Jump to content

All Activity

This stream auto-updates     

  1. Today
  2. what happens if you try to run the default payload: DELAY 2000 GUI r DELAY 500 STRING notepad.exe ENTER DELAY 1000 STRING Hello World! Is that blocked as well?
  3. Yesterday
  4. i think i may have missed a step somewhere because i followed that and after i start the new wpa_supplicant.conf i am greeting with: "successfully initialized wpa_supplicant" but when i issue ifconfig i find that the output is the same as before with no ip. could i have missed something?
  5. Thanks for sharing the link buddy.............it really is a simple device, which looks like it will work well in office environments........I will have to get a couple.......cheers again for sharing: Shark Jack A portable network attack and automation tool for pentesters and systems administrators designed to enable social engineering engagements and opportunistic wired network auditing. Getting Started Shark Jack Basics Default Settings Directory Structure LED Status Indications Product Information Specifications Important Safety Information and Warnings Payload Development Payload Development Basics LED SWITCH BATTERY
  6. Hardly, Found quite a bit of useful information and thought it nice to engage. Didn't realise it would cause such a stir. On your say so I shall refrain from engaging and merely be a spectator like many others are. Thank you though for pointing out that you believe I am hunting accreditation, hardly, unless you are giving away prizes. Thanks for your input, as it has scored me another point for no reason whatsoever, oh, and you for bringing it up also raises you by a point......maybe that is what you are after😴
  7. Guess I need a little more info. What is the build of your win10 box? My latest is 17763 and the one I'm on at the moment is 14393. Both have defender fully updated and I've been testing different inject.bin files on my rubber ducks all day. One even has the twin duck firmware on it. Win10 and defender and not blocking or deleting anything. Could you give a bit more info on your machine? Or has anyone else run into issues with this as well? I'll gladly test what I can on my side to see if I can replicate the issues you are having. Worse case you could always setup a VM and have it attack the VM and with that you could put any OS you want on there. But like theUNKNOWN said, you'll have to do some work to get the duck to do what you'd like to do.
  8. Edit: found it, it's still hosted on the wiki page
  9. i want to know,if possible,if u know some tutorials to do that
  10. Hello i'm new with the wifi pinapple nano,I bought it to do a pententest i8n my office to see if my workers will fall in the trap or not ,thanks .
  11. I'd suggest you go to Hak5 Youtube channel and go look at the episodes regarding the Pineapple. It explains it very well.
  12. Wow sorry to wake this thread back up but is the decoder on ducktoolkit.com broke? I'm getting a server post error. Any help would be great. Thanks.
  13. This isn't necessarily specific to the Screen Crab, but because I'm trying to use one when I came across this issue, I figured I'd post here. I'm trying to implant the Screen Crab inline between a networked device's motherboard and touch screen. Regardless of whether I use the Screen Crab or another capture device (or even just hook the device directly to a standard PC monitor), I don't get any output from the source. I've verified that the HDMI cables I'm using work fine, as everything is operational if I replace the cables in the device with my own standard cable, but if I try to connect any screen or capture card to the motherboard's HDMI out (besides the networked device's screen), I simply get zero output. Are there any protections for HDMI or video output (besides standard HDCP) that would be interfering with the capture/display on alternative monitor? Or perhaps some kind of alternative encoding approach that would be specific to the motherboard and built in screen (or maybe different region settings or something)? I'm not a video person, so forgive me if some of what I've theorized is nonsense. Any input would be much appreciated! Thanks!
  14. alexcc

