Jump to content
Hak5 Forums

Leaderboard


Popular Content

Showing content with the highest reputation since 07/18/2017 in all areas

  1. 7 points
    Kali Linux Revealed book is now online. So back in 2013, there was this thread about kali documentation and a PDF e-book to go along - Which still holds true today. The docs.kali.org site is still up, and will be updated as changes happen. However, some of you may have heard, or not, so I wanted to update everyone, if you want to learn Kali Linux (not penetration testing, but the OS itself) more in depth, from customizing your own kernel and ISO deployments, to pre-loading drivers needed for installation on work machines and your own compatible/incompatible hardware to work as needed, deploy your own repositories with tools not already on the Kali repo, create attack appliances like the Evil Kali AP, then you will probably want to check out the Kali Linux Revealed book. Now, this might sound really spammy. And if I was only promoting the book to have you buy it, I would agree with you(I debated on whether I would ever post this here, but I know a lot of the hak5 community uses it alongside their other Hak5 tools and Pineapples) - but, we have taken the book, and converted it to a website, that we have given away FREE to the community. That is to say, the entire book is in web form, for free, search-able text, and we offer a PDF version for download from our new child site. Check out https://kali.training/ if you weren't already aware of it. I worked on converting the book from the HTML draft to create the wordpress version of the site which is linked above. A lot of man hours went into creating not only the book, but the site, and also material that was recently showcased at BlackHat for those who took the Kali Revealed class. It's an introduction to Kali and Linux, and a good primer for anyone who also might be thinking about the OSCP. Again, this is NOT a pentesting book, but if you do use Kali for learning pentesting and CTF's, this will still be a valuable resource for everyone. As Kali evolves and the Kali Team makes changes to the OS, the site will also update to reflect this over time, with new volumes released on the site as well. The book is also a mini-primer for Linux in general, so if you want to learn Linux and were always afraid to make Kali your first distro, this would be a great place to go and get your feet wet (I know a lot of people have always said don't start with Kali - personally I think that doesn't hold true today with it's Debian roots and would recommend it to anyone - my kids and wife use it as the family living room desktop, so it works fine for every range of user, n00b to l33t haxor...cough..). I'll admit, having worked on the site and reading only parts of it in full while converting it from the book the site, I myself am still a n00b when it comes to a lot of things Linux related in general, and while I use Kali for "fun" with CTF's, I am by no means fluent with it. I still have to sit down and read it in full myself, but I'm familiar with the topics in it and know that I need to brush up on a lot of the fundamentals. Just a reminder, this is not a Penetration Testing book. It's a Kali Linux OS book for sysadmins and InfoSec folks who need to deploy for their own use, or need to use and get familiar with, but it also is a complete walk-through from setup for new users, to more technical admin side towards the end of the book for anyone already in the field with a lead in for assessments.
  2. 6 points
    Locking this before anyone flames the poor guy. If you look at the Hak5 Youtube channel they have a section of videos on the Pineapple, those and the web site should tell you everything you need to know.
  3. 5 points
    Read the rules. Questions about hacking your school(or any system not your own) are not things we help with here. Learning to use the tools, read the ducky section of the forums. Attacking systems and people without permission, is your responsibility, we don't want to know about it, nor are we going to assist with it. Don't be surprised if this thread gets locked.
  4. 4 points
    As digip says, this would be considered illegal activities and so is now allowed on this forum, please don't post questions like this again.
  5. 3 points
    Testing done. This is the final look for the module and setup multiple terminals pop-up for different jobs (For my terminal junkies). This is my first ever project for the nano. Hope you cats dig it. I like to thank kbeflo for pointing me in the right direction. Also, I have to shoutout to Zylla for compiling the package. All I did was develope the php files and install script for the module. Here's where you can get the module for now for those that can't wait. https://github.com/Ei8htbits/SSHWebClient I still need to submit it for review and approval.
  6. 3 points
    I would estimate late August / mid September. It's actually four devices so far. The LT 3G has an unannounced brother :)
  7. 3 points
    Hey everyone, I guess I can give you guys a tiny bit more information.. The Packet Squirrel is not the Lan Turtle 3G, it is a different product. The Packet Squirrel is not wireless. The Packet Squirrel will be awesome. More information will be released closer to the launch of the Hak5 Packet Squirrel.
  8. 3 points
    So here's what I've got so far. Now I just need to create a installer and test it.
  9. 3 points
    Another one bites the dust..
  10. 3 points
    One of my favourites, because my name is in Sally's list
  11. 2 points
    indeed interesting tool. Nice find. I just ran it on my tetra and it picked up pineap well and deauthed my clients. It does what it says. Edit - just be aware of wlan0mon being hard coded for the deauth if running it on a tetra/pineapple! I changed mine. I was looking at https://github.com/moha99sa/EvilAP_Defender/wiki or https://github.com/SYWorks/wireless-ids previously but this looks like it will do a similar job (although reduced functionality) more efficiently and can run on the pineapple itself. Thanks for sharing :)
  12. 2 points
    I forgot, there's also a patch-file and a init file to be used. I've compressed an archive containing the Makefiles and patches, etc. Here you go: shellinabox.tar.gz
  13. 2 points
    Hey everyone, When we first developed the Bash Bunny we wanted to make sure that upgrading the firmware and payloads was dead simple. While we believe that we have succeeded in this task, we are aware of a number of issues with the upgrade process. While these issues mostly come down to outdated documentation, we wanted to go a step further and make the process even easier. Today we are releasing the first version of the Bash Bunny Updater. As the name already says, this updater is able to update your Bash Bunny's firmware and payloads for you, without the hassle of having to check for updates yourself. Please let us know of any feedback or questions you may have in this thread. We want to make the experience of updating your Bash Bunny as simple as possible. Usage: Windows: The Bash Bunny Updater requires no special instructions on Windows. Simply download and extract the ZIP file and drag-and-drop the bunnyupdater.exe file to the mass storage partition of the Bash Bunny while it is in arming mode. To run it, simply double-click the updater. You will be guided through the rest of the process automatically. Linux: As the Bash Bunny's mass storage partition is formatted FAT32, it is not possible to simply copy the bunnyupdater executable to the mass storage partition and execute it. There are two ways to run the updater: Rename the updater to bunnyupdater.exe and place it onto the mass storage partition of the Bash Bunny. This sets the executable bit and allows you to simply ./bunnyupdater.exe to launch it Run the bunnyupdater with an environment variable: BUNNYPATH=/path/to/bunny/ ./bunnyupdater MacOS / OSX: Coming soon. Downloads: Linux (32bit) Linux (64bit) Windows (32bit) Windows (64bit) MacOS / OSX (coming soon) Sources: Coming soon to https://github.com/hak5/bashbunny_updater.
  14. 2 points
    But how am I to find my dick pills???!!!
  15. 2 points
  16. 2 points
    Best place to check is the aircrack wiki and see if they have any documentation on special features. Many programs have hidden switches and features, but not sure about this one. They also have their own forums, where you should ask there as well, so you can get an official response from the Aircrack team. Maybe adding it as a feature is a valid request.
  17. 2 points
    Awesome, glad it worked for you. You can always keep the executable the same and just use the BUNNYPATH environment variable. This is correct. I should probably make this more obvious. That's currently how firmware upgrades behave, and has nothing to do with the updater. The updater will actually make sure to back up your switch1 and swtich2 payloads when it updates your payloads.
  18. 2 points
    I find that a few sips of the jameson helps my mind sift through the rubble
  19. 2 points
    The USB Rubber Ducky will automatically run it's payload once it is inserted. It does NOT wait for the operating system to initialize (as it cannot receive feedback about this), so a DELAY at the beginning of the payload is usually required.
  20. 2 points
    Yeah, Johnny wrote the preface, helped proofread and also helped teach the recent class at BlackHat. He's now working with us as well. He has in the past, back when Offsec did some classes in the Caribbean, might have still been backtrack back then, and recently joined us full time when he came back to the states. Johnny is a great guy and a great contributor to the InfoSec community in general, not to mention his work on HFC.
  21. 2 points
    Have been enjoying my copy for the last couple of weeks.
