Hello Everyone,
I need help regarding wireless pentesting.
Installed Os= Parrot OS as standalone HVM.
Chaining= sys-usb (provides network) < sys-firewall < Parrot OS
I have also tried directly using sys-usb upto no avail.
Not a right place to asking for pentest,
but if you want learn how networking works in qubes, thereās a good doc Networking | Qubes OS and Firewall | Qubes OS
You donāt say how many WiFi devices you have, or what you are trying to
do.
If you only have one device, then some techniques will work, some wont,
If you intend to pentest low level features of WiFi itself, then get a
dedicated device, which you attach to the Parrot qube.
If you want to pentest over WiFi that will work with your set-up.
I am trying to do some moniter mode stuff using aircrack-ng.
While internal wifi works using PCI passthrough I need usb adapter to work.
I tried assigning usb controller to parrot qube but got the following error while boot: Start failed: internal error: āUnable to reset PCI device 0000:00:14.0: no FLR, PM reset or bus reset available, see /var/log/libvirt/libxl/libxl-driver.log for detailsā.
Meanwhile here is what I got from logs:
1. libxl: libxl_pci.c:1489:libxl__device_pci_reset: The kernel doesnāt support reset from sysfs for PCI device 0000:00:14.0
2. libxl: libxl_domain.c:853:pvcontrol_cb: guest didnāt acknowledge control request: -9
3. libxl: libxl_device.c:1146:device_backend_callback: Domain 37:unable to remove device with path /local/domain/33/backend/vif/37/0
I was trying to apply usb controller to main parrot vm not usb-qube.
In my case there are three sys-usb vms namely sys-usb, sys-usb-clone, parrot-usb.
So my question is if I apply āqvm-pci attach --option no-strict-reset=true parrot-usb dom0:00_14.0ā to parrot-usb will it affect other also?
If Yes, how to reset this option?
On another note is there any way to attach usb adapter to parrot os itself without any middleman i.e, sys-usb (parrot-usb in this case)?
Here are my takeaways from this post, correct me if I am wrong:
Clone sys-net and install pentest tools on it.
Allow it to access usb adapter using pci passthrough and capture data.
Allow it to transmit data backchannel safely.
Perform inspection on data in pentest qube.
I will be researching more and report back my findings for future users.
At last I have unorthodox question regarding virtualization inside one of my sanboxed windows hvm. I am trying to run vmware inside of it to perform some analysis. Encountered error as follows:
This host does not support Intel VT-x. This host does not support āIntel EPTā hardware assisted MMU virtualization. VMware Workstation does not support the user level monitor on this host. Module āMonitorModeā power on failed. Failed to start the virtual machine
Is that possible? If Yes, do point me in right direction.
You can, but need not, use a cloned sys-net for pentesting.
Depending on the tools you want to use you can run them from a connected
qube.
If you want to keep normal and pentesting activities separate then
using a separate sys-net with separate attached NICs is a good thingā¢
I gather data in āpentest qubeā and analyse it in a separate qube,
sometimes disposable, either offline or part of a virtual net.
On your bonus question, it is possible to run VMware in nested VMs.
Whether you can do this will depend on what hardware you have, what
guests you want to run, what version of VMware you have, and so on.
Iām fairly certain that Workstation wont work under Xen, but you could
prove me wrong.