IndexCyber
IndexCyber
  • 81
  • 105 680
Overview of Web Penetration
LIMITED TIME FREE OFFER for subscribers;
Get Access to exclusive Hacking videos for FREE; Subscribe to the channel first then sign up on indexcyber.com
Переглядів: 33

Відео

OSI Model Explained in 2 minutes
Переглядів 5611 місяців тому
LIMITED TIME FREE OFFER for subscribers; Get Access to exclusive Hacking videos for FREE; Subscribe to the channel first then sign up on indexcyber.com OSI Model Explained in 2 minutes!
TCP IP Explained in 2 Minutes
Переглядів 13811 місяців тому
LIMITED TIME FREE OFFER for subscribers; Get Access to exclusive Hacking videos for FREE; Subscribe to the channel first then sign up on indexcyber.com The Internet protocol suite, commonly known as TCP/IP, is a framework for organizing the set of communication protocols used in the Internet and similar computer networks according to functional criteria.
Linux Commands in 4 Minutes
Переглядів 14111 місяців тому
LIMITED TIME FREE OFFER for subscribers; Get Access to exclusive Hacking videos for FREE; Subscribe to the channel first then sign up on indexcyber.com Linux commands in 5 minutes!
Linux overview in 1 Minute
Переглядів 25611 місяців тому
LIMITED TIME FREE OFFER for subscribers; Get Access to exclusive Hacking videos for FREE; Subscribe to the channel first then sign up on indexcyber.com Linux overview in 1 minute!
Essential Skills for Hacking
Переглядів 47811 місяців тому
LIMITED TIME FREE OFFER for subscribers; Get Access to exclusive Hacking videos for FREE; Subscribe to the channel first then sign up on indexcyber.com Learn Essential Skills for Hacking in 5 minuets!
File Path Traversal | Traversal Sequences Stripped with Superfluous URL Decode
Переглядів 2211 місяців тому
LIMITED TIME FREE OFFER for subscribers; Get Access to exclusive Hacking videos for FREE; Subscribe to the channel first then sign up on indexcyber.com Lab: portswigger.net/web-security/file-path-traversal/lab-superfluous-url-decode Welcome to Directory Traversal course Course description: Path traversal is also known as directory traversal. These vulnerabilities enable an attacker to read arbi...
File Path Traversal | Traversal Sequences Bypass Absolute Path Blocked
Переглядів 1711 місяців тому
LIMITED TIME FREE OFFER for subscribers; Get Access to exclusive Hacking videos for FREE; Subscribe to the channel first then sign up on indexcyber.com Lab: portswigger.net/web-security/file-path-traversal/lab-absolute-path-bypass Welcome to Directory Traversal course Course description: Path traversal is also known as directory traversal. These vulnerabilities enable an attacker to read arbitr...
File Path Traversal | Traversal Sequences Stripped Non-Recursively
Переглядів 1511 місяців тому
LIMITED TIME FREE OFFER for subscribers; Get Access to exclusive Hacking videos for FREE; Subscribe to the channel first then sign up on indexcyber.com Lab: portswigger.net/web-security/file-path-traversal/lab-sequences-stripped-non-recursively Welcome to Directory Traversal course Course description: Path traversal is also known as directory traversal. These vulnerabilities enable an attacker ...
File Path Traversal Simple Case
Переглядів 2211 місяців тому
LIMITED TIME FREE OFFER for subscribers; Get Access to exclusive Hacking videos for FREE; Subscribe to the channel first then sign up on indexcyber.com Lab: portswigger.net/web-security/file-path-traversal/lab-simple Welcome to Directory Traversal course Course description: Path traversal is also known as directory traversal. These vulnerabilities enable an attacker to read arbitrary files on t...
Directory Traversal Explained
Переглядів 3111 місяців тому
