Nearby0051's Notes
Notes submitted or commented on by Nearby0051
| Id | Creator | Description | Created at | Last changed | |
|---|---|---|---|---|---|
| 2925233 | dylan22hewitt"airdump-ng is used to list all the network around us and display useful information about them. It is a packet sniffer, so it is basically designed to capture all the packets around us while we are in Monitor mode. We can run it against all of the networks around us and collect useful information like the mac address, channel name, encryption type, number of clients connected to the network and then start targeting to the target network. We can also run it against certain AP(access point) so that we only capture packets from a certain Wi-Fi network. Syntax
airodump-ng Note: We can press Ctrl + C to stop the following execution.
BSSID shows the MAC address of the target network
Note: airodump-ng is also used to identify all of the devices connected to the networks around us. |
||||
| 2925178 | No sex |
||||
| 2925231 | Dylan22hewitt"Pre-connection attack is the first part of the network penetration testing. To perform this attack, we will look at the fundamentals like how to show all the networks around us, how to find the details of all the connected devices to a particular network. Once we know about the network and connected devices to it, we can disconnect any device without knowing the password of that device. Following are the basic steps we will be going through to perform Pre-connection attack: Wireless Interface in Monitor mode: In this step, we will change the mode of wireless device as Monitor mode.
|
||||
| 2925226 | dylan22hewittA network is a group of two or more devices that are connected to each other to share the data or share the resource. A network contains a number of different computer system that is connected by a physical or wireless connection like server or router. This router has direct access to the internet. The device can only connect to the internet through the router or access point. For example: Suppose the client or device connected to the network through Wi-Fi or Ethernet. If the client opens the browser and types google.com, then your computer will send a request to the router for asking google.com. The router will go to the internet and request google.com. The router will receive google.com and forward that response to the computer. Now the client can see google.com on the browser as a result. Basic of Network
|
||||
| 2925295 | Demond Mckelvey is 51 years old and currently lives in Lufkin, TX.
Last Known Address
|
||||
| 2925285 | Daniele R. Tant is 36 years old and currently lives in Huntington, TX.
Last Known Address
|
||||
| 2925292 | Hackers |
||||
| 2925218 | dylan22hewitt Network penetration testing is the first penetration testing that we are going to cover in this section. Most of the systems and computers are connected to a network. If a device is connected to the internet, that means the device is connected to the network because the internet is a really big network. Therefore, we need to know that how devices interact with each other in a network, as well as how networks works. Network penetration testing is divided into 3 subsections: Pre-connection attacks: In this section, we will learn about all the attacks that we can do before connecting to a network.
|
||||
| 2925221 | Dylan22hewitt Network penetration testing is the first penetration testing that we are going to cover in this section. Most of the systems and computers are connected to a network. If a device is connected to the internet, that means the device is connected to the network because the internet is a really big network. Therefore, we need to know that how devices interact with each other in a network, as well as how networks works. Network penetration testing is divided into 3 subsections: Pre-connection attacks: In this section, we will learn about all the attacks that we can do before connecting to a network.
|
||||
| 2925268 | Dylan22hewitt"Nmap(Network Mapper) is the second program that we're going to look. It is a huge tool and has many uses. Nmap is used to gather information about any device. Using the Nmap, we can gather information about any client that is within our network or outside our network, and we can gather information about clients just by knowing their IP. Nmap can be used to bypass firewalls, as well as all kinds of protection and security measures. In this section, we're going to learn some of the basic Nmap commands that can be used to discover clients that are connected to our network, and also discover the open ports on these clients. We're going to use Zenmap, which is the graphical user interface for Nmap. If we type zenmap on the Terminal, we'll bring up the application like this: Zenmap In the Target field, we're going to put our IP address. In the Profile drop-down menu, we can have various profiles: Post-Connection Attacks In the Target filed, if you want to gather information of only one IP address, we can just enter that address. We can also enter a range like we did with netdiscover. We're going to enter 198.168.1.1/24. Then we are going to select the Ping scan from the Profile drop-down menu and hit the Scan button: Zenmap The preceding scan is kind of a quick scan, but it doesn't show too much information, as we can see in the preceding screenshot. It only shows the connected devices. This scan is very quick. We are able to see the connected devices on the left-hand panel, and we can see their IP addresses, their MAC addresses, and their vendors. The next scan we're going to learn is the Quick Scan. Now, the Quick scan is going to be slightly slower than the Ping scan. But in Quick scan, we will get more information than the Ping scan. We're going to be able to identify the open ports on each device: Zenmap In the above screenshot, we can see that it shows the open ports on each one of the discovering devices. The main router has an open port c |