Skip to main content

Posts

Showing posts from August, 2019

Dumpcap - Its the way you DUMP pcap!

Why dumpcap ? Because it is light and more importantly its CLI (Command Line Interface). With that we can leverage on and write some automated python, bash or related scripts to automated our work. In my case, I wanted to capture all the packets and dump it into separate file with size of 50MB and continuously capture for a certain time period e.g 9:00 till 17:00 (wherever you wanted to) $ dumpcap -i 1 -b filesize:10 -w demo.pcapng //Command above will dump all packets separately into 10kb size into filename of demo.pcapng P/S: -i = interface you wish to capture from (you might wanna run tshark with -D options first) Anyhow if you stuck, don't forget to read user manual. Cheers!

Wardriving! #2

From my previous post, we already have done capturing all wireless probe network perimeters via Kismet. As for our reference and preliminary analysis purpose, all those information can be export into one single file (.kml) and using Google Earth application to browse and view. To do that we can use  giskismet  which is already installed on the Kali Linux distribution. Simply type this command: giskismet -x <FILE.netxml> -q "select * from wireless" -o output.kml Once the file is exported simply open it with Google Earth. Reference:  https://tools.kali.org/wireless-attacks/giskismet