Przejdź do głównej zawartości

Install AWUS 1900

0. Instalacje wykonujemy bez podłączonej karty !!!

1. sudo apt update && sudo apt upgrade
2. Odinstalować wszystkie stare sterowniki powiązane z tą kartą, a także odinstalowanie domyślnych sterowników realteka: sudo apt remove realtek-rtl88xxau-dkms
3. Instalacja zależności: sudo apt install dkms build-essential libelf-dev linux-headers-`uname -r`
4. Pobranie starszej wersji sterowników: git clone -b v5.6.4.2 https://github.com/aircrack-ng/rtl8812au
5. Wchodzimy do folderu: cd rtl8812au
6. Do tego samego folderu trzeba pobrać patch: https://github.com/aircrack-ng/rtl8812au/files/5862527/0001-Allow-inject-management-and-control-frames.txt
7. sudo patch -p1 < 0001-Allow-inject-management-and-control-frames.txt
8. Odpalamy plik Makefile w edytorze tekstowym i zmieniamy następujące linijki:
    a) Linia 26 z "CONFIG_RTL8814A = n" na "CONFIG_RTL8814A = y"
    b) Linia 181 z "ifeq ((CONFIG_RTL8821A)(CONFIG_RTL8814A), y_y_n)" na "ifeq ((CONFIG_RTL8812A)(CONFIG_RTL8814A), y_y_y)"
    c) Linia 460 z "#RTL871X = rtl8814a" na "RTL871X = rtl8814a"
9. Instalacja sterowników: sudo make dkms_install
10. Restart Kali Linux Virtual machine

11 After restart connect  Alpha AWUS 1900
12.. Shutdown Virtual machine for Kali → Settings→USB→   Alpha AWUS 1900 →Enable USB Controller

11. Run Kali Virtual Machine.

12 Kali → Settings→USB→   Alpha AWUS 1900 →Enable USB → Add Realtek WIFI Card
12. :)


Popularne posty z tego bloga

Active Directory Exploitation - LLMNR/NBT-NS Poisoning

Attack:  Prerequisite: Win10, Win2016,Kali, Active Directory ┌──(root💀kali)-[/usr/share/responder] └─# python3 Responder.py -I eth0 -rdwv  hashcat -m 5600 hashes.txt rockyou.txt Defenses The best defense in this case is to disable LLMNR and NBT-NS. To disable LLMNR, select "Turn OFF Multicast Name Resolution" under Local Group Policy > Local Computer Policy > Computer Configuration > Administrative Templates > Network > DNS Client. To disable NBT-NS, navigate to Network Connections > Network Adapter Properties > TCP/IPv4 Properties > Advanced TAB > WINS tab and select "Disable NetBIOS over TCP/IP". If a company must use or cannot disable LLMNR/NBT-NS, the best course of actions is to: Require Network Access Control. If an attacker cannot get onto the network, the attacker cannot be perfomed. Require strong user password (e.g., > 12 characters in length and limit common word usage). The more complex the password, the harder it is for an...