Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





Search Forums

(Advanced Search)

Forum Statistics
» Members: 18
» Latest member: BryceMah
» Forum threads: 57
» Forum posts: 154

Full Statistics

Online Users
There is currently 1 user online
» 0 Member(s) | 1 Guest(s)

Latest Threads
DNS Spoof for Airgeddon
Forum: More of:
Last Post: r1sen
01-12-2019, 11:04 AM
» Replies: 1
» Views: 8
WPA3 and Wifi Crack futur...
Forum: General:
Last Post: r1sen
12-29-2018, 02:34 AM
» Replies: 1
» Views: 45
airgeddon new options
Forum: More of:
Last Post: r1sen
12-29-2018, 02:30 AM
» Replies: 1
» Views: 15
TinyPaw-Linux | what it i...
Forum: Release Notes:
Last Post: r1sen
12-23-2018, 11:13 PM
» Replies: 0
» Views: 22
RTL8812AU wireless device...
Forum: Release Notes:
Last Post: r1sen
12-23-2018, 07:57 PM
» Replies: 0
» Views: 7
What hardware are you usi...
Forum: General:
Last Post: r1sen
12-23-2018, 01:59 AM
» Replies: 0
» Views: 37
Wifite2 - simple script t...
Forum: Packages & Drivers:
Last Post: r1sen
12-16-2018, 01:32 AM
» Replies: 0
» Views: 27
EaST Framework
Forum: Packages & Drivers:
Last Post: r1sen
12-11-2018, 01:04 PM
» Replies: 0
» Views: 18
TP 1.3 and Wifite PMKID A...
Forum: General:
Last Post: r1sen
12-10-2018, 11:14 PM
» Replies: 44
» Views: 624
Aircrack-ng 1.5.2 ( gcryp...
Forum: Packages & Drivers:
Last Post: r1sen
12-10-2018, 04:33 PM
» Replies: 0
» Views: 38

 
  DNS Spoof for Airgeddon
Posted by: LittlePAW - 01-12-2019, 09:44 AM - Forum: More of: - Replies (1)

An good addition I think is DNS Spoof for Airgeddon, to use Evil Twin Atack without internet

Print this item

  WPA3 and Wifi Crack future
Posted by: LittlePAW - 12-29-2018, 02:09 AM - Forum: General: - Replies (1)

I think which this WPA3 is very related with the future of TinyPAW, and Wifi Crack in general, also with the future of famous Kali Linux (and Nethunter), Wifite, hashcat, JTR, and others Crackywood Super Stars, because Wifi is key to all this tools, as the hashcat developer, I think the new WPA3 can be very hard to crack, to me, something like the New WPS with LOCK, Smile , someone speak which need only time to exploit WPA3, anything is 100% secure... but... still with any new exploit to New WPS, how crack WPS of an 12/2018 router? I think the WPA3 can be much more tough than New WPS, and maybe the end of New WPS too. Evil Twin is an option, but not an easy option, anyone know, and I think even it, have counted days. I think, WPA2 can survive more some time but after I can't see a good future in crack WPA3. What the wifi crackers community think about it really and sincerely?

Print this item

  airgeddon new options
Posted by: LittlePAW - 12-29-2018, 01:38 AM - Forum: More of: - Replies (1)

Developer, see this:

https://github.com/v1s1t0r1sh3r3/airgeddon/wiki/Options

My suggestion for the next airgeddon on TinyPaw:

AIRGEDDON_AUTO_UPDATE=false
AIRGEDDON_DEVELOPMENT_MODE=true

airgeddon is good but have much useless things, intros, checks, etc, I think this options can be good for TP users, because we want go fast.

Print this item

Information TinyPaw-Linux | what it is and isn't
Posted by: r1sen - 12-23-2018, 11:13 PM - Forum: Release Notes: - No Replies

In case there is, was or would be any confusion on the subject. TinyPaw-Linux was created and designed for the sole purpose of wireless device, access point and / or network auditing with little to or no thought for anything else unrelated to this. Quite simply this distribution was designed to serve this purpose and this purpose only.

Things you can count on:

1.) Constantly updated and developed tools, scripts, libs, and core.