LIMITED TIME FREE OFFER for subscribers; Get Access to exclusive Hacking videos for FREE; Subscribe to the channel first then sign up on indexcyber.com Welcome to Directory Traversal course Course description: Path traversal is also known as directory traversal. These vulnerabilities enable an attacker to read arbitrary files on the server that is running an application. This might include: App...
Exploiting XXE to Perform SSRF Attacks
Переглядів 6611 місяців тому
LIMITED TIME FREE OFFER for subscribers; Get Access to exclusive Hacking videos for FREE; Subscribe to the channel first then sign up on indexcyber.com Lab : portswigger.net/web-security/xxe/lab-exploiting-xxe-to-perform-ssrf Welcome to XML external entity injection (XXE) Injection course Course description: XML External Entity attack, or simply XXE attack, is a type of attack against an applic...
Exploiting blind XXE to retrieve data via error messages
Переглядів 3511 місяців тому
LIMITED TIME FREE OFFER for subscribers; Get Access to exclusive Hacking videos for FREE; Subscribe to the channel first then sign up on indexcyber.com Lab : portswigger.net/web-security/xxe/blind/lab-xxe-with-data-retrieval-via-error-messages Welcome to XML external entity injection (XXE) Injection course Course description: XML External Entity attack, or simply XXE attack, is a type of attack...
Retrieve Files by Exploiting XInclude
Переглядів 5211 місяців тому
LIMITED TIME FREE OFFER for subscribers; Get Access to exclusive Hacking videos for FREE; Subscribe to the channel first then sign up on indexcyber.com Lab : portswigger.net/web-security/xxe/lab-xinclude-attack Welcome to XML external entity injection (XXE) Injection course Course description: XML External Entity attack, or simply XXE attack, is a type of attack against an application that pars...
Exfiltrate Data using a Malicious External DTD By Exploiting blind XXE
Переглядів 9511 місяців тому
LIMITED TIME FREE OFFER for subscribers; Get Access to exclusive Hacking videos for FREE; Subscribe to the channel first then sign up on indexcyber.com Lab : portswigger.net/web-security/xxe/blind/lab-xxe-with-out-of-band-exfiltration Welcome to XML external entity injection (XXE) Injection course Course description: XML External Entity attack, or simply XXE attack, is a type of attack against ...
Blind XXE with out-of-band interaction via XML parameter entities
Переглядів 6811 місяців тому
Blind XXE with out-of-band interaction via XML parameter entities
Blind XXE with out-of-band Interaction
Переглядів 8511 місяців тому
Blind XXE with out-of-band Interaction
Retrieve Files by Exploiting XXE
Переглядів 7011 місяців тому
Retrieve Files by Exploiting XXE
XXE Explained
Переглядів 236Рік тому
XXE Explained
SSRF Attack with Filter Bypass
Переглядів 68Рік тому
SSRF Attack with Filter Bypass
SSRF Attack with Blacklist Input
Переглядів 15Рік тому
SSRF Attack with Blacklist Input
Blind SSRF Attack
Переглядів 59Рік тому
Blind SSRF Attack
SSRF Attack Against Server
Переглядів 68Рік тому
SSRF Attack Against Server
Server Side Request Forgery(SSRF) Attack Explained
Переглядів 79Рік тому
Server Side Request Forgery(SSRF) Attack Explained
SQL Injection Capture Hidden Data
Переглядів 67Рік тому
SQL Injection Capture Hidden Data
SQL Injection Allowing Login Bypass
Переглядів 140Рік тому
SQL Injection Allowing Login Bypass
SQL Injection UNION Attack Retrieving Multiple Values in a Single Column
Переглядів 106Рік тому
SQL Injection UNION Attack Retrieving Multiple Values in a Single Column
SQL Injection with Filter Bypass
Переглядів 91Рік тому
SQL Injection with Filter Bypass
SQL Injection Attack Explained
Переглядів 294Рік тому
SQL Injection Attack Explained
SQL Injection with SQLMAP Practical Hacking 4
Переглядів 306Рік тому
SQL Injection with SQLMAP Practical Hacking 4

