The dongle itself is sending out data using 802.11a (5 GHz WiFi) with OFDM and 6 Mbit/s data rate:
Radiotap Header v0, Length 38
Header revision: 0
Header pad: 0
Header length: 38
Present flags
| function ConvertTo-ProcessMitigationOption { | |
| [OutputType([String])] | |
| param ( | |
| [Switch] | |
| $DEPEnable, | |
| [Switch] | |
| $DEPATLThunkEnable, | |
| [Switch] |
| ''' | |
| Created on Mar 27, 2011 | |
| @author: hassane | |
| @original: http://code.activestate.com/recipes/577649-dhcp-query/ | |
| @modified: Rusty Myers - June 2016 with much help from @frogor and @bruienne. Thanks! | |
| @requirments: python3 | |
| @function: returns DHCP offer and BSDP list | |
| @notes: BSDP format - https://static.afp548.com/mactips/bootpd.html | |
| ''' |
| curl --include \ | |
| --no-buffer \ | |
| --header "Connection: Upgrade" \ | |
| --header "Upgrade: websocket" \ | |
| --header "Host: example.com:80" \ | |
| --header "Origin: http://example.com:80" \ | |
| --header "Sec-WebSocket-Key: SGVsbG8sIHdvcmxkIQ==" \ | |
| --header "Sec-WebSocket-Version: 13" \ | |
| http://example.com:80/ |
| function Get-WmiNamespace { | |
| <# | |
| .SYNOPSIS | |
| Returns a list of WMI namespaces present within the specified namespace. | |
| .PARAMETER Namespace | |
| Specifies the WMI repository namespace in which to list sub-namespaces. Get-WmiNamespace defaults to the ROOT namespace. |
| ### | |
| ### | |
| ### UPDATE: For Win 11, I recommend using this tool in place of this script: | |
| ### https://christitus.com/windows-tool/ | |
| ### https://github.com/ChrisTitusTech/winutil | |
| ### https://www.youtube.com/watch?v=6UQZ5oQg8XA | |
| ### iwr -useb https://christitus.com/win | iex | |
| ### | |
| ### OR take a look at | |
| ### https://github.com/HotCakeX/Harden-Windows-Security |
| ' Calls WshShell.Exec with c and kills the process tree after the specified timeout t | |
| ' Returns the created WshScriptExec object | |
| Function Exec(c, t) | |
| Dim s, e : Set s = CreateObject("WScript.Shell") : Set e = s.Exec(c) | |
| Do While e.Status = 0 | |
| Call s.Run("waitfor /t 1 OneSecond", 0, True) | |
| t = t - 1 | |
| If 0 >= t Then | |
| Call s.Run("taskkill /t /f /pid " & e.ProcessId, 0, True) | |
| Exit Do |
| function Get-DellFoundationServicesWmiObject { | |
| <# | |
| .SYNOPSIS | |
| Performs a WMI query on a Dell Foundation Services server. | |
| Author: Matthew Graeber (@mattifestation) | |
| License: BSD 3-Clause | |
| .DESCRIPTION |
| echo -----BEGIN CERTIFICATE----- > encoded.txt | |
| echo Just Base64 encode your binary data | |
| echo TVoAAA== >> encoded.txt | |
| echo -----END CERTIFICATE----- >> encoded.txt | |
| certutil -decode encoded.txt decoded.bin |
| #!/bin/bash | |
| # 1 = VMware Tools ISO is mounted from vSphere | |
| # 2 = Download VMware Tools (assumes you can connect to internet) | |
| INSTALL_METHOD=2 | |
| # Thanks to Rich Trouton for tip on Tools being available online | |
| VMWARE_TOOLS_DOWNLOAD_URL=http://softwareupdate.vmware.com/cds/vmw-desktop/fusion/7.1.2/2779224/packages/com.vmware.fusion.tools.darwin.zip.tar | |
| # DO NOT MODIFY BEYOND HERE # |