2.) The exclusion of just about any feature unrelated to the sole purpose listed above.

3.) A consistent yet non-defined release cycle.

4.) Striving for compatibility with older - newer hardware and wireless devices.

5.) Always taking into consideration the likes, dislikes and wants of this community.

Things you can count out:

1.) Never will there be a thought for a more modernized or feature rich desktop environment / window manager.

2.) Never will there be a thought for multimedia libs / architecture that exceed the needs of the terminal, default tools, window manager and / or basic functionality of whatever web browser may have been included by default in a release build.

3.) Never will there be a thought for any tool and / or software that DOES NOT in someway relate to the sole purpose of TinyPaw-Linux.

4.) Never will there be a thought of expanding upon the sole purpose of TinyPaw-Linux.

I think that just about sums it up, this has been the projects mission statement since the start and will continue to be. I thank the various communities and users for your support!

Print this item

  RTL8812AU wireless device driver
Posted by: r1sen - 12-23-2018, 07:57 PM - Forum: Release Notes: - No Replies

Unfortunately at the time of the release of v1.3 this compiled device driver had not yet been confirmed as I have not a wireless device with this chipset to test against. However now that it has been confirmed along with device hardware modes such as injection, capture, monitor, etc this device driver extension with compiled kernel 4.14.10 driver for the RTL8812AU chipset will be included in following releases.

Package currently available for download at:

SourceForge:

rtl8812au.tcz

BitBucket:

rtl8812au.tcz

Community confirmed device / chipset:

ALFA AWUS036ACH - REALTEK RTL88812AU

Please view original thread for more information and / or installation instructions:

http://tinypawlinux.x10.bz/forum/showthr...pid=8#pid8

Print this item

Question What hardware are you using?
Posted by: r1sen - 12-23-2018, 01:59 AM - Forum: General: - No Replies

Aiming to gather general specifications of physical hardware that the community has used to successfully run TinyPaw-Linux. Just as many of the tools we use document wireless devices and chipsets used I would like to generate and provide the same for all the various physical hardware configurations used.

*VM installs are to be excluded from this list*

A few that I have physically tested TinyPaw-Linux (every release build) via HDD, CD, DVD or USB:

Custom rig:

CPU: Intel Pentium G3220 3.0 Ghz

RAM: 20 Gb - 3 Gb 32bit cap

VIDEO: MSI Low profile GFORCE 1 Gb PCIE

RUNNING: USB / DVD /  HDD

---

Dell Latitude E6400: *RIP*

CPU: Intel Core2 Duo 2.2 Ghz

RAM: 4 Gb - 3 Gb 32bit cap

VIDEO: Intel Integrated

RUNNING: USB / DVD / HDD

---

Gateway custom:

CPU: Intel I3 3.07 Ghz

RAM: 8 Gb - 3 Gb 32bit cap

VIDEO: EVGA GFORCE 1 Gb PCIE

RUNNING: USB

---

HP 17-X116DX:

CPU: Intel I5-7200 2.5 Ghz

RAM: 8 Gb - 3 Gb 32bit cap

VIDEO: Intel Integrated

RUNNING: USB *BIOS legacy boot mode / USB boot mode required*

---

Thank you for your support and input!

Print this item

  Wifite2 - simple script to bypass hashcat and still capture pmkid
Posted by: r1sen - 12-16-2018, 01:32 AM - Forum: Packages & Drivers: - No Replies

Unfortunately as we've seen from my post on Hashcat: https://xiaopan.co/forums/threads/hashca...ate.33151/

There were some unfortunate compatibility issues, and unfortunately it would "seem" that wifite will not engage without valid hashcat? Well from the wifite2 github and some squashfs magic here is a very simple bash script to override wifite into engaging in pmkid attack without hashcat.

Why? Well there is always the potential for JTR conversion of the capture or offloading the generated .16800 format for OCL-Hashcat on another platform entirely? Ether way.

Original github post: https://github.com/derv82/wifite2/issues/173

SourceForge:

wifite-hc-patch.tcz

BitBucket:

wifite-hc-patch.tcz

Installation:

1.) Download extension from either above repository.

2.) Copy extension to your (*/tce/optional/) directory.