КОМЕНТАРІ

  • @yukio32
    @yukio32 12 днів тому

    does this support monitor and injection mode?

  • @antoniomax3163
    @antoniomax3163 12 днів тому

    Authorization is required now, how can I download it via a token?

  • @solomonray4891
    @solomonray4891 13 днів тому

    what is the git hub password

  • @paulaaguines5508
    @paulaaguines5508 16 днів тому

    Very good video, using these cards do I need to use kali, or not?

  • @JamesMorris-ox5oi
    @JamesMorris-ox5oi 17 днів тому

    what the user and password for git

  • @PrabuddhaDasGupta1966
    @PrabuddhaDasGupta1966 23 дні тому

    Thanks a ton. This worked on my debian 12.7 build on my hp laptop.

  • @mikaelcordeiro8008
    @mikaelcordeiro8008 Місяць тому

    worked for ubuntu 24.04.1 LTS as well. thanks

  • @DryUrEyesMate
    @DryUrEyesMate Місяць тому

    MediaTek MT7921AU wifi is the best just buy any brand that uses the same chip

  • @asheromoghene5707
    @asheromoghene5707 Місяць тому

    Cause I can't afford ine😢

  • @asheromoghene5707
    @asheromoghene5707 Місяць тому

    Is it possible to capture a handshake or even perform a Wi-Fi attack without an WiFi adapter

  • @asheromoghene5707
    @asheromoghene5707 Місяць тому

    Hi

  • @coxTNTcox
    @coxTNTcox Місяць тому

    sudo dkms add -m rt188x2bu -v ${VER) Error! Could not find module source directory. Directory: /usr/src/rt188x2bu-5.12.5.2 does not exist.

  • @moslimislam5714
    @moslimislam5714 Місяць тому

    Directly from get go at the first adapter you showed the wrong chipset. Never trust powerpoint videos. This guy is giving advise on wifi adapters he has never seen in real life, let alone tested, let alone being justified to make a video.

  • @FranRamosFx
    @FranRamosFx Місяць тому

    It worked for TP-Link Archer T2U Nano (WiFi Receptor) on Ubuntu 24.04. Thank you.

  • @Anybody1
    @Anybody1 Місяць тому

    I get this error sudo: dkms: command not found

  • @aboubakr8431
    @aboubakr8431 Місяць тому

    It works directly in wifiway no need to install

  • @ThakurRajVardhanSingh
    @ThakurRajVardhanSingh 2 місяці тому

    Thank u sooo much ❤❤

  • @masoyy
    @masoyy 2 місяці тому

    Hey bro i get this error when trying to build : Error! Arguments <module> and <module-version> are not specified. Usage: add <module>/<module-version> or add -m <module>/<module-version> or add -m <module> -v <module-version>

    • @IndexCybersecurity
      @IndexCybersecurity 2 місяці тому

      Ah, the cryptic whispers of DKMS-sometimes it feels like it’s speaking in riddles, doesn’t it? Fear not, intrepid coder! Let’s decode this together. The error message you’re encountering is akin to a grumpy librarian saying, “You can’t enter the library without a library card!” But worry not; we’ll sort this out. The DKMS Dilemma: DKMS (Dynamic Kernel Module Support) is like a backstage magician for kernel modules. It helps build and install them as your kernel evolves. When you’re trying to add, build, or install a module, DKMS wants you to be specific. It’s like asking for a particular book title, not just “something from the fiction section.” The Magic Incantations: Let’s break down the usage: add <module>/<module-version>: You’re inviting a module to the party. Specify its name and version. For example: dkms add my_module/1.0. add -m <module>/<module-version>: Same as above, but with a dash of mystery. “Mysterious module, reveal thyself!” For example: dkms add -m my_module/1.0. add -m <module> -v <module-version>: The Sherlock Holmes approach. “Elementary, my dear Watson! I seek module ‘my_module’ at version 1.0.” For example: dkms add -m my_module -v 1.0. The Patchwork Solution: You’re not alone in this conundrum. Others have faced it too, and some even patched DKMS to make it more cooperative. If you’re feeling adventurous, you could try the patch mentioned here. Or perhaps DKMS just needs a gentle nudge. Sometimes it’s like a stubborn cat-you offer it a treat, and suddenly it cooperates. 🐱 Remember, DKMS is a bit like a magical creature-it has its quirks. But with a dash of patience and a sprinkle of incantations, you’ll tame it! ✨

  • @pilusamabule6277
    @pilusamabule6277 2 місяці тому

    Hey bro, I'm done installing the drivers, I was able to switch to monitor mode once and now it doesn't want to I tried reinstalling the drivers and I even started my Kali afresh but it still refuses to switch to monitor mode.

