@@ -1,8 +1,9 @@
|
|||||||
---
|
---
|
||||||
title: "How to: backup google authenticator app two-factor secrets"
|
title: "How to: backup google authenticator app two-factor secrets"
|
||||||
date: "2017-06-12T11:44:46+02:00"
|
|
||||||
tags: ["gauth", "root", "android", "2fa"]
|
tags: ["gauth", "root", "android", "2fa"]
|
||||||
categories: ["recipe"]
|
categories: ["recipe"]
|
||||||
|
date: "2017-06-12T11:44:46+02:00"
|
||||||
|
draft: false
|
||||||
---
|
---
|
||||||
|
|
||||||
Quick and dirty:
|
Quick and dirty:
|
||||||
|
@@ -10,8 +10,10 @@ Sometimes it could be usefull to capture Wireless Lan packets: it could be done
|
|||||||
One of the tools almost every linux distro provides you is [`iw`](https://wireless.wiki.kernel.org/en/users/documentation/iw), meant to replace `iwconfig` being more powerful for configuring wireless devices.
|
One of the tools almost every linux distro provides you is [`iw`](https://wireless.wiki.kernel.org/en/users/documentation/iw), meant to replace `iwconfig` being more powerful for configuring wireless devices.
|
||||||
|
|
||||||
#### Getting Started
|
#### Getting Started
|
||||||
|
|
||||||
The working paradigm of `iw` is based on the identification of hardware lan devices (often referred as the "physical layer") and the network interface using that hardware (such as wlan0, eth0, ...).
|
The working paradigm of `iw` is based on the identification of hardware lan devices (often referred as the "physical layer") and the network interface using that hardware (such as wlan0, eth0, ...).
|
||||||
First you have to print a list of all devices and relative interfaces:
|
First you have to print a list of all devices and relative interfaces:
|
||||||
|
|
||||||
````
|
````
|
||||||
$ sudo iw dev
|
$ sudo iw dev
|
||||||
phy#0
|
phy#0
|
||||||
|
Reference in New Issue
Block a user