Skip to main content

Posts

Showing posts from May, 2018

Wardriving!

For Wardriving purpose I recently bought a GPS USB from Lazada for about RM112 To setup and configure on your virtual machine, in this case I'm using Kali Linux 2018. First we have to install gpsd and gpsd-clients. apt install gpsd -y apt install gpsd-clients -y After all the installation is finish, next we can to check does our USB GPS is detect by running: ls /dev/gps* If the command above does not work you may run this command: ls /dev/tty* and it should get an output like this: You will notice there is a bottom right /dev/ttyUSB0 we will use that to run our gpsd Next we have to run: gpsd -n -N -D4 /dev/ttyUSB0 To check whether your GPS receiver has locked onto statellites we can use cpsg which is used to test clients for gpsd, run the following command in a new tab or terminal window $ cgps -s Now, our final step, plug in your Alfa Antenna and fire up kismet!

Malware Simulation Test

Recently I just release my script written in python3 that will simulate a simple malware attack via Github The objective is to test your sensor IDS/IPS etc. Cheers!

It's just a script!

Instead of doing pentest, compliance scan is also part of my job to deliver to customer. Sometimes using a tools might get you headache if the tool scanner (Nessus) are not able to get a proper scan results. So, in order to simplified it. I make everything in automated way by write a simple bash script . Don't expect too much of it. It just run command  ssh-copy-id and scp a file into the target server. You have to write your own script bash, python or whatever you wanted.