    • @pilusamabule6277
      @pilusamabule6277 2 місяці тому

      When I use "arimon-ng start wlan0" it say monitor mode enable but when I check the interface is this in managed mode . When I use "sudo is dev wlan0 set type monitor" it says "Operation not permitted (-1)" please help

    • @IndexCybersecurity
      @IndexCybersecurity 2 місяці тому

      Ah, the delightful dance of wireless interfaces and their moods! Let’s untangle this web of Wi-Fi woes, shall we? Monitor Mode with airmon-ng: When you use airmon-ng start wlan0, it indeed enables monitor mode. But sometimes, life throws a curveball, and the interface still behaves like it’s sipping a latte in managed mode. First, let’s check for interfering processes. Run: airmon-ng check It’ll reveal any pesky processes that might be photobombing your Wi-Fi party. If they’re causing trouble, you can shoo them away with: airmon-ng check kill Now, try starting monitor mode again: airmon-ng start wlan0 It should create a new interface like wlan0mon. Keep an eye out for any process photobombers-it’s like Wi-Fi paparazzi! The Curious Case of iw dev: Sometimes, iw plays hard to get. If iw dev wlan0 set type monitor gives you the cold shoulder (“Operation not permitted (-1)”), let’s try a different approach. Check your device name using iwconfig. Maybe it’s feeling fancy and goes by something like wlp0s20u2. Instead of iw, use: iwconfig wlan0 mode monitor And to switch back to managed mode (when you’re done spying on packets): iwconfig wlan0 mode managed Voilà! Your interface should now be more cooperative. The Nexmon Chronicles: If you’re diving into Nexmon territory, be cautious. Sometimes, firmware changes can make interfaces vanish like Houdini. There’s a fix involving replacing cfg80211.c and recompiling the firmware. But tread carefully-it’s like whispering secrets to a Wi-Fi genie. Alternatively, consider the Aircrack driver from here. It’s like the James Bond of monitor mode. Remember, Wi-Fi interfaces have their quirks-like moody artists. If all else fails, maybe offer it a cup of chamomile tea and a soothing playlist. 🎶

    • @pilusamabule6277
      @pilusamabule6277 2 місяці тому

      @@IndexCybersecurity Bro, i just tried the fix but unfortunately it didn't work

  • @tachix_0
    @tachix_0 2 місяці тому

    thanks a lot it worked perfectly

  • @aprilvergara609
    @aprilvergara609 2 місяці тому

    this is not working now

  • @EmperorOfGames24
    @EmperorOfGames24 2 місяці тому

    TY for that it worked but i had to make some tweaks because of linux header version

  • @bamblabiy6194
    @bamblabiy6194 3 місяці тому

    it doesn't work for me

  • @nashnash4941
    @nashnash4941 3 місяці тому

    AP/VLAN SUPPORT

  • @tars3842
    @tars3842 3 місяці тому

    When i reboot it stop working

    • @tars3842
      @tars3842 3 місяці тому

      nevermind, i remade all steps and now is properly working :)

    • @IndexCybersecurity
      @IndexCybersecurity 3 місяці тому

      Glad to hear!

  • @dayronalfaro9461
    @dayronalfaro9461 3 місяці тому

    This video save me a day of work thx a lot man

  • @grigo005
    @grigo005 4 місяці тому

    The only tutorial that works on Ubuntu 24.04. Thank you very much

  • @Hashim-z3w
    @Hashim-z3w 4 місяці тому

    Is there anyone had kali linux freezes?

  • @NewNiklas0803
    @NewNiklas0803 4 місяці тому

    Thank you so much! It finally worked even 9 months later. Greetings from Germany!

  • @romanevgenyevich9783
    @romanevgenyevich9783 4 місяці тому

    thanks!!!

  • @ashwinkumarlimbanee3005
    @ashwinkumarlimbanee3005 4 місяці тому

    Hello, can you please check this? iwconfig wlan0 mode monitor Error for wireless request "Set Mode" (8B06) : SET failed on device wlan0 ; Operation not permitted. How to solve this?

    • @marcelsitorus6483
      @marcelsitorus6483 4 місяці тому

      try run it in root mode

    • @IndexCybersecurity
      @IndexCybersecurity 4 місяці тому

      The error message you’re encountering-“Error for wireless request ‘Set Mode’ (8B06) : SET failed on device wlan0 ; Operation not permitted”-indicates that your system is preventing the change of mode for your wireless adapter. This issue often occurs when trying to enable monitor mode on certain Wi-Fi adapters. Here are some steps you can take to address this issue: Check Adapter Compatibility: Some Wi-Fi adapters do not support monitor mode due to hardware limitations. Verify whether your TP-Link Archer T2U Plus AC600 adapter is compatible with monitor mode. Alternative Method: Instead of using iwconfig, try using the following commands: sudo ifconfig wlan0 down airmon-ng check kill airmon-ng start wlan0 This sequence should enable monitor mode without encountering the error1. Install Linux Headers (if needed): Sometimes missing Linux headers can cause issues with Wi-Fi adapters not showing up or failing to change modes. Install the Linux headers using the command: sudo apt-get install linux-headers-$(uname -r) Then update and upgrade your system: sudo apt-get update && sudo apt-get upgrade Driver and Kernel Versions: Ensure that you have the correct driver installed for your TP-Link Archer T2U Plus AC600 adapter. Some users have reported success with different drivers, such as the one available here2. Verify your kernel version and driver compatibility. Remember that the ability to use monitor mode depends on both the hardware and software configuration. If your adapter doesn’t support monitor mode, consider using a different Wi-Fi adapter that does.

  • @EricMagidson
    @EricMagidson 4 місяці тому

    It looks like the Git clone has been removed, is that the case?

  • @EricMagidson
    @EricMagidson 4 місяці тому

    When trying to complete this, I received an request for username and password for Github. Upon completing that I received a notice that authentication was removed and authentication failed for (The URL given). Is there a way to fix this or have you removed the repository for access. Thank you so much. I am new to this and am trying to configure 20 Rpi's for use in teaching.

    • @IndexCybersecurity
      @IndexCybersecurity 4 місяці тому

      It sounds like you’re encountering authentication issues when trying to access a GitHub repository. Let’s troubleshoot this: Personal Access Token (PAT): Many platforms, including GitHub, no longer accept passwords for Git operations. Instead, they require a Personal Access Token (PAT) for authentication. Here’s how you can generate a PAT on GitHub: Go to your GitHub account settings. Navigate to Developer settings > Personal access tokens. Generate a new token with the required scopes (e.g., repo for repository access). Using PAT for Authentication: Replace your GitHub password with the newly generated PAT. When prompted for authentication, use your GitHub username and the PAT as the password. Remove Old Credentials: If you previously saved credentials, remove them to avoid conflicts. On your local machine, go to Control Panel > User Accounts > Credential Manager. Manage Windows credentials and remove any generic credentials related to Git. Retry Cloning or Pushing: Now try cloning the repository or pushing changes. You’ll be asked to provide your GitHub username and the PAT you generated. Remember that using a PAT is more secure than using a password, especially for Git operations. If you encounter any further issues, feel free to ask-I’m here to help!

  • @manuelfreitas7165
    @manuelfreitas7165 4 місяці тому

    how to do it without internet?

  • @hichemxiaomi1448
    @hichemxiaomi1448 4 місяці тому

    Thankkkkk youuuuu mannnn 🎉❤

  • @Herobrinepvper
    @Herobrinepvper 4 місяці тому

    They all work on monitor mode?

    • @mr_redstone6699
      @mr_redstone6699 3 місяці тому

      yes, if you can hack with them, they support monitor mode and packet injection

  • @arifalkharusi3891
    @arifalkharusi3891 4 місяці тому

    does this work on the T2UB Nano?

    • @Yguy
      @Yguy 4 місяці тому

      Did you find a way?

    • @IndexCybersecurity
      @IndexCybersecurity 4 місяці тому

      The TP-Link Archer T2U Nano AC600 is a compact and high-speed Wi-Fi adapter that supports both 2.4 GHz and 5 GHz bands. Let’s explore its compatibility with Kali Linux and how you can set it up: Driver Installation: The Archer T2U Nano doesn’t have official Linux drivers, but you can use an unofficial driver from GitHub. Clone the driver repository using the following command: git clone github.com/aircrack-ng/rtl8812au.git Navigate to the downloaded directory: cd rtl8812au Compile and install the driver using: sudo make dkms_install Monitor Mode and Packet Injection: The Archer T2U Nano should work well with aircrack-ng tools. After installing the driver, you can use it for tasks like capturing packets, monitoring networks, and security testing. Verify Connectivity: Confirm that the adapter is recognized: iwconfig If it shows up, you’re ready to use it with aircrack-ng. Remember to replace any placeholders (like wlan0) with the actual name of your wireless interface. If you encounter any issues, feel free to ask-I’m here to help!

    • @Yguy
      @Yguy 4 місяці тому

      @@IndexCybersecurity Hey! It didn't work, I tried the exact commands and the dkms install also worked successfully but nothing shows up at all. It's as if the adapter isn't connected. Though it is connected, since it shows in lsusb (It showed even before following these steps) Please help me.

    • @overwroughtbloxxoverwrough9644
      @overwroughtbloxxoverwrough9644 2 місяці тому

      @@Yguy same issue

    • @Yguy
      @Yguy 2 місяці тому

      @@overwroughtbloxxoverwrough9644 I had installed the drivers successfully on my T2UB Nano btw, I actually plugged it in and found out that the drivers I had to install were different from what I needed and I googled those and installed them. I don't remember exact commands but you can search how to find firmware of usb adapter etc

  • @Deku-dm8zf
    @Deku-dm8zf 4 місяці тому

    Hello thanks for the tuto. Did the mode monitoring works on this device ? for testing : sudo ifconfig wlan0 down sudo iwconfig wlan0 mode monitor (error at this line if mode monitor not available) sudo ifconfig wlan0 up

    • @IndexCybersecurity
      @IndexCybersecurity 4 місяці тому

      The TP-Link Archer T2U Nano AC600 wireless adapter is a compact and affordable option. Let’s explore whether it supports monitor mode for wireless testing on Kali Linux: Monitor Mode Support: The TP-Link Archer T2U Nano AC600 (also known as the Archer T2U Plus) does support monitor mode12. Monitor mode is essential for tasks like packet capturing, network analysis, and security testing. Setting Up Monitor Mode: Follow these steps to enable monitor mode on your Archer T2U Nano in Kali Linux: Open a terminal. Disable the interface: sudo ip link set wlan0 down Set the interface to monitor mode: sudo iw wlan0 set monitor control Enable the interface: sudo ip link set wlan0 up Verify the mode using: iwconfig Remember to replace wlan0 with the actual name of your wireless interface. If you encounter any issues, feel free to ask-I’m here to help!

  • @rawfaytech6525
    @rawfaytech6525 4 місяці тому

    Is Alfa awus036h luxury is good for Kali Linux?? For Wifite attacks or etc...

    • @IndexCybersecurity
      @IndexCybersecurity 4 місяці тому

      The Alfa AWUS036H is a popular USB wireless adapter, but it’s essential to understand its compatibility and capabilities for Kali Linux. Let’s break it down: Chipset and Compatibility: The Alfa AWUS036H uses the RTL8187L chipset1. While it’s an older chipset, it has decent support in Kali Linux. However, newer chipsets (like the RT3070) are better suited for monitor mode and packet injection. Monitor Mode and Packet Injection: The AWUS036H (RTL8187L) can be used for monitor mode and packet injection. Monitor mode allows you to capture and analyze network traffic, while packet injection is essential for security testing and assessments. Alternative Adapters: If you’re specifically interested in Wifite attacks, consider other adapters like the AWUS036NH (which uses the Ralink RT3070 chipset). The RT3070 chipset is supported out of the box by Kali and works well for penetration testing tasks2. In summary, the Alfa AWUS036H (RTL8187L) can be used effectively with Kali Linux, but newer chipsets may offer better performance. Consider your specific use case and requirements when choosing a wireless adapter

  • @milanbatra
    @milanbatra 5 місяців тому

    Getting this error for ------ sudo dkms build -m rtl88x2bu -v ${VER} Error! Your kernel headers for kernel 6.6.15-amd64 cannot be found at /lib/modules/6.6.15-amd64/build or /lib/modules/6.6.15-amd64/source. Please install the linux-headers-6.6.15-amd64 package or use the --kernelsourcedir option to tell DKMS where it's located.

    • @IndexCybersecurity
      @IndexCybersecurity 4 місяці тому

      It appears that you’re encountering an issue related to missing kernel headers for your Kali Linux system. Let’s address this step by step: Install Kernel Headers: Kernel headers are essential for building modules that interact with the Linux kernel. To install the necessary kernel headers, open a terminal and run the following command: sudo apt install linux-headers-$(uname -r) This command will install the headers corresponding to your current kernel version (as reported by uname -r). Reboot: After installing the headers, reboot your system to ensure the changes take effect: sudo reboot Verify Installation: Once your system is back online, check if the kernel headers are correctly installed: uname -r You should see the version matching your current kernel (e.g., 5.14.0-kali4-amd64). Retry DKMS Build: Now try running your DKMS build command again: sudo dkms build -m rtl88x2bu -v ${VER} If everything is set up correctly, it should proceed without errors. Remember to replace ${VER} with the actual version you intend to use. If you encounter any further issues, feel free to ask-I’ll be happy to assist!

  • @mcrevolver6399
    @mcrevolver6399 5 місяців тому

    Hi. Is this little guy compatible with pen testing tools (like monitoring , etc)?

  • @She-s_in_YT
    @She-s_in_YT 5 місяців тому

    Thank you for creating this video! Question: TP Link AC600 (Archer T2U) Does it support: - Monitor Mode - Wireless Injections - AP Mode ? And what are your thoughts on the MediaTek MT7921AUN chipset in the ALFA AWUS036XML? Thank you!

    • @IndexCybersecurity
      @IndexCybersecurity 4 місяці тому

      Let’s dive into your questions about the TP-Link Archer T2U AC600 and the ALFA AWUS036XML: TP-Link Archer T2U AC600: The TP-Link Archer T2U AC600 is a budget-friendly USB Wi-Fi adapter. Here’s how it fares in terms of the features you’ve asked about: Monitor Mode: Yes, the Archer T2U AC600 supports monitor mode1. Wireless Injections: It also supports packet injection1. AP Mode: While it’s primarily a client adapter, it doesn’t natively support AP mode. However, you can create a software-based access point using your operating system’s tools. ALFA AWUS036XML: The ALFA AWUS036XML features the MediaTek MT7921AUN chipset. This chipset is compatible with both Linux (including Kali) and Windows. The AWUS036XML supports WiFi 6/6E (802.11ax) with tri-band (2.4 GHz, 5 GHz, and 6 GHz) capabilities. It offers impressive speeds up to 3000 Mbps when used with a compatible WiFi 6E router. The adapter also includes Bluetooth v5.2 for higher-quality audio over Bluetooth devices. In summary, both adapters have their strengths. The TP-Link Archer T2U AC600 is a reliable budget option, while the ALFA AWUS036XML with the MediaTek MT7921AUN chipset provides advanced features and compatibility. Choose based on your specific needs and use cases!

    • @She-s_in_YT
      @She-s_in_YT 4 місяці тому

      @@IndexCybersecurity Thank you for your reply! I have decided to purchase AWUS036ACH. I haven't been able to test it, because I have been caught up in many other things but it's always in my bag!

    • @sezartv4724
      @sezartv4724 3 місяці тому

      @@She-s_in_YT Was it good?

  • @basil4044
    @basil4044 5 місяців тому

    sudo dkms build -m rtl88x2bu -v ${VER} Error! Your kernel headers for kernel 6.6.15-amd64 cannot be found at /lib/modules/6.6.15-amd64/build or /lib/modules/6.6.15-amd64/source. Please install the linux-headers-6.6.15-amd64 package or use the --kernelsourcedir option to tell DKMS where it's located.