  22. 2 points
    Holy shit. That is a boss thing od you to do. Not just content that people love but if it's someting that you are pationate about (which free content is often a derivative of) thencit's also going to be a great read. Thank you for your efforts and time.
  23. 2 points
    Late night drinking caused me to accidentally delete my repo in github. Ooops! Well, I spent most of the day re-coding everything and I think I may have fixed the ip issue. Let me know you have any issues... Cheers :P and good night... I think. Here's the new link and files: https://github.com/Ei8htbits/SSHWebClient
  24. 2 points
  25. 2 points
    You're talking about a PTW attack, which Tkiptun-ng does. Only works on systems that use TKIP without AES, which most systems today, that use WPA with AES, or WPA2, aren't vulnerable to. Has to be specific to the attack. https://www.aircrack-ng.org/doku.php?id=tkiptun-ng explains in more detail.
  26. 2 points
    One of these two links should get it for you. wifipineapple.com/wp6.sh or https://github.com/hak5darren/wp6
  27. 2 points
    @Just_a_User and I have also been doing some research and found the same stuff that all of you did. However, we also discovered, there is a domain name registered (with nothing on it: http://packetsquirrel.com) and we combed through the fcc site looking for the new device, but was not able to find it. I have bugged seb, mubix and darren on irc, but they are all keeping quiet for now...
  28. 2 points
    1, she's a spy and looks like her phone(but just a guess), 2, I don't think Hak5 has any control over what a movie does with a picture of a pineapple. Not like Hak5 invented the fruit or have exclusive rights over the imagery of said fruit..not sure what you're implying.
  29. 2 points
    What is a packet squirrel? It's a device from Hak5. And why dont a own one Cause you no can haz packets! Only for squirrels!
  30. 2 points
  31. 2 points
    Huh. So it's not the Packet Squirrel then. A LAN Turtle with 3G makes sense though as you could access it from the outside much easier, or even just send packets out easier, rather than using the internet of the thing you've plugged the LAN Turtle into (which means easier to see that something is piggybacking off your LAN).
  32. 2 points
    LAN Turtle 3G Setup Welcome DEF CON hacker :) You're the first to get your hands on the new LAN Turtle 3G. We're officially launching in August, but everything is ready to go now. Essentially setup is the exact same as with the regular LAN Turtle - so all instructions from <a href="https://lanturtle.com/wiki/#!index.md">the wiki</a> and <a href="https://lanturtle.com/wiki/#!videos.md">the video tutorials</a> apply. The distinction is that you'll need to insert a Micro SIM card. That's the SIM that's 12 x 15mm -- the one in between the larger Standard size and the smaller Nano size. Typically SIM cards come with the snap-out adapters. To install the SIM card, open the LAN Turtle 3G carefully. Remove the two screws on the bottom of the unit and with care separate the top and bottom plastics. There is an antenna attached to the top plastic part, so just be gentle as you separate them. The SIM card slots in on the side of the 3G module with its metal contacts facing the PCB in a top facing orientation. Then re-assemble the LAN Turtle 3G. Stickers are provided for stealth. On the software side you'll find the 3G WAN options from the main configuration menu. Typically it's just a matter of setting the APN. The module will maintain the connection, so there's no other configuration necessary. @Just_a_User @Dave-ee Jones Found this on Hak5 github.
  33. 2 points
    While it's awesome that the community helps each other out, pretty sure such actions will void any warranties. Meanwhile if there is an actual defect, and it's under warranty, it can be replaced.
  34. 2 points
    If it's UEFI boot, get a live disc ISO that has EFI boot capabilities, and you can then grab the SAM file and crack the passwords offline(or while booted live). A live disc of Kali 2017.1 should have EFI by default on it, (I know the KDE version of 2017.1 does). You can then boot in EFI mode, apt-get update and install ophcrack's basic NT password list(can also throw larger one on USB and mount and use for crack list) then crack the passwords. If can't crack them, then If needed, you can also replace the NT passwords with chntpw. Google it. Should be fairly quick to change the password.
  35. 2 points
    I have offered many times, too look at these for people, all you have to do is send it to me with the problem its having and I will test it, and where possible repair it using higher grad components. The trouble for most of you guys I am UK based. Could even set up and ebay page to make things run smoother.
