Quote:
Originally Posted by John VV
it is NOT a kali issue
persistence is a GOOD idea for a LIVE !!!!!! CD !!!!! image on a usb thumb drive
also you SHOULD!!!! use FULL DRIVE ENCRYPTION!!!!!
do you really want a LEO to have FULL access to what you are using kali for ?
as in
using kali for it's intended purpose is NOT something you want LEO's to have access to
|
Good idea, good suggestion, but I am trying to learn pen testing legitimately. Having weird problem on Kali after I boot in I can connect to my WiFi network but I cannot connect to the internet. After boot up I go to iceweasel and then URL and can use internet for 3-4 seconds but after that I get connection timed out error and tab turns to "connecting...".I restart my wifi on off and then am able to connect to internet for 2-3 seconds. Need advice on how to turn promiscuous mode on. Am not using any Virtual box. Here are diagnostics.
root@kali:~# airmon-ng
Interface Chipset Driver
wlan0 Intel 4965AGN iwl4965 - [phy0]
root@kali:~# aircrack-ng
Aircrack-ng 1.2 beta3 - (C) 2006-2013 Thomas d'Otreppe
http://www.aircrack-ng.org
usage: aircrack-ng [options] <.cap / .ivs file(s)>
Common options:
-a <amode> : force attack mode (1/WEP, 2/WPA-PSK)
-e <essid> : target selection: network identifier
-b <bssid> : target selection: access point's MAC
-p <nbcpu> : # of CPU to use (default: all CPUs)
-q : enable quiet mode (no status output)
-C <macs> : merge the given APs to a virtual one
-l <file> : write key to file
Static WEP cracking options:
-c : search alpha-numeric characters only
-t : search binary coded decimal chr only
-h : search the numeric key for Fritz!BOX
-d <mask> : use masking of the key (A1:XX:CF:YY)
-m <maddr> : MAC address to filter usable packets
-n <nbits> : WEP key length : 64/128/152/256/512
-i <index> : WEP key index (1 to 4), default: any
-f <fudge> : bruteforce fudge factor, default: 2
-k <korek> : disable one attack method (1 to 17)
-x or -x0 : disable bruteforce for last keybytes
-x1 : last keybyte bruteforcing (default)
-x2 : enable last 2 keybytes bruteforcing
-X : disable bruteforce multithreading
-y : experimental single bruteforce mode
-K : use only old KoreK attacks (pre-PTW)
-s : show the key in ASCII while cracking
-M <num> : specify maximum number of IVs to use
-D : WEP decloak, skips broken keystreams
-P <num> : PTW debug: 1: disable Klein, 2: PTW
-1 : run only 1 try to crack key with PTW
WEP and WPA-PSK cracking options:
-w <words> : path to wordlist(s) filename(s)
WPA-PSK options:
-E <file> : create EWSA Project file v3
-J <file> : create Hashcat Capture file
-S : WPA cracking speed test
Other options:
-u : Displays # of CPUs & MMX/SSE support
--help : Displays this usage screen
No file to crack specified.
root@kali:~# ifconfig
eth0 Link encap:Ethernet HWaddr 00:1a:6b:3a:17:21
UP BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:0 (0.0 B) TX bytes:0 (0.0 B)
Interrupt:20 Memory:fe200000-fe220000
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:65536 Metric:1
RX packets:8 errors:0 dropped:0 overruns:0 frame:0
TX packets:8 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:480 (480.0 B) TX bytes:480 (480.0 B)
wlan0 Link encap:Ethernet HWaddr 00:13:e8:81:d5:ab
inet addr:192.168.1.147 Bcast:192.168.1.255 Mask:255.255.255.0
inet6 addr: fe80::213:e8ff:fe81:d5ab/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:217 errors:0 dropped:0 overruns:0 frame:0
TX packets:263 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:55102 (53.8 KiB) TX bytes:30761 (30.0 KiB)
root@kali:~# iwconfig
wlan0 IEEE 802.11abgn ESSID:"Budget_Inn"
Mode:Managed Frequency:2.437 GHz Access Point: C4:3D:C7:47:A9:7E
Bit Rate=1 Mb/s Tx-Power=14 dBm
Retry short limit:7 RTS thr

ff Fragment thr

ff
Encryption key

ff
Power Management

ff
Link Quality=39/70 Signal level=-71 dBm
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:0 Invalid misc:21 Missed beacon:0
lo no wireless extensions.
eth0 no wireless extensions.
root@kali:~# dmesg | tail
[ 123.898822] iwl4965 0000:03:00.0: FH49_RSCSR_CHNL0_STTS_WPTR_REG: 0X032f0300
[ 123.898841] iwl4965 0000:03:00.0: FH49_RSCSR_CHNL0_RBDCB_BASE_REG: 0X0032f040
[ 123.898860] iwl4965 0000:03:00.0: FH49_RSCSR_CHNL0_WPTR: 0X000000e0
[ 123.898879] iwl4965 0000:03:00.0: FH49_MEM_RCSR_CHNL0_CONFIG_REG: 0X00819000
[ 123.898898] iwl4965 0000:03:00.0: FH49_MEM_RSSR_SHARED_CTRL_REG: 0X0000003c
[ 123.898917] iwl4965 0000:03:00.0: FH49_MEM_RSSR_RX_STATUS_REG: 0X03530000
[ 123.898936] iwl4965 0000:03:00.0: FH49_MEM_RSSR_RX_ENABLE_ERR_IRQ2DRV: 0X00000000
[ 123.898955] iwl4965 0000:03:00.0: FH49_TSSR_TX_STATUS_REG: 0X07ff0002
[ 123.898973] iwl4965 0000:03:00.0: FH49_TSSR_TX_ERROR_REG: 0X00000000
[ 123.899111] ieee80211 phy0: Hardware restart was requested