    [Info] Tools

    The version on impacket posted is here very outdated and does not support authenticated SMB shares... tried to compile it from source but it fails error: command 'arm-linux-gnueabihf-gcc' failed with exit status 1 Has anyone had any luck compiling?
  15. Has anyone still got a copy of this firmware? got a bricked device and the link on the howto thread doesn't seem to work any more.
  16. Hi everyone, Since I haven’t found any reference concerning this matter in the forum, I thought it would be of interest for you to point out that in April 2018 members of the Russian GRU used a WiFi Pineapple Nano during a “close access cyber operation” against OPCW. An article, as well as the official (unclassified) slides published by the Dutch Ministry of Defense can be accessed by following the links below. Article: https://www.theguardian.com/world/2018/oct/04/visual-guide-how-dutch-intelligence-thwarted-a-russian-hacking-operation Slides: https://english.defensie.nl/binaries/defence/documents/publications/2018/10/04/gru-close-access-cyber-operation-against-opcw/ppt+pressconference+ENGLISH+DEF.pdf Cheers!
  17. Try to do a search first. A lot of basic questions have been answered at some point in time. Hope this helps 🙂
  18. Sorry...there must be a kind misunderstanding. I'm telling that if you plug the ducky into a Windows 10 actual environment, this environment doesn't permit the launch of the ininjection file...you're telling me that i've to improve. 🙂 If isn't possible to launch a file from a USB keyboard emulator like Rubber Ducky is the device is useless and how do you right told, good only for demo online and for selling it. The thing that hurt me is that is still sold on Amazon and on the HAK5 site when it's clear that today you can't use it in a real environment. If you tell me that bunny works maybe i can try...but i've doubt that you can bypass a windows machine with an antivirus full modules enabled..have you tried? if not bypass, will turn also that hardware in a useless one. I'm talking about windows because 95% of pc's of the world are windows based. Thank you very much anyway for your support, nice to meet you.
  19. Hi everyone! I set up a C2 on my VPS behind a reverse Proxy. I can access the Webinterface on https without any Problems and also made a device.config for my LanTurtle. The only thing is - the LT does not connect to that server. But I can See lots of https-traffic originating the LT running towards the VPS. I used this string to start the process: ./c2_community-linux-64 -hostname c2.domain.tld -reverseProxy -reverseProxyPort 443 -listenip 127.0.0.1 (Port 8080 / 2022 are not directly accessible from the web, but as I read 2022 is optional for console access through C2) Initially my LT hat Firmware V5 - no luck. In the release notes I read about Firmware V6 is needed for C2 V2.0 - updated to the new Firmware, still no luck. Do you have any advice what I should check next? By the way - in V6 the LT does not start any module in modulemanager.
  20. Dkrore

    Egypt

    Thank you for your effort I have a laptop 8560p hp when trying your tool to decrypt the protection bios shows me a message bad command or file name Can I restore the BIOS with that tool
  21. Hello, I'm the owner of Edutech. And checking my emails, I have gotten one question in the past two months which I replied to, and it was not about the Nano, but the Lan Turtle. Perhaps your email was caught by the spam folder? Also, thinking that being on the forums X amount of time means you can be a distributor? No.
  22. + If you want more speed try this payload: https://github.com/hak5/bashbunny-payloads/tree/master/payloads/library/credentials/SMBruteBunny
  23. As indicated "mmcbrute" could not connect to host "172.16.64.10" on port "445". That's actually a weird error since the Target IP Address is being obtained automatically from BB's DHCP server Debug: Try to make sure: 1. That that target already got this IP address "172.16.64.10" from BB DHCP server's IP pool, if not, then there is something wrong! 2. The target has no firewall activated, if so, BB won't be able to reach port 445 to perform the brute-force attack!
  24. I'm new to all this tech and new to ethical hacking as well. Is the pineapple nano like the Alfa AWUS036ACH but better??? What exactly is it and how does it work?
  25. For anyone facing this issue - I recommend following these two steps for recovery and upgrade to v3.1 - which includes a few bug fixes/enhancements. 1. Firmware Recovery https://docs.hak5.org/hc/en-us/articles/360010554753-How-do-I-reset-the-device-or-recover-its-firmware- 2. Manual Upgrade https://docs.hak5.org/hc/en-us/articles/360034848353-Manual-Upgrade Also - with all Hak5 gear that loads payloads from USB it's important that the drive is formatted with a single partition. Some USB flash disks (often Sandisk) ship with no partition table, rather the entire device formatted with a file system. Your systems disk utility should provide insight on this front.
  26. I envy you, I haven’t got it yet.
  1. Load more activity
×
×
  • Create New...