- Type at the command prompt
- tar xzf file.tar.gz- to uncompress a gzip tar file (.tgz or .tar.gz)
- tar xjf file.tar.bz2 - to uncompress a bzip2 tar file (.tbz or .tar.bz2) to extract the contents.
- tar xf file.tar - to uncompressed tar file (.tar)
- tar xC /var/tmp -f file.tar - to uncompress tar file (.tar) to another directory
- x = eXtract, this indicated an extraction c = create to create )
- v = verbose (optional) the files with relative locations will be displayed.
- z = gzip-ped; j = bzip2-zipped
- f = from/to file ... (what is next after the f is the archive file)
- C = directory. In c and r mode, this changes the directory before adding the following files. In x mode, changes directoriy after opening the archive but before extracting entries from the archive.
WiFi-Pumpkin (ex 3vilTwinAttacker) WiFi-Pumpkin Description Framework for Rogue Wi-Fi Access Point Attack. WiFi-Pumpkin is a very complete framework for auditing Wi-Fi security. The main feature is the ability to create a fake AP and make Man In The Middle attack, but the list of features is quite broad. Features Rogue Wi-Fi Access Point Deauth Attack Clients AP Probe Request Monitor DHCP Starvation Attack Credentials Monitor Transparent Proxy Windows Update Attack Phishing Manager Partial Bypass HSTS protocol Support beef hook ARP Poison DNS Spoof Patch Binaries via MITM Karma Attacks (support hostapd-mana) LLMNR, NBT-NS and MDNS poisoner (Responder) Pumpkin-Proxy (ProxyServer (mitmproxy API)) Capture images on the fly TCP-Proxy (with scapy) Plugins dns2proxy - This tools offer a different features for post-explotation on...
Comments
Post a Comment