#Wireless Penetration Testing Cheat Sheet
##WIRELESS ANTENNA
- Open the Monitor Mode
root@uceka:~# ifconfig wlan0mon down
root@uceka:~# iwconfig wlan0mon mode monitor
root@uceka:~# ifconfig wlan0mon up
#Wireless Penetration Testing Cheat Sheet
##WIRELESS ANTENNA
root@uceka:~# ifconfig wlan0mon down
root@uceka:~# iwconfig wlan0mon mode monitor
root@uceka:~# ifconfig wlan0mon up
| SSE3=1 SSSE3=1 SSE4_1=1 SAHF=1 AVX=1 FMA3=1 BMI1=1 BMI2=1 LZCNT=1 POPCNT=1 ATOM=0 | |
| Synopsis: | |
| shell [options] [--shell] [<file>...] | |
| d8 [options] [-e <string>] [--shell] [[--module] <file>...] | |
| -e execute a string in V8 | |
| --shell run an interactive JavaScript shell | |
| --module execute a file as a JavaScript module | |
| Options: |
git clone https://chromium.googlesource.com/chromium/tools/depot_tools.gitsudo nano ~/.bash_profileexport PATH=/path/to/depot_tools:"$PATH" (it's important that depot_tools comes first here)| ### Keybase proof | |
| I hereby claim: | |
| * I am am06 on github. | |
| * I am adrian_t (https://keybase.io/adrian_t) on keybase. | |
| * I have a public key ASBE8qJzf9SdMJeWZU23F1GjBcoOrLheY__2FBBoaG6_0wo | |
| To claim this, I am signing this object: |