ALFA AWUS036ACH
Here's how to setup this card to get into monitor mode and start enumerating/attacking APs
Docs tagged with "review" are getting a little long in the tooth and/or may need more information.
View all tagsHere's how to setup this card to get into monitor mode and start enumerating/attacking APs
Notes: totally underconstruction while I review bettercap's CLI and see what's still relevant.
Install BloodHound Community edition
Find all certs
Coerce auth from a victim to a system of your choice
Work in progress - I'm pulling over and organizing my notes from this Webinar
General poisoning
Very helpful in the Windows world for mapping drives, changing local/domain group memberships, and much more!
Right now the best source I have for this is the pentest dropbox episodes for the 7 Minute Security podcast. I'll start moving over cmd-line snippets and other tips from those episodes over time.
Note: this document hasn't been updated for a few years but I pulled it over from the original BPATTY because I think it has some great info that is hopefully still relevant as far as integrating the Pwned Passwords.
Example of doing the RBCD attack when you have the TGT of a user with write access to a victim machine
Handy for manipulating the registry!
Dump tickets
I'm in the market for a new USB wifi pentest adapter so I'm reviewing
At the time of this writing, it doesn't look like the Microsoft WEFFLES is getting updates any more, but I wanted to preserve my install instructions from the old BPATTY anyways: