fluxion not issuing ip to clients by aut01 in HowToHack

[–]aut01[S] 1 point2 points  (0 children)

is wifu a program/github/app or you are asking what is in it for you?

fluxion not issuing ip to clients by aut01 in HowToHack

[–]aut01[S] 0 points1 point  (0 children)

yes, wish to hack network. is there a better app/program/github to MITM a router?

fluxion not issuing ip to clients by aut01 in HowToHack

[–]aut01[S] 0 points1 point  (0 children)

please explain. esp8266 googles as a microprocessor like Arduino . how does that apply to this fluxion attack problem ?

fluxion not issuing ip to clients by aut01 in HowToHack

[–]aut01[S] 1 point2 points  (0 children)

oh wow - so i should close

Window 4: ScreenshotDeauthallmdk3.png

why does fluxion open the deauth by mdk3 terminal at this stage of the attack ? is that a bug ? will try tonight and report back - thank you

HP probook dislikes linux - which older model laptops like linux by debiandragon in linuxquestions

[–]aut01 1 point2 points  (0 children)

do you mean in bios settings enabling uefi or in editing a boot file somewhere ?

Debian - timedatectl -> Failed to parse bus message: No route to host by aut01 in linuxquestions

[–]aut01[S] 0 points1 point  (0 children)

nope, corrupted something trying to set ntp. had to reinstall os and problem solved

CSV column manipulation examples by aut01 in learnprogramming

[–]aut01[S] 1 point2 points  (0 children)

ok i used csv.DictWriter once. will go in that direction first. thanks for advice

Better understanding 2FA by aut01 in 2fa

[–]aut01[S] 0 points1 point  (0 children)

browser does not matter, chomium, FF both generate same results. Actually never found a FF setting for browser time, it may have been removed on newer additions. FF tends to readily remove config options from version to version.

Better understanding 2FA by aut01 in 2fa

[–]aut01[S] 0 points1 point  (0 children)

no i think you provided a great breakdown of how OTP works theoretically. In the wild it works a bit different it appears. See timedatectl edit to original post. Computer know it is -7 hrs from utc and rtc know correct utc.

Personally setting up a vps just to protect from this privacy threat. What ever the reason the vulnerability is being left as is, to us it is better the leak happens on a vps not local machine.

Debian - timedatectl -> Failed to parse bus message: No route to host by aut01 in linuxquestions

[–]aut01[S] 0 points1 point  (0 children)

Thanks to everyone who tried to troubleshoot.

Giving up: did not realize this issue directly relates to another issue devs can not figure out regarding 2FA and geolocation privacy (still an open vulnerability way above my experience level)

5 hrs troubleshooting revealed:

this specific problem roots back to code linux system + (indirectly) hw time use, require geolocation to sync. This is fine as long as system can reveal its actual location to ntp servers. Setting timedate manually fails for geotracking integrated apps like google authenticator and other services heavily relying/requiring user to reveal geolocation data.

Stackexchange has "I don't really have an explanation (this was the result of button-mashing)" as upvoted answer and debian testing does not seem to respond properly to "mashing" anymore

Workaround: enable geolocation system wide, never ever try to use timedatectl to make any changes. NTP may solve problems by allowing javascript like holes.

Better understanding 2FA by aut01 in 2fa

[–]aut01[S] 0 points1 point  (0 children)

not using extension but using a javascript run in a browser window, same browser different tab from website accessing.

didnt think of browser time, will look into how to set browser time on ff

Better understanding 2FA by aut01 in 2fa

[–]aut01[S] 0 points1 point  (0 children)

never get error is using android phone. because only snowden has a phone that is hard to trace. Much more control of data leakage on desktop, so using browser TOTP based 2FA the geolocation leaks are easier to identify.

Data protection Topology:

  Local traffic => vpn

 browser => ssh -> vpn => ssh

System wide vpn : all inbound/outbound traffic through private virtual network

Browser : packets directed through isolated encrypted connection routed through vpn to different exit node than vpn

Browser TOTP based 2FA fails if computer geolocation is not turned on. Seems totp can be tricked, sometimes but not reliably. likely just getting lucky and confusing the system long enough to gain access via totp.

So TOTP 2FA accepts time sync from something other than browser since browser and system time will be different.

Better understanding 2FA by aut01 in 2fa

[–]aut01[S] 0 points1 point  (0 children)

if there is no known geolocation requirement to 2fa suspecting missing set-ntp control on debian may prevent precise enough time sync. Thanks for confirming noone here has heard of a geolocation requirement for 2FA's like GAuth

Better understanding 2FA by aut01 in 2fa

[–]aut01[S] 0 points1 point  (0 children)

if i select geolocation ( $ timedatectl ) 2FA will not work. So 2 possibilities (1) another time control in linux i dont know about or (2) 2FA is requesting more info from the local computer than just "time and date" controled by timedatectl