#Wireless Penetration Testing Cheat Sheet
##WIRELESS ANTENNA
- Open the Monitor Mode
root@uceka:~# ifconfig wlan0mon down
root@uceka:~# iwconfig wlan0mon mode monitor
root@uceka:~# ifconfig wlan0mon up
function Get-KerberosTicketGrantingTicket | |
{ | |
<# | |
.SYNOPSIS | |
Gets the Kerberos Tickets Granting Tickets from all Logon Sessions | |
.DESCRIPTION | |
Get-KerberosTicketGrantingTicket uses the Local Security Authority (LSA) functions to enumerate Kerberos logon sessions and return their associate Kerberos Ticket Granting Tickets. |
# PowerView's last major overhaul is detailed here: http://www.harmj0y.net/blog/powershell/make-powerview-great-again/ | |
# tricks for the 'old' PowerView are at https://gist.github.com/HarmJ0y/3328d954607d71362e3c | |
# the most up-to-date version of PowerView will always be in the dev branch of PowerSploit: | |
# https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1 | |
# New function naming schema: | |
# Verbs: | |
# Get : retrieve full raw data sets | |
# Find : ‘find’ specific data entries in a data set |
<# | |
.SYNOPSIS | |
This script can bypass User Access Control (UAC) via fodhelper.exe | |
It creates a new registry structure in: "HKCU:\Software\Classes\ms-settings\" to perform UAC bypass and starts | |
an elevated command prompt. | |
.NOTES | |
Function : FodhelperUACBypass | |
File Name : FodhelperUACBypass.ps1 |
#!/usr/bin/python | |
import xml.etree.ElementTree as ET | |
import subprocess | |
import time | |
import os | |
#http://xael.org/pages/python-nmap-en.html | |
import nmap | |
def parseMasscanReport(path): | |
hostsPorts = {} |
import urllib | |
import urllib2 | |
url = 'http://gap.chal.ctf.westerns.tokyo/login.php' | |
flag = 'TWCTF{' | |
table = 'abcdefghijklmnopqrstuvwlyz' | |
table += table.upper() | |
table += '_{}' |
#Wireless Penetration Testing Cheat Sheet
##WIRELESS ANTENNA
root@uceka:~# ifconfig wlan0mon down
root@uceka:~# iwconfig wlan0mon mode monitor
root@uceka:~# ifconfig wlan0mon up
# Add to .bashrc | |
# You're welcome | |
function soocat { | |
socat tcp-l:${2},reuseaddr,fork EXEC:${1} | |
} |
#!/usr/bin/perl | |
use strict; | |
use warnings; | |
my %permution = ( | |
"a" => "a4@&A", | |
"b" => "bB", | |
"c" => "cC", | |
"d" => "dD", |
query IntrospectionQuery { | |
__schema { | |
queryType { name } | |
mutationType { name } | |
subscriptionType { name } | |
types { | |
...FullType | |
} | |
directives { |