General statistics
List of Youtube channels
Youtube commenter search
Distinguished comments
About
David Bombal
comments
Comments by "" (@dingokidneys) on "David Bombal" channel.
Previous
1
Next
...
All
These are always fascinating and as for the digressions, I'm OK with them because you always come back to the point you digressed from but have also imparted some breadth to the discussion. I could always jump ahead in any case if I found them unhelpful.
3
Mixed mode will drop back to WPA2 if that's the only way to get a connection so, yes it should work if you're using a bad password and some client devices that use WPA2.
3
The handshake only gives you the password hash. You then need to use other means to crack the hash, which is what hashcat and the wordlists he was using are meant to do. There's never a guarantee that the hash cracking will work. You may need additional information and heavy hardware resources to have a good chance of cracking anything that is not a silly, simple password.
3
I don't have a Windows machine to run Rufus from and other tools such as Balena Etcher don't seem to support setting up persistence. I guess I could run it from a Windows VM with the USB stick passed through to it, but I'm perverse and wanted to be able to do it all from Linux and understand how it works. Essentially, once you've written the Kali ISO to the USB stick with 'dd' or Balena Etcher or whatever, you create another partition, give it an ext3 filesystem with the label 'persistence', then write a file called 'persistence.conf' into the root of that file system which contains the single line '/ union'. Works great.
2
As David said there, only attack your own networks or networks you have permission to attack. Deauth attacks are very noisy and attract attention, like from law enforcement. I need to show this video to some of my neighbours as they have really bad WPA2 passwords. 🤔🙄
2
Do you have any space remaining on the USB stick? A normal installation of Kali with persistence would not leave you any. The easiest way to gain more space would be to just get a bigger USB drive and set Kali up on that with persistence. Copy your old persistent files over and you're all good.
1
Hashcat with a decent GPU using a brute force attack should definitely crack it in a few hours I would think, even less if they can work out that you're not using lower case characters.
1
What an amazing young woman. I hope she can achieve what she sets out to do in her gap year by inspiring other young people.
1
Interesting to see the use of the masks. I've not tried that before . When I moved into my new house, I had a play with Hashcat on a 14yr old low-powered laptop - Core 2 Duo, no GPU. On a totally unrelated note, I think that several of my neighbours really need to learn a little more about wifi security.
1
@ 😳Who would ever think of doing such a thing. Shocking to imagine. 😇
1
I've seen, used or played with just about everything you demonstrated as I'm an old fart, except maybe the standalone bridge. Heard about them; never seen one. Still that was a really useful video.
1
I have trouble with bridged mode on my USB wifi interface. It has something to do with multiple IP addresses linked to one MAC I think. You may be able to fix this by allowing 'promiscuous' mode in the VBox network settings though it may also need promiscuous mode set on the host wifi adapter. I've never had problems with bridged mode on a wired connection. Alternatively, to access the VM from the host with the NAT interface if you only need one port available for SSH or RDP for example, you can set up port forwarding in the network settings under the Advanced drop-down. E.g. for SSH forward host port 3122 to 22 on the guest. This works great if I'm accessing a VM with no GUI as I get all the GUI terminal enhancements on the host while managing the guest; bigger window, scroll back support, etc.
1
Like most things, the real weakness lies in how it is used - default/weak passwords with internet accessible admin interfaces. I use a TP-Link wifi router but I switched the default firmware out for dd-wrt which is more secure, more functional and there are regular updates. Open-WRT is another great option if your hardware will support it.
1
The case sensitive nature of grep can be alleviated when needed with the '-i' flag. Also, when hunting through config files, I often just want an overview of what is set and what is not so I set a bash alias : $ alias grepconf='grep -Ev '\''^$|^#|^;'\''' This filters out all the comment lines and blank lines to give a succinct view of the config settings. Use it as, e.g.: $ grepconf /etc/samba/smb.conf
1
 @landrover827 If you switch the routers around and have no port forwarding on your 'secure' router (which is behind 'insecure' which links to modem) your 'secure' network should be as safe as if it was just connected via the modem to the internet. Otherwise, you may be able to use some firewall rules on router 1 to lock router 2 out of going anywhere other than out through the modem.
1
I've cracked bad wifi passwords on a 2008 Dell laptop without GPU support in seconds. I then used hashcat with GPU support to crack some other somewhat more complex passwords within a few hours. I have a wifi password that is 20 random characters and tried to crack it with hashcat using all the wordlists available to me, then via brute force which quickly told me that it would take some thousands of years to work through that character space. I didn't bother letting that one run.
1
Previous
1
Next
...
All