    • @IndexCybersecurity
      @IndexCybersecurity 4 місяці тому

      To resolve the issue with missing kernel headers, follow these steps to install the necessary headers on your Kali Linux system: Update Repositories: Open a terminal and update the package repositories: sudo apt update Upgrade System: Upgrade your system to ensure you have the latest packages: sudo apt upgrade -y Reboot: After upgrading, reboot your system: sudo reboot Check Kernel Version: Once the system is back online, verify your kernel version: uname -r Install Kernel Headers: Install the appropriate kernel headers for your current kernel version: sudo apt install linux-headers-$(uname -r) Accept Installation Prompts: Accept any prompts that appear during the installation process. Now your system should have the necessary kernel headers, and you can proceed with building the DKMS module. If you encounter any further issues, feel free to ask-I’m here to help!

    • @hackerwarsu1670
      @hackerwarsu1670 Місяць тому

      It's showing unable to locate package linux-headers-6.6.11-amd64 Error: couldn't find any package by glob 'linux-headers-6.6.11-amd64

  • @HuzefaMango
    @HuzefaMango 5 місяців тому

    Sudo modprobe 8821au: command not found plz help

    • @IndexCybersecurity
      @IndexCybersecurity 4 місяці тому

      It seems you’re encountering the “sudo: command not found” error. Let’s troubleshoot this step by step: Check if sudo is Installed: First, verify whether sudo is installed on your system. Run the following command: sudo --version If it’s not installed, you’ll need to install it. Install sudo: If sudo is missing, you can install it using the package manager. For Debian/Ubuntu-based systems, run: sudo apt install sudo For other distributions, use the appropriate package manager (e.g., yum, dnf, or zypper). Add User to sudo Group: Ensure that your user account is part of the sudo group. Run: sudo usermod -aG sudo your_username Replace your_username with your actual username. Update PATH Variable (if needed): Sometimes the sudo directory is not included in the PATH variable. Edit the /etc/profile file (as root) and add the following line: export PATH="/usr/sbin:$PATH" Save the file and restart your terminal. Retry the Command: Now try running your original command again: sudo modprobe 8821au Remember to replace 8821au with the correct module name. If you encounter any further issues, feel free to ask-I’m here to help!

  • @NetBSDToaster-u8e
    @NetBSDToaster-u8e 5 місяців тому

    Hi guys! Does somebody know if one of the adapters work with LibreLinux kernel? I have problems finding one ....

  • @joa5097
    @joa5097 5 місяців тому

    Great! working now ! Thank u my friend !

  • @devinegamingtv3427
    @devinegamingtv3427 5 місяців тому

    ALFA AWUS036NHA is my choice if you want one adapter that works right out of the box. Key Features Chipset: Atheros AR9271 Wireless Standards: IEEE 802.11b/g/n Frequency Band: 2.4 GHz Antenna: 5 dBi omni-directional RP-SMA Data Rate: Up to 150 Mbps Compatibility: Excellent support for monitor mode and packet injection Why It’s Best for Kali Linux Driver Support: The Atheros AR9271 chipset is well-supported by the ath9k_htc driver in the Linux kernel. This means that you can use the adapter with minimal driver issues, right out of the box. Monitor Mode and Packet Injection: The Alfa AWUS036NHA supports both monitor mode and packet injection, which are essential for network penetration testing. These features allow you to capture and analyze all wireless traffic in the vicinity and perform various types of wireless attacks. Community and Documentation: This adapter has a strong following in the penetration testing community. There is ample documentation and community support available for troubleshooting and advanced usage scenarios. Stability and Reliability: Known for its stable performance and reliability during long penetration testing sessions. It doesn’t overheat easily and maintains a strong signal. I have had mine for years and it's still working like a charm, never overheats and for long pen testing sessions it still performs at 100%. I used another adapter before which overheated under sessions and I started seeing quality drop significantly after only 30-40 minutes.

  • @shani54631
    @shani54631 5 місяців тому

    thanks

  • @BARDAKABRAMA
    @BARDAKABRAMA 5 місяців тому

    why the f you've said it is 2024 adapters if you don't have a word on a new model AWUS036AXML

  • @sumeetkaushik2926
    @sumeetkaushik2926 5 місяців тому

    Amazing bro it works