Anda di halaman 1dari 3

Airmon-ng Description

Airmon-ng is included in the aircrack-ng package and is used to enable and disable monitor
mode on wireless interfaces. It may also be used to go back from monitor mode to managed
mode.

Source: Airmon-ng Wiki


Airmon-ng Homepage | Kali aircrack-ng Repo

• Author: Thomas d’Otreppe, Original work: Christophe Devine


• License: GPLv2

airmon-ng – POSIX sh script designed to turn wireless cards into


monitor mode.
root@kali:~# airmon-ng --help

usage: airmon-ng <start|stop|check> <interface> [channel or frequency]

airmon-ng Usage Examples


Entering the airmon-ng command without parameters will show the interfaces status.

root@kali:~# airmon-ng

PHY Interface Driver Chipset

phy0 wlan0 ath9k_htc Atheros Communications, Inc. AR9271 802.11n

A number of processes can interfere with Airmon-ng. Using the check option will display any
processes that might be troublesome and the check kill option will kill them for you.

root@kali:~# airmon-ng check

Found 3 processes that could cause trouble.


If airodump-ng, aireplay-ng or airtun-ng stops working after
a short period of time, you may want to run 'airmon-ng check kill'

PID Name
465 NetworkManager
515 dhclient
1321 wpa_supplicant

root@kali:~# airmon-ng check kill

Killing these processes:


Automater Package Description
Automater is a URL/Domain, IP Address, and Md5 Hash OSINT tool aimed at making the
analysis process easier for intrusion Analysts. Given a target (URL, IP, or HASH) or a file full of
targets Automater will return relevant results from sources like the following: IPvoid.com,
Robtex.com, Fortiguard.com, unshorten.me, Urlvoid.com, Labs.alienvault.com, ThreatExpert,
VxVault, and VirusTotal.

Source: http://www.tekdefense.com/automater/

Automater Homepage | Kali Automater Repo

• Author: TekDefense.com
• License: Other

Tools included in the automater package


automater – A IP and URL analysis tool
root@kali:~# automater -h
usage: Automater.py [-h] [-o OUTPUT] [-w WEB] [-c CSV] [-d DELAY] [-s SOURCE]
[--p] [--proxy PROXY] [-a USERAGENT]
target

IP, URL, and Hash Passive Analysis tool

positional arguments:
target List one IP Address (CIDR or dash notation accepted),
URL or Hash to query or pass the filename of a file
containing IP Address info, URL or Hash to query each
separated by a newline.

optional arguments:
-h, --help show this help message and exit
-o OUTPUT, --output OUTPUT
This option will output the results to a file.
-w WEB, --web WEB This option will output the results to an HTML file.
-c CSV, --csv CSV This option will output the results to a CSV file.
-d DELAY, --delay DELAY
This will change the delay to the inputted seconds.
Default is 2.
-s SOURCE, --source SOURCE
This option will only run the target against a
specific source engine to pull associated domains.
Options are defined in the name attribute of the site
element in the XML configuration file
--p, --post This option tells the program to post information to
sites that allow posting. By default the program will
NOT post to sites that require a post.
--proxy PROXY This option will set a proxy to use (eg.
proxy.example.com:8080)
-a USERAGENT, --useragent USERAGENT
This option allows the user to set the user-agent seen
by web servers being utilized. By default, the user-
agent is set to Automater/version

automater Usage Example


Use robtex as the source (-s) to scan for information on IP address 50.116.53.73:

root@kali:~# automater -s robtex 50.116.53.73


[*] Checking http://api.tekdefense.com/robtex/rob.php?q=50.116.53.73

____________________ Results found for: 50.116.53.73 ____________________


[+] A records from Robtex.com: www.kali.org

Anda mungkin juga menyukai