3.) Open your onboot.lst file located in your (*/tce/) directory and make the following change:

-add line item: wifite-hc-patch.tcz

*make sure to add one extra empty line(white line) at the bottom of your onboot.lst*

4.) Save the changes to your onboot.lst and close all windows.

5.) Reboot your system and installation is complete for wifite2 pmkid attack without hashcat.


Extension is as follows:

/usr/

/usr/local/

/usr/local/bin/

/usr/local/bin/ + "hashcat"

"hashcat" contains:

---

#!/bin/bash

/bin/false

---

chmod +x ./hashcat

Given the wireless device you are testing with and the relative proximity to the target device, if pmkid capture is successful a .16800 capture format will be generated in your (/home/tc/hs/) directory.

Originally posted on the Xiaopan OS forum: https://xiaopan.co/forums/threads/wifite...kid.33989/

Print this item

  EaST Framework
Posted by: r1sen - 12-11-2018, 01:04 PM - Forum: Packages & Drivers: - No Replies

Due to community feedback and small amount of included modules the "Exploit and Security Tools - Framework" will most likely be nearing it's end of time as an included default package.

A replacement if any has not been decided upon yet at this time - this decision was both made as a result of feedback as well as trimming the distributions size by evaluating tools as well as their dependencies - ie python modules, libs, etc, etc.

Nothing is ever final, obviously - but I am announcing this regardless.

Thanks for your support!

Print this item

  Aircrack-ng 1.5.2 ( gcrypt & extras )
Posted by: r1sen - 12-10-2018, 04:33 PM - Forum: Packages & Drivers: - No Replies

aircrack-ng 1.5.2 build with libgcrypt crypto libraries and experimental / extra scripts

Compiled in TinyPaw 1.3 using the arguments ( --with-gcrypt --with-experimental --with-ext-scripts --with-xcodes ) - fixes for previous python migration and import issues and correction to libOuiParse.py from graphiz correcting issues with airdrop-ng and airgraph-ng.

What is Aircrack-ng?

"
Aircrack-ng is a complete suite of tools to assess WiFi network security.

It focuses on different areas of WiFi security:

  • Monitoring: Packet capture and export of data to text files for further processing by third party tools
  • Attacking: Replay attacks, deauthentication, fake access points and others via packet injection
  • Testing: Checking WiFi cards and driver capabilities (capture and injection)
  • Cracking: WEP and WPA PSK (WPA 1 and 2)
All tools are command line which allows for heavy scripting. A lot of GUIs have taken advantage of this feature. It works primarily Linux but also Windows, OS X, FreeBSD, OpenBSD, NetBSD, as well as Solaris and even eComStation 2.
"
Quoted from the project website: http://aircrack-ng.org/

SourceForge:

aircrack-ng-1.5.2-exp.tcz

BitBucket:

aircrack-ng-1.5.2-exp.tcz

Installation:

1.) Download the new aircrack-ng package from either of the above repositories.

2.) Copy the downloaded "aircrack-ng-1.5.2-exp.tcz" package to your (*/tce/optional/) directory.

3.) Find and open your "onboot.lst" file located in your (*/tce/) directory and make the following changes:

- Locate any line item that says: "aircrack-ng-1.4-exp.tcz" and change to: "aircrack-ng-1.5.2-exp.tcz"

*always make sure to include one empty(white) line of space at the bottom of your onboot.lst*

4.) Save the changes you've made by either "file+save" or "cntl+s" and close your text editor.

5.) Close out of all windows and reboot your system.

6.) Upon reboot your new aircrack-ng 1.5.2 package will be ready for use - wbar launcher icons will function properly.

[Image: screenshot_generic_2018-12-10_10-20-45-png.4465]

Print this item

  ALFA AWUS036ACH - RTL8812AU
Posted by: r1sen - 12-02-2018, 03:15 PM - Forum: Wireless devices: - No Replies

This device uses the REALTEK RTL8812AU chipset:

This device and chipset has only been confirmed from the community using the RTL8812AU kernel driver compiled for TinyPaw

SourceForge:

rtl8812au.tcz

BitBucket:

rtl8812au.tcz

At this time I can only confirm capable device modes: Injection, Capture, Monitor, AP

Print this item