WEAKERTH4N
Warcarrier é agora Warcarrier-ng e foi atualizado para a versão mais recente. A última versão tem uma interface mais recente com muito mais funcionalidade. O GitHUB repo para Warcarrier e mais informações pode ser encontrado aqui: o https://github.com/weaknetlabs/warcarrier de começar Warcarrier, você vai precisar de um dispositivo de GPS USB, eu recomendo o velho GlobalSat BU-353 (porque funciona) o http://usglobalsat.com/p-688-bu-353-s4.aspx, um adaptador de 80211 rede que suporta o modo RFMON, eu recomendo qualquer coisa feita por Atheros/Qualcomm ou se você realmente tem que a coisa USB 1W ALFA , e, opcionalmente, você pode usar um dongle USB Bluetooth e o HackRF Ubertooth um para análise de espectro 802.15.Veja video abaixo:
https://youtu.be/IAlILYfZPcw
Segue link para download:
Weaknetlabs ISO
modo md5:
Link para md5
Adicione em sua distro.
Additions to the ISO (Why it's bigger in size)
zmap (https://github.com/zmap/zmap)
testssl (https://github.com/drwetter/testssl.sh)
crackmapexec (https://github.com/byt3bl33d3r/CrackMapExec)
pupy (https://github.com/n1nj4sec/pupy)
smbtree, smbclient (Windows domains submenu)
post-exploitation submenu
powershell empire (https://github.com/PowerShellEmpire/PowerTools)
powertools (https://github.com/PowerShellEmpire/PowerTools)
babadook (https://github.com/jseidl/Babadook)
pwntools (CTF) - (http://pwntools.com/)
ctf-tools and pentesters framework moved to "add more tools" sub-menu
installed Arachni (http://www.arachni-scanner.com/)
created Arachni icon in wbar and startup scripts for single click startup
upgraded Debian back-end and all applications
updated Google-Chrome
Added Google Chrome RefreshMonkey Extension (https://chrome.google.com/webstore/detail/refresh-monkey/ljngnafhejmefmijjoedbclkadhacebd?hl=en)
DNS Steal (https://github.com/m57/dnsteal)
fixed dependencies for Recon-NG (https://bitbucket.org/LaNMaSteR53/recon-ng/wiki/browse/)
fixed Dependencies for Arachni and Metasploit
Added Farady to ReadTeam menu and hacked to use Google Chrome (https://www.faradaysec.com)
SS-6271 Shell Shock Script coded and added to menu (https://github.com/weaknetlabs/ss-6271)
WPES Post-Exploitation of Web Applications shell (https://github.com/weaknetlabs/wpes)
Added OWASP ZAP (https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project)
Added Wapiti (http://wapiti.sourceforge.net/)
Added Skipfish (https://github.com/spinkham/skipfish)
ftp, host, and dnsutils (dig nslookup nsupdate)
Obs. fonte obtida em outros servidores:
http://www.planalto.gov.br/ccivil_03/_ato2011-2014/2014/lei/l12965.htm
0 comentários:
Postar um comentário