PCI
Atheros - ath9k
Its not being seen, ifconfig? Iwconfig? One of those doesn't show anything.
Thus is kinda why I dislike Linux, there are tutorials everywhere, but I always run into something different and that makes tutorial useless.
Printable View
PCI
Atheros - ath9k
Its not being seen, ifconfig? Iwconfig? One of those doesn't show anything.
Thus is kinda why I dislike Linux, there are tutorials everywhere, but I always run into something different and that makes tutorial useless.
does the card show up under Windows?
I'll assume you are using this with a recent version of a Debian/Ubuntu distro....
yes works under windows,
and about the distro..
well its backtrack linux gnome/ubuntu build. so i realize thats whats most likely causing the "plug and play" issues as its not a new version of ubuntu.
also if you help with any command things im logged as root so i thing no sudo commands nessisary?
ifconfig and iwconfig are going to talk to the driver. If the driver is not there or not loaded then nothing will show. You need to do a dmesg to see if it shows up. dmesg shows what hardware is detected. If it does you are going to need to instal the driver.
root user does not need sudo.
Maybe try Kali? Less calories and fat yet all the same nutrients. :up:
Are you trying this in a VM?
Best to leave Kali well alone. It's REALLY not something that's intended for even intermediate Linux users, comes with many toys that can get you on multiple government watch lists and won't run BOINC v 6.12.x on (I tried last night) due to unmeetable (GlibC versions to be specific, updating which is likely to break the whole system) dependencies. Also, the only account set up in Kali by default is root. Unless you set them up yourself there are no user accounts. It is HIGHLY inadvisable to browse the internet from the root account. It's also built on Debian, not Ubuntu, and a lot of things are not compatible thanks to Ubuntu screwing with things and trying to go their own way. If you want a distro that's flexible enough to do pretty much whatever with minimum hassle, use Mint. Kali is also REALLY awkward to get some hardware running properly due to it's odd package version mix. I spent three days trying to get the OpenCL drivers working on it only to find out there are compatibility issues between the drivers versions and the tool I wanted to use OpenCL for. The same driver version issue affects Windows machines, it's the tool that's super fickle.
People assume that because a given piece of hardware runs in Windows it should run under Linux. That's a poor assumption. Mac hardware often doesn't run on Windows but do people blame Windows for that? No. They realise that someone somewhere has to write the drivers for that hardware and if a given OS is not their intended market then they won't be writing the drivers to suit. Most of the time Linux developers step up and make things work, but some hardware is just too obscure, poorly made, or even too expensive to be obtainable by people working for nothing (or within tight budgets) and so not worth the trouble. There are multiple lists of what hardware is supported by Linux and what drivers are required if people take the time to look for them. using incompatible hardware is the user's fault, not the operating system no matter if they're using Linux, Mac OS or Windows.
Well I did not know that Kali would not run Boinc but I also have no idea why anyone would want to use that combo anyway. To each his own.
If a VM is involved I can almost assure you Linux is not the problem.
What I am getting tired of is trying to drag info out of people. I gave up on WCG Forums when I can not get a guy to tell me what "FAAH crashed my computer" means. Blue screen? Lockup? Reboot? Shutdown?
And yes Kali, Backtrack and even Debian can get a person in trouble, different sorts of trouble. It would be fair to say if you can't get a PCI WiFi card that has linux drivers working you should not be playing with pen test distros.
You can try this but I won't help. Sorry. https://forums.kali.org/showthread.p...ros-Lan-Driver
okay and no vm im running this on a spare drive and just swap drives when doing this.
the toys that get you into trouble are mostly why im playing with this os. and im not looking to run boinc on it. im not really doing much but I hear about how easy it is to break into wireless and such some im gonna test securities of my network and a spare one that i have setup just for this, just bored and want to play around.
yes i realize that when running a vm you MUST use usb wireless nic becuase of the rights access such. its not that.
i want to the nic to work so i can play with the goodies included in this os. also eventually when i go to install ubuntu i will need it wireless as i want to have two of these in random places in my house and I only have 1 router and its in my bedroom.
looks like im just gona buy a wireless usb nic that works out of the box with this, its only 25$ and its truly plug and play.
I use the Alfa AWUS036H on Mint and Kali with no problems. It is $39 though.
This one is $9.99 and works on my Raspberry Pi, Debian based Raspbian. And Mint and Kali.
Here's a little something for the Windows users. Especially the ones who think they do not have any maleware or viruses and surf to p0rn sites, hacker/warez sites or download from torrents.
Microsoft Network Monitor.
Run it on the network interface of your Windows machine, use the on with an IP number. You will probably be flooded with a lot "stuff" and have no idea what most of it is. Just look at network IPs. Unfortunately I have yet to find a way to get it to resolve the IPs. You can use a web site like whatismyip.com to see who is registered to that ip and it's location. If it says Russia or China you might want to see what app is using that IP. If it says Microsoft or Google it is probably OK depending on your feelings about it. There are a lot on mine that do not say google but lead to google or a marketing firm of one sort or another.
You can let it run for awhile and save the "capture" then open and read the saved capture. The longer it runs the bigger the file but the more accurate as it needs to catch the apps communicating with the mothership.
You are concerned with your machines IP# being in either the source or destination columns. The app using that conection is in a third column. Ones that have no app listed and ones where you do not recognise the app name are the ones to focus on. There will be a lot of DNS and ARP stuff with no app listed, the Source and Destination should be your local network and or the DNS server.
If you have concerns and want a good capture use the settings to limit capture file size and let it run all night and all day if you can. There is also the ability to create filers.
Linux and Windows users can use Wireshark.
sudo apt-get install wireshark
Good luck. Hope you do not find anything too disturbing. :(
You missed the point completely.
Malware and viruses are installed by visiting the sites mentioned. The malware can be keyloggers to capture and send to their mothership your banking username and password or your credit card info you used at a web site. Or maybe they install a drone that when commanded does a DDOS attack against a company they disapprove of or they are blackmailing.
I forget not everyone reads security and network articles and keeps up with what goes on in the dark net. I suppose some do not even know what the dark net is. :shrug:
Maybe wrong audience for this stuff I guess.
Thanks for the info, PG... :up:Quote:
Malware and viruses are installed by visiting the sites mentioned. The malware can be keyloggers to capture and send to their mothership your banking username and password or your credit card info you used at a web site. Or maybe they install a drone that when commanded does a DDOS attack against a company they disapprove of or they are blackmailing.
That really depends on who you're talking to. The "dark net" is data that is connected, but cannot be found by public search engines. An example is data hidden behind company extranet search pages. Google, yahoo etc can't touch it, you have to go in through the company internal search engine. Some has enormous amounts of data available if you know what search terms to use. Companies have gotten better at making private information inaccessible to the public, but not everyone takes their security responsibilities seriously enough.
The "warez" community like to think of themselves as the "dark net", but they're misappropriating the term (probably because it sounds ominous) just like the media bastardized the term "hacker" (really just someone who deeply understands stuff and makes it do novel things it wasn't designed to do) in the 80s.
Most systems are not compromised to attack the owner, they are compromised for use in further large scale operations such as DDOS attacks or spam forwarding ... that includes governments. Making YOUR machine be the one that is probing a Chinese Government server gives the real culprits plausible deniability but opens you up to reprisals.
As for government surveillance, never forget that information can be misinterpreted to suit their ends at will. Accidentally passed by a kiddie :banana::banana::banana::banana: site but left immediately? They hit you for having those images stored on your system, for example. Just because you haven't done anything wrong doesn't mean the evidence can't be made to look like you have.
I would still argue, "not really". There are sites that can only be accessed if you know the IP address, much like it was in the early days of the internet. It's the same concept though, stuff that's not available via public search engines.
Gophernet (gttp protocol from memory) died a while back btw.
that would be tough considering I dont have a computer plugged into an internet connection. other than about 5min a day to upload completed WU, and I strictly watch whats being done as I am about to hit overages on my mobile bandwith
its true, but get your point, im just trolololololin lol.
and if events of late dont prove it enough i will restate, if the government wants to look at what your doing they will regardless of how "secure" your system is, when they can look at all traffic in and out of your house it doesnt matter if you saved it when they do.
there is no such thing as privacy now adays, get used to it and embrace it, there is nothing we as general population can do, especially looking at how other governments cant do anything to stop our gov from looking at them what kind can we do about it? answer is, nothing at all, get used to it
And I won't. Like I said not everyone knows about it and dark net might well have been misappropriated but I was not looking for a semantics debate. Sorry I mentioned it, not sure why I did anyway.
@nkrader My mention of network monitoring was not directed at you personally. I was poking around in it and Wireshark and thought I would mention in the thread how useful it can be to see what is going on on your network.
If you were a genuine target, that's not a real barrier.
PG is quite right. There's a lot more going on than meets the eye, and most people are well advised to leave well enough alone. This is "deep end of the pool" stuff.
[QUOTE=NKrader;5219582]that would be tough considering I dont have a computer plugged into an internet connection. other than about 5min a day to upload completed WU, and I strictly watch whats being done as I am about to hit overages on my mobile bandwith
its true, but get your point, im just trolololololin lol.
and if events of late dont prove it enough i will restate, if the government wants to look at what your doing they will regardless of how "secure" your system is, when they can look at all traffic in and out of your house it doesnt matter if you saved it when they do.
there is no such thing as privacy now adays, get used to it and embrace it, there is nothing we as general population can do, especially looking at how other governments cant do anything to stop our gov from looking at them what kind can we do about it? answer is, nothing at all, get used to it[/QUOTE]
I thought of your statement while reading this. Scary sh1t.
New US spy satellite features world-devouring octopus
http://img.techpowerup.org/131210/nrollogo1.jpg
Some fo the reader comments are funny.
If you are bored and want to learn by all means go for it. :up:
But if you just want to know your WiFi is secure I can save you some time. Use WPA/WPA2 and a password 16 random characters long using lower and uppercase, numbers and special characters. abcd1234 takes my 1.6gz laptop 2 and half seconds to crack from a WPA dump. 54ae6B#4aD@cJJp2 will take 6 high end AMD GPUs several weeks at worst a week at best. 12 digits is probably enough but at 16 anyone willing to do what it takes to crack that password is going to get in no matter what you do.
I am looking for the article I got the info from and will update my numbers if they are off.
Well I can't find original article, it was on Ars Technica. But I found a spread sheet at a security blog with some numbers.
16 lowercase, uppercase, numbers and symbols in random pattern, no dictionary words, takes a max of 45,302,633,348,959 days to crack assuming 400,000,000,000 keyrate per seconds. Average number of days is about half that. A AMD 6990 can roughly do 9 billion a second. Anyway my point is use 12-16 character passwords using random characters, numbers and symbols and forget it.
The numbers can vary depending on hardware, crack program and method but it is agreed that at 12 characters you really want the password and at 16 you'll go elsewhere until technology improves some more.
25-GPU cluster cracks every standard Windows password in <6 hours :eek: