#Wireless Penetration Testing Cheat Sheet
##WIRELESS ANTENNA
- Open the Monitor Mode
root@uceka:~# ifconfig wlan0mon down
root@uceka:~# iwconfig wlan0mon mode monitor
root@uceka:~# ifconfig wlan0mon up
| #!/usr/bin/env bash | |
| # Open a connection to canternet | |
| exec 3<>/dev/tcp/irc.canternet.org/6667; | |
| # Login and join the channel. | |
| printf "NICK BashBot\r\n" >&3; | |
| printf "USER bashbot 8 * :IRC Bot in Bash\r\n" >&3; | |
| sleep 2; | |
| printf "JOIN #HackingIsMagic\r\n" >&3; |
| http://0-www.sciencedirect.com.www.consuls.org/science?_ob=QuickSearchURL&_method=submitForm&_acct=C000050221&md5=0c4b6db32507e4a332b2aa6dd47a65f4&qs_all={searchTerms}&qs_author=&qs_title=&qs_vol=&qs_issue=&qs_pages=&x=34&y=15 | |
| http://0-dictionary.oed.com.library.utulsa.edu/cgi/findword?query_type=word&queryword={searchTerms} | |
| http://100.daum.net/search/search.do?query={searchTerms} | |
| http://1000corks.com/search?st={searchTerms}&src=myc | |
| http://11870.com/konsulto/{searchTerms} | |
| http://1000memories.com/search?q={searchTerms} | |
| http://130.219.35.129/search?q={searchTerms}&btnG=Google+Search&entqr=0&output=xml_no_dtd&sort=date%3AD%3AL%3Ad1&client=default_frontend&ud=1&oe=UTF-8&ie=UTF-8&proxystylesheet=default_frontend&site=default_collection | |
| http://1337x.org/search/{searchTerms}/0/ | |
| http://11888.ote.gr/web/guest/white-pages/search?who={searchTerms}&where= | |
| http://140.111.34.46/cgi-bin/newDict/dict.sh?idx=dict.idx&cond={searchTerms}&pieceLen=50&fld=1&cat=&imgFont=1 |
#Wireless Penetration Testing Cheat Sheet
##WIRELESS ANTENNA
root@uceka:~# ifconfig wlan0mon down
root@uceka:~# iwconfig wlan0mon mode monitor
root@uceka:~# ifconfig wlan0mon up
| 'use strict'; | |
| const parseExpression = require("./parse-expression"); | |
| function findAll(regex, target) { | |
| let results = [], match; | |
| while (match = regex.exec(target)) { | |
| results.push(match); | |
| } |
| license: mit |
Latest revision: 2025-07-24.
Tested on Ubuntu 24.04 Docker container. The Dockerfile is a single line FROM ubuntu:24.04. Alternatively, you can simply run docker run -it ubuntu:24.04 bash.
NOTE: stopping services didn't work for me for some reason. That's why there is kill $(pidof <service name>) after each failed service <service name> stop to kill it.
| #!/bin/bash | |
| # Usage : ./scanio.sh <save file> | |
| # Example: ./scanio.sh cname_list.txt | |
| # Premium | |
| function ech() { | |
| spinner=( "|" "/" "-" "\\" ) | |
| while true; do | |
| for i in ${spinner[@]}; do | |
| echo -ne "\r[$i] $1" |
| #! /usr/bin/env ruby | |
| # NOTE: Requires Ruby 2.1 or greater. | |
| # This script can be used to parse and dump the information from | |
| # the 'html/contact_info.htm' file in a Facebook user data ZIP download. | |
| # | |
| # It prints all cell phone call + SMS message + MMS records, plus a summary of each. | |
| # | |
| # It also dumps all of the records into CSV files inside a 'CSV' folder, that is created |
| #Tools based on a resolver.rb by @melvinsh | |
| #Repository: https://github.com/melvinsh/subresolve | |
| #Modified by @ehsahil for Personal Use. | |
| require 'socket' | |
| require 'colorize' | |
| begin | |
| domain = ARGV[0] | |
| rescue | |
| puts "Usage: ruby subdomain.rb domain" | |
| exit |