Chapter 5: Scanning and Managing Networks
# modify my ip
$ ifconfig [interface_name] <xx.xx.xx.xx>
# modify net mask and broadcast address
$ ifconfig [interface_name] <xx.xx.xx.xx> netmask <xx.xx.xx.xx> broadcast <xx.xx.xx.xx>
# spoof MAC address
$ ifconfig [interface_name] down
$ ifconfig [interface_name] hw ether XX:XX:XX:XX:XX:XX
$ ifconfig [interface_name] up
# browse bluetooth services
$ sdptool browse MACaddress
# check if device is reachable
$ l2ping MACaddress
- Other commands
- dig: gather DNS information
- IP address of the target’s nameserver
- the target’s email server
- (potentially) any subdomains and IP addresses
- wifi 관련
- iwevent, iwlist, iwspy, ifrename, iwgetid
- aircrack-ng (airmon-ng, airodump-ng)
- dig: gather DNS information
- Bluetooth paring
- 2개의 device 가 discoverable mode 에서 Technical information, Name, List of services, Class 를 broadcast
- link key 를 교환하여 추후 paring 시 사용
- hciconfig, hcitool, hcidump
Chapter 7: Cyber Security
- We do not desire that one critical part of a system failure can render the entire system unusable.
- A single point of failure can be reduced or eliminated by way of redundancy.
Chapter 8: Becoming Secure and Anonymous
- proxy 에 접속후 proxy 의 IP 사용하여 다른 곳으로 접속
# proxy chain 을 활용한 접속
proxychains <the command you want proxied> <arguments>
Chapter 9: Cryptography
- Symmetric Cryptography: DES, 3DES, AES, RC4, Blowfish, Twofish
- Asymmetric Cryptography: Diffie-Hellman, RSA, PKI, ECC, PGP