2/24/2013

How to setup Deluge with Transdroid administration

1. Make sure you have Deluge installed! If not, here: http://adf.ly/JjdIV

2. Setup the WebUI with Deluge. First go into Deluge settings, then plugins and make sure the WebUI plugin is enabled.Then you go into the WebUI
plugin settings and make sure the port is 8112 and SSL is enabled. Now, to test that the WebUI is working, go into your internet browser and type "https://localhost:8112" (If you are using Firefox you will get a warning saying that the site is unsecure. Just press add an expection and go on). Before you can enter the WebUI you'll have to enter a password, the default password is "deluge". I recommend changing that. Now that you have comfirmed that the WebUI is working, it's time to setup Transdroid.

3. Setup Transdroid.
As the application is not in the Android market, use this link to download it from publishers website: http://adf.ly/Jjewx
Then install the application (Remember to enable unknown sources in Settings - Security). When you first open the application, it's going to look like this:
Under you can see my setup.
"Name" is the name of the server, and can be anything, in my case "Deluge".
"Server type" has to be "Deluge 1.2+"
"IP or domain name" is the IP address of the computer.
"Port" is 8112.
On the other pictures, the only thing you have to worry about is SSL and "Deluge web password". Enable SSL and write the password for the WebUI on "Deluge web password."

4. Now you're done! But, if you are going to use Transdroid outside your home network, you'll have to setup port-forwarding.
Port-forwarding is different on different routers, but is usually named "Portforwarding" or "Virtual Servers". To setup port-forwarding, you'll have to find out your WAN IP-address, which you can find my Googling "whats my ip".
Then go into your router's admin-panel, usually it's done by going into your web-browser and typing in either "192.168.0.1" or "192.168.1.1". Then find the port-forwarding settings and make a new entry. For port, you should put 8112, for IP-address put your computers IP-address, protocol choose "Both".
Now you should have setup portforwarding, but you'll have to make one more change in Transdroid. On "IP or domain name", instead of your computers IP-address, you are now going to put you WAN IP-address.to test if it works, turn on mobile data on your phone and check if you have a connection to the server, if you have, you've done everything right, but if you don't check some settings and see if all of them are right.

If this tutorial helped you, consider donating to my Bitcoin wallet: 18uLE4uqd4r1wm4qdbjjnpA2QVW9KtFB2H

GPU cracking capabilities

Here is a list of most GPUs and their hash-cracking capabilities!

http://golubev.com/gpuest.htm

Back, again!

I've decided to change the blog a bit.

I am going to do more computer related topics, than just network & pentesting.

Stay tuned!

9/18/2012

Back!

I've had a little break, because of schoolwork, but I'm back!

The next post will be a AWUS036NH review, it will be posted by 2-3 days.

Also have a lot of other cool stuff to show you guys!

8/07/2012

"Big" unboxing!

After just 6 days, including weekends, I got all three things I ordered:

 - Alfa AWUS036NHA
 - Alfa carrying case
 - Alfa 9dBi antenna.


Lets roll!

ALFA
A
W
U
S
0
3
6
N
H
A




This is the box (Duh.)
It didn't include a mounting cup, though :-/









It has glossy paint, and the LED is blue. (The AWUS036H has yellow LED)









Next one!

9
d
B
i
A
n
t
e
n
n
a
















I must say, it is BIG! Almost 40cm! (That's what she said..)
So when you use it, you should lay the Alfa down, or hold the antenna. Also, here is a comparison to the 5dBi antenna.

Another one!

ALFA
C
a
r
r
y
C
a
s
e



They included a mounting cup, how nice. Now I have one for both of my Alfas.

The packaging for the case says it's waterproof, thought I don't believe that.

























The case feels very good in you hands, and is very soft, so I think it will give good protection


The carry case and the adapter itself, I bought at the Rokland eBay store, for a total of 39$.
The antenna I bought from GigaCity eBay store for 9.99$.

I recommend both these stores!



8/06/2012

Discovered some problems with AirCrack-ng suite and Ubuntu 12.04

Since I already have Ubuntu on my laptop, I installed all the necessary tools to do my pentesting.
But when using Airodump-ng I discovered that I never managed to capture a handshake. I thought to myself that I just might be unlucky, but even after I tried with several computers, and several wireless adapters, I posted a thread on HackForums, where one user replied with: "Have you tried in BackTrack?"

Luckily, my desktop computer had a VM with BackTrack, so I tried. And guess what? I got the handshake in a blink of an eye.

I asked around what the problem could be, and some answered it could be NetworkManager, which puts the wireless adapter into managed mode again, which means I can't listen and capture the packets flowing in the air.

So I tried both killing and stopping the NetworkManager, and it worked, once.
Then I said, screw this. Installed BackTrack to a VM and deal with the problem some other time.

So when anybody have a solution to totally killing the NetworkManager, hit me up in the comments ;-)

8/04/2012

Crunch!

Since I love how Crunch works, I will make a tutorial on how to use it :-)

To install it, download the Crunch http://sourceforge.net/projects/crunch-wordlist/

cd /path/to/downloaded/archive
tar -xvf crunch_archive.tgz
cd /path/to/extracted/folder/
sudo make && make install

Troubleshooting:

If you get this error:
Building binary...
/usr/bin/gcc -Wall -lm -pthread -std=c99  crunch.c -o crunch
crunch.c: In function ‘PrintPercentage’:
crunch.c:1006:20: warning: variable ‘finall’ set but not used [-Wunused-but-set-variable]
crunch.c: In function ‘renamefile’:
crunch.c:1032:12: warning: variable ‘pidret’ set but not used [-Wunused-but-set-variable]
crunch.c: In function ‘main’:
crunch.c:1805:8: warning: variable ‘loaded’ set but not used [-Wunused-but-set-variable]
/tmp/ccqWIgti.o: In function `count_strings':
crunch.c:(.text+0x1c1e): undefined reference to `pow'
crunch.c:(.text+0x1dd5): undefined reference to `pow'
crunch.c:(.text+0x1fd1): undefined reference to `pow'
collect2: ld returned 1 exit status
make: *** [crunch] Error 1

Then the math librarys aren't included, to fix it, simply run this command:

# /usr/bin/gcc -Wall -lm -pthread -std=c99 -m32 -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 crunch.c -o crunch -lm
[If you are on 64-bit platform, change "-m32" to "-m64"]

Crunch generates wordlist out of a characterset that you give it. F. ex.

./crunch 8 8 0123456789 -o 8Digit.ls

This will launch Crunch, make a wordlist named 8Digit.lst, only 8 character words, and the characterset is 0-9.








A neat little feature with Crunch, is that it displays the amount of words it will generate, how much space the wordlist will use and it has a sleep timer of 3 seconds, so if the wordlist is to big you can stop Crunch.

Crunch has the following options:

-b  Maximum bytes to write per file, so using this option the wordlist to be created can be split into various
      sizes such as KB / MB / GB (must be used in combination with "-o START" switch)
-c  Number of lines to write to output file, must be used together with "-o START"
-d  Limits the number of consecutive identical characters (crunch v3.2)
-e Specifies when crunch should stop early (crunch v3.1)
-f  Path to the charset.lst file to use, standard location is '/pentest/passwords/crunch/charset.lst
    to be used in conjunction with the name of the desired charset list, such as 'mixalpha-numeric-space'
-i  Inverts the output sequence from left-to-right  to  right-to-left
    (So instead of aaa, aab, aac, aad etc, output would be aaa baa caa daa)
-l  When specifying custom patterns with the -t option, the -l switch allows you to identify which of the characters
    should be taken as a literal character instead of a place holder ( @,%^ )
-o  Allows you to specify the file name / location for the output, e.g. /media/flashdrive/wordlist.txt
-p  Prints permutations of the words or characters provided in the command line.
-q  Prints permutation of the words or characters found in a specified file
-r  Resumes from a previous session, exact same syntax to be used followed by -r
-s  Allows you to specify the starting string for your wordlist.
-t  Allows you to specify a specific pattern to use. Probably one of the most important functions !
     Place holders for fixed character sets are ;
     @   --  lower case alpha characters
     ,    --   upper case alhpa characters
     %   --  numeric characters
    ^    --  special characters (including space)
-u  Supresses the output of wordlist size & linecount prior starting wordlist generation.
-z  Adds support to compress the generation output, supports gzip, bzip & lzma

If you are creating big wordlists, Crunch also supports compression in gzip, bzip2 and lzma.

./crunch 6 6 0123456789 -o 8Digit.lst -z lzma













Also another neat feature, is that you can pipe the outputs of Crunch to AirCrack-ng for example.

./crunch 8 8 0123456789 | aircrack-ng -e test -w - capture.cap
[Little picturefail here, I used the command mentioned above.]












This one is a little crazy :-P






To learn more about Crunch, in terminal, type "man crunch".