From ffc56d86c56c3dcf07f6337fe0ea70a597548d81 Mon Sep 17 00:00:00 2001 From: Alex Toucan <99103316+Alex-Toucan@users.noreply.github.com> Date: Mon, 21 Nov 2022 12:43:07 -0600 Subject: [PATCH] Update script.html --- backup/script.html | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/backup/script.html b/backup/script.html index c25aaf92b..ec49206d9 100644 --- a/backup/script.html +++ b/backup/script.html @@ -71,7 +71,7 @@
Section by Nasus
Open source intelligence (OSINT) is the practice of collecting information from published or otherwise publicly available sources. This can be used to learn more about your targets
Reverse Image Lookup Mac Address Lookup EXIF Data Database Lookup IP Lookup Archive.orgThis is not DDoS. You have to distribute this code amongst a botnet for it to actually do damage. It only works against websites.
@@ -351,7 +351,7 @@ Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted.
As of 2020, phishing is by far the most common attack performed by cybercriminals
Attackers will dial a large quantity of telephone n
"search string"
- web pages that contain the exact same string
string | string
- between queries will return results for each string
site: wikipedia.org
- search for certain words on a website
@@ -401,7 +401,7 @@
ext:log “Software: Microsoft Internet Information Services *.*”
- Microsoft ISS server logs (online activity)
Section by Nasus
Wireshark is a network protocol analyzer used to capture traffic.
Putting your adapter in Monitor mode, or RFMON mode, allows a computer with a wireless network interface controller to monitor all traffic received on a wireless channel. Unlike promiscuous mode, which is also used for packet sniffing, monitor mode allows packets to be captured without having to associate with an access point
Buy a WiFi Adapter that supports Monitor Mode.
The most recommended brand is Alfa for WiFi Adapters.
Alla Network AWUS036NH & Alla Network 1000 mW AWUS036H.