  36. 2 points
    Is airdrop-ng still around? We may have been playing with it at a shmoocon several years ago. I can't remember who we were messing with at the time, but we were killing his Macbook Pro's connection. Guess he didn't pray to the demo-gods enough before his talk... ;-) Hahahahahaha!! Found it! It was Kingtuna and TheX1le. They released airdrop-ng a couple days before the con. They were trying to give a talk about it. Seems to work! https://ia800602.us.archive.org/29/items/shmoocon2010/WifiBomb-Kingtuna.m4v
  37. 2 points
    You need to initiate firmware recovery. I know you've said you've done it many times but it is easy to mess up. Basically what happens is if it fails to boot 3 times or more it will attempt to recover itself. To make it fail boot you plug it in, wait for the light to go green and pull it out immediately. Do this 3 times. On the 4th try you should notice it is flashing red. Leave it to do so and DON'T UNPLUG IT. Predicted wait time is about 3 minutes, and the Bash Bunny will automatically reboot when it's done. After that it should be fine. If it isn't fine after you've done that and still refuses to boot it could be a hardware error or the backup partition doesn't exist. This means you should talk to Hak5 Support, they can help you better than I can from this point on. They're pretty good with replacements, as long as it's a hardware error. You should also look around the forums for other posts similar to this as this is a fairly common problem. Hope it helps! :)
  38. 2 points
    Get involved in open source projects and become active in mailing lists and forums. If you can get to conferences then do. Write blog posts about what you are learning. Use all that to build yourself a reputation and get to know people. Once you have that built up then when you are ready to try to find a job you have a network of people to ask a a portfolio to point interviewers at.
  39. 2 points
    This batch file is a pretty comprehensive list of default passwords by router: https://github.com/wpatoolkit/Default-Keyspace-List mkdir "./defaultwpa" cd "./defaultwpa" mkdir "2WIREXXX-[0-9][len10]" mkdir "3Wireless-Modem-XXXX-[0-9A-F][len8]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./3Wireless-Modem-XXXX-[0-9A-F][len8]/3WirelessDefault.txt" mkdir "Alice-12345678-[0-9a-z][len24]" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/AliceGermanyKeygen.cpp>"./Alice-12345678-[0-9a-z][len24]/AliceDefault.txt" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/AliceItalyKeygen.cpp>>"./Alice-12345678-[0-9a-z][len24]/AliceDefault.txt" echo http://wpacalculator.altervista.org/XL/Alice.php>>"./Alice-12345678-[0-9a-z][len24]/AliceDefault.txt" mkdir "Andared" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/AndaredKeygen.cpp>"./Andared/AndaredDefault.txt" mkdir "AOLBB-XXXXXX-[0-9A-Z][len8]" mkdir "Arcadyan" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/ArcadyanKeygen.cpp>"./Arcadyan/ArcadyanDefault.txt" mkdir "ArnetPirelli" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/ArnetPirelliKeygen.cpp>"./ArnetPirelli/ArnetPirelliDefault.txt" mkdir "ATTXXX-[0-9][len10]" mkdir "ATTXXXX-[0-9A-Z][len10]" mkdir "ATTXXXXXXX-[0-9a-z+][len12]" mkdir "Axtel" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/AxtelKeygen.cpp>"./Axtel/AxtelDefault.txt" mkdir "belkin.xxx-[2-9a-f][len8]" echo https://github.com/wpatoolkit/8-Hex-Generator>"./belkin.xxx-[2-9a-f][len8]/BelkinDefault.txt" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/BelkinKeygen.cpp>>"./belkin.xxx-[2-9a-f][len8]/BelkinDefault.txt" echo https://bitbucket.org/dudux/belkin4xx>>"./belkin.xxx-[2-9a-f][len8]/BelkinDefault.txt" echo https://github.com/Konsole512/Crippled>>"./belkin.xxx-[2-9a-f][len8]/BelkinDefault.txt" echo http://www.routerpwn.com/belkinwpa/>>"./belkin.xxx-[2-9a-f][len8]/BelkinDefault.txt" echo https://raw.githubusercontent.com/devttys0/wps/master/pingens/belkin/pingen.c>>"./belkin.xxx-[2-9a-f][len8]/BelkinDefault.txt" mkdir "Belkin.XXXX-[0-9A-F][len8]" echo https://github.com/wpatoolkit/8-Hex-Generator>"./Belkin.XXXX-[0-9A-F][len8]/BelkinDefault.txt" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/BelkinKeygen.cpp>>"./Belkin.XXXX-[0-9A-F][len8]/BelkinDefault.txt" echo https://bitbucket.org/dudux/belkin4xx>>"./Belkin.XXXX-[0-9A-F][len8]/BelkinDefault.txt" echo https://github.com/Konsole512/Crippled>>"./Belkin.XXXX-[0-9A-F][len8]/BelkinDefault.txt" echo http://www.routerpwn.com/belkinwpa/>>"./Belkin.XXXX-[0-9A-F][len8]/BelkinDefault.txt" echo https://raw.githubusercontent.com/devttys0/wps/master/pingens/belkin/pingen.c>>"./Belkin.XXXX-[0-9A-F][len8]/BelkinDefault.txt" mkdir "belkin.xxxx-[2-9a-f][len8]" echo https://github.com/wpatoolkit/8-Hex-Generator>"./belkin.xxxx-[2-9a-f][len8]/BelkinDefault.txt" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/BelkinKeygen.cpp>>"./belkin.xxxx-[2-9a-f][len8]/BelkinDefault.txt" echo https://bitbucket.org/dudux/belkin4xx>>"./belkin.xxxx-[2-9a-f][len8]/BelkinDefault.txt" echo https://github.com/Konsole512/Crippled>>"./belkin.xxxx-[2-9a-f][len8]/BelkinDefault.txt" echo http://www.routerpwn.com/belkinwpa/>>"./belkin.xxxx-[2-9a-f][len8]/BelkinDefault.txt" echo https://raw.githubusercontent.com/devttys0/wps/master/pingens/belkin/pingen.c>>"./belkin.xxxx-[2-9a-f][len8]/BelkinDefault.txt" mkdir "Belkin_XXXXXX-[0-9A-F][len8]" echo https://github.com/wpatoolkit/8-Hex-Generator>"./Belkin_XXXXXX-[0-9A-F][len8]/BelkinDefault.txt" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/BelkinKeygen.cpp>>"./Belkin_XXXXXX-[0-9A-F][len8]/BelkinDefault.txt" echo https://bitbucket.org/dudux/belkin4xx>>"./Belkin_XXXXXX-[0-9A-F][len8]/BelkinDefault.txt" echo https://github.com/Konsole512/Crippled>>"./Belkin_XXXXXX-[0-9A-F][len8]/BelkinDefault.txt" echo http://www.routerpwn.com/belkinwpa/>>"./Belkin_XXXXXX-[0-9A-F][len8]/BelkinDefault.txt" echo https://raw.githubusercontent.com/devttys0/wps/master/pingens/belkin/pingen.c>>"./Belkin_XXXXXX-[0-9A-F][len8]/BelkinDefault.txt" mkdir "BELLXXX-[0-9A-F][len8]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./BELLXXX-[0-9A-F][len8]/BELLDefault.txt" mkdir "BigPondXXXXXX-[0-9A-F][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./BigPondXXXXXX-[0-9A-F][len10]/BigPondDefault.txt" mkdir "BrightBox-XXXXXX-[len8]" mkdir "BTBusinessHub-XXX-[0-9][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./BTBusinessHub-XXX-[0-9][len10]/BTDefault.txt" mkdir "BTHomeHub2-XXXX-[2-9a-f][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./BTHomeHub2-XXXX-[2-9a-f][len10]/BTDefault.txt" mkdir "BTHomeHub-XXXX-[0-9a-f][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./BTHomeHub-XXXX-[0-9a-f][len10]/BTDefault.txt" echo