@redpanda
redpanda's Comments
An interesting thing to note is that smartphones using the voice over LTE (or soon Voice over wifi) technology, will in some cases use Voip to communicate. So in the future, this kind of thing might work on smartphones
This looks fantastic, and if I can contribute anything of use I will. Just one thing is bothering me though, why organize the github like this?? Why the .tar.gz file and not just plain code files so the code commits can be seen by everyone? people could still DL the whole thing as a zip or just copy the git repo.. it just would be clearer what is added to the suite. Great job on this Defalt !
Some simple words : I use it, I love it.
Ahh the legendary arch "breaking". Maybe this was true for older versions of arch, but it has not happenned to me in at least a year now. Plus with basic linux knowledge you can easily "unbreak" your system or at least the solution is somewhere in the wiki most of the time. Moreover, rolling release does not mean the packages won't be tested, and I think we can be pretty confident in the Offsec guys for the testing.
I have to agree with Kitten, i new versions of kali wlan0mon is the standard name for the monitor interface, plus it is perfectly normal to be disconnected from the network you are on. Mine does this every time and my monitor mode is working fine....
Oh god i feel old seeing your answers. 23, Sysadmin slowly moving to a more security oriented career, learning by myself in order to take security certifications (already have some system ones for linux and solaris )
Really love your python series. Interesting, innocent ways to teach useful capabilities of the language, as a ruby guy trying to learn python this is quite useful. Thanks for your contributions.
Once you have covered the basics with a tutorial, if you like learning by yourself you can always check the secutiry stackexchange : http://security.stackexchange.com/questions/tagged/network i basically learned a lot from looking at this. there's a lot of information there but you have to find it ;)
edit the hosts file of the machine if you have administrator privileges. If you do not, then escalate privileges and edit the file
It looks pretty good that you are reviewing other hacking distros, i like it. I can't wait for the one on BlackArch because it's the one i use as a long time Arch guy. Keep doing this! i still think kali is great but people shouldn't blindly chose it.
Well, wanted to do that one but i changed router and the new one i have is not vulnerable... Good job ! With some routers i've tried on, the reaver process never went past M3 message, never getting E-S1 and Es2 properly, so the pixie dust attack actually never starts. let me know what output you get with the chips that are not working, we could do a little list of the chips we tested.
Why does this have downvotes? the video is pretty nice and just explains about anything you need to do to perform the attack...
Pretty nice following article on the Beef one last time. It seems evryone is posting about mitmf these days on null byte though. Seems like it'd really be worth looking into
just do research on pixie dust attack, there is documentation on the subject.
Thanks for this, i will try that out! if i find any bugs i'll tell you :) really awesome post