Skip to main content

Wardriving!

For Wardriving purpose I recently bought a GPS USB from Lazada for about RM112



To setup and configure on your virtual machine, in this case I'm using Kali Linux 2018. First we have to install gpsd and gpsd-clients.

apt install gpsd -y
apt install gpsd-clients -y

After all the installation is finish, next we can to check does our USB GPS is detect by running:

ls /dev/gps*

If the command above does not work you may run this command:

ls /dev/tty*

and it should get an output like this:


You will notice there is a bottom right /dev/ttyUSB0 we will use that to run our gpsd

Next we have to run:

gpsd -n -N -D4 /dev/ttyUSB0

To check whether your GPS receiver has locked onto statellites we can use cpsg which is used to test clients for gpsd, run the following command in a new tab or terminal window

$ cgps -s


Now, our final step, plug in your Alfa Antenna and fire up kismet!




Comments

Popular posts from this blog

Create a session & restore abort/interrupted session in John The Ripper!

Been busy with report writing. Just wanna put some of these command and technique on how to restore interrupted session or aborted session in John The Ripper. 1. First step crack the hash with these commands : john --session=test --format=raw-sha --incremental=rockyou test.txt 2. To restore the abort /interrupted session that you wanted to resume just run these commands : john --restore=test Check the "test.log" Note:  Make sure that these file are not delete " .rec " and " .log " files if the file is deleted or missing it wont work. That's all happy cracking!

iOS - Convert .app to .ipa

While doing a iOS Security Testing, I wondered how do we convert .app into .ipa. So basically here are the structure of .ipa files. 1. First, SSH in your iPhone (Jailbroken). 2. Download the .app folder via scp  3. Copy the .app folder into a folder called Payload. 4. Compress it with .zip extension using any compression software. 5. Change the extension from file.zip to file.ipa. That’s it. Now you can use these .ipa files to install the app into your iPhone.

List of SQLMAP Tamper Scripts

Just re-post one of my visited reference blog post: Original URL: http://www.forkbombers.com/2016/07/sqlmap-tamper-scripts-update.html Name Description Example apostrophemask.py Replaces apostrophe character with its UTF-8 full width counterpart '1 AND %EF%BC%871%EF%BC%87=%EF%BC%871' apostrophenullencode.py Replaces apostrophe character with its illegal double unicode counterpart '1 AND %271%27=%271' appendnullbyte.py Appends encoded NULL byte character at the end of payload '1 AND 1=1' base64encode.py Base64 all characters in a given payload 'MScgQU5EIFNMRUVQKDUpIw==' between.py Replaces greater than operator ('>') with 'NOT BETWEEN 0 AND #' '1 AND A NOT BETWEEN 0 AND B--' bluecoat.py Replaces space character after SQL statement with a valid random blank character.Afterwards replace character = with LIKE operator 'SELECT%09id FROM users where id LIKE 1' chardoubleencode.py Double url-encodes all character