http://wpacalculator.altervista.org/XL/BTHomeHub.php>>"./BTHomeHub-XXXX-[0-9a-f][len10]/BTDefault.txt" echo http://www.gnucitizen.org/blog/default-key-algorithm-in-thomson-and-bt-home-hub-routers/>>"./BTHomeHub-XXXX-[0-9a-f][len10]/BTDefault.txt" mkdir "BTHub3-XXXX-[2-9a-f][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./BTHub3-XXXX-[2-9a-f][len10]/BTDefault.txt" mkdir "BTHub4-XXXX-[2-9a-f][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./BTHub4-XXXX-[2-9a-f][len10]/BTDefault.txt" mkdir "BTHub5-XXXX-[2-9a-f][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./BTHub5-XXXX-[2-9a-f][len10]/BTDefault.txt" mkdir "CabovisaoSagem" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/CabovisaoSagemKeygen.cpp>"./CabovisaoSagem/CabovisaoSagemDefault.txt" mkdir "CenturyLinkXXXX-[0-9a-f][len14]" mkdir "Comtrend" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/ComtrendKeygen.cpp>"./Comtrend/ComtrendDefault.txt" mkdir "Contattami" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/ConnKeygen.cpp>"./Contattami/ContattamiDefault.txt" mkdir "DDW12345-[DDW123]+[0-9A-F_len6]" mkdir "DG123456-[DG1234]+[0-9A-F_len6]" mkdir "Digicom_XXXX-[0-9A-Z][len8]" mkdir "Discus" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/DiscusKeygen.cpp>"./Discus/DiscusDefault.txt" echo https://raw.githubusercontent.com/RobertoEstrada/WLANAudit-Android/master/WLANAudit/src/main/java/es/glasspixel/wlanaudit/keyframework/DiscusKeyCalculator.java>>"./Discus/DiscusDefault.txt" mkdir "DJAWEB_XXXXX-[0-9][len10]" mkdir "Dlink" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/DlinkKeygen.cpp>"./Dlink/DlinkDefault.txt" echo http://wpacalculator.altervista.org/XL/DLink.php>>"./Dlink/DlinkDefault.txt" echo http://www.devttys0.com/2014/10/reversing-d-links-wps-pin-algorithm/>>"./Dlink/DlinkDefault.txt" echo https://raw.githubusercontent.com/devttys0/wps/master/pingens/dlink/pingen.py>>"./Dlink/DlinkDefault.txt" echo http://lixei.me/codigo-fonte-wpa-dlink-php-c/>>"./Dlink/DlinkDefault.txt" echo https://raw.githubusercontent.com/RobertoEstrada/WLANAudit-Android/master/WLANAudit/src/main/java/es/glasspixel/wlanaudit/keyframework/DlinkKeyCalculator.java>>"./Dlink/DlinkDefault.txt" mkdir "Domino-XXXX-[0-9A-F][len8]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./Domino-XXXX-[0-9A-F][len8]/DominoDefault.txt" mkdir "E583X-XXXX-[0-9][len8]" mkdir "E583X-XXXXX-[0-9A-F][len8]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./E583X-XXXXX-[0-9A-F][len8]/E583XDefault.txt" mkdir "EasyBox-XXXXXX-[0-9A-F][len9]" echo http://wpacalculator.altervista.org/XL/EasyBox.php>"./EasyBox-XXXXXX-[0-9A-F][len9]/EasyBoxDefault.txt" echo http://www.wardriving-forum.de/wiki/Standardpassw%C3%B6rter>>"./EasyBox-XXXXXX-[0-9A-F][len9]/EasyBoxDefault.txt" echo http://www.patent-de.com/20081120/DE102007047320A1.html>>"./EasyBox-XXXXXX-[0-9A-F][len9]/EasyBoxDefault.txt" echo https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20130805-0_Vodafone_EasyBox_Default_WPS_PIN_Vulnerability_v10.txt>>"./EasyBox-XXXXXX-[0-9A-F][len9]/EasyBoxDefault.txt" echo https://raw.githubusercontent.com/torstenfeld/EasyBoxWpaCalc/master/other_sources/easybox_keygen.sh>>"./EasyBox-XXXXXX-[0-9A-F][len9]/EasyBoxDefault.txt" echo https://raw.githubusercontent.com/torstenfeld/EasyBoxWpaCalc/master/other_sources/easybox_keygen.bat>>"./EasyBox-XXXXXX-[0-9A-F][len9]/EasyBoxDefault.txt" echo http://www.routