character words, with the number. So…I thought to myself….what would it look like to build a word list of just using all the English dictionary 6 character words, combine them, then use a hashcat rule to append every combination of 3 digit number on the end? So that is what I made. I looked around on […]