#Wireless Penetration Testing Cheat Sheet
##WIRELESS ANTENNA
- Open the Monitor Mode
root@uceka:~# ifconfig wlan0mon down
root@uceka:~# iwconfig wlan0mon mode monitor
root@uceka:~# ifconfig wlan0mon up
HEXRAYS_LICENSE 6.8 | |
USER Giancarlo Russo, HT Srl | |
EMAIL [email protected] | |
ISSUED_ON 2015-05-25 18:07:13 | |
LICENSE_ID PRODUCT # SUPPORT EXPIRES DESCRIPTION | |
--------------- -------- -- ---------- --------- ----------------------------- | |
48-3255-7514-28 IDAPRONW 1 2016-04-08 Never IDA Professional Named License (Windows) | |
48-B055-7514-8E IDAPRONM 1 2016-04-08 Never IDA Professional Named License (Mac) |
#!/usr/bin/env python | |
# sorry this is Python 2 -- the bootloader trigger breaks with Python 3 and I was too lazy to debug | |
import usb, time, struct | |
# Logitech Unifying dongle | |
class unifying_dongle: | |
# constructor |
:: Windows 10 Hardening Script | |
:: This is based mostly on my own personal research and testing. My objective is to secure/harden Windows 10 as much as possible while not impacting usability at all. (Think being able to run on this computer's of family members so secure them but not increase the chances of them having to call you to troubleshoot something related to it later on). References for virtually all settings can be found at the bottom. Just before the references section, you will always find several security settings commented out as they could lead to compatibility issues in common consumer setups but they're worth considering. | |
:: Obligatory 'views are my own'. :) | |
:: Thank you @jaredhaight for the Win Firewall config recommendations! | |
:: Thank you @ricardojba for the DLL Safe Order Search reg key! | |
:: Thank you @jessicaknotts for the help on testing Exploit Guard configs and checking privacy settings! | |
:: Best script I've found for Debloating Windows 10: https://github.com/Sycnex/Windows10Debloater | |
: |
#Wireless Penetration Testing Cheat Sheet
##WIRELESS ANTENNA
root@uceka:~# ifconfig wlan0mon down
root@uceka:~# iwconfig wlan0mon mode monitor
root@uceka:~# ifconfig wlan0mon up
#!/usr/bin/env python3 | |
import serial, time, sys, threading | |
from colorama import Fore, Style, init as colorama_init | |
from termcolor import colored | |
colorama_init() | |
# lock to serialize console output | |
lock = threading.Lock() |
Step #1 - Minicom | |
Проверка работоспособности кабеля и соединения: | |
1.1 Устанавливаем миником | |
sudo apt-get install minicom | |
1.2 Проверяем USB порт | |
ls /dev/ | grep tty | |
1.2 Запускаем в режиме настройки | |
sudo minicom -s |
$ sudo srsenb | |
Built in Release mode using commit f2807205 on branch HEAD. | |
--- Software Radio Systems LTE eNodeB --- | |
Reading configuration file /etc/srslte/enb.conf... | |
Opening 1 RF devices with 1 RF channels... | |
Soapy has found device #0: addr=24607:1027, driver=lime, label=LimeSDR Mini [USB 3.0] 1D3AD5752F4A5A, media=USB 3.0, module=FT601, name=LimeSDR Mini, serial=1D3AD5752F4A5A, | |
[INFO] Make connection: 'LimeSDR Mini [USB 3.0] 1D3AD5752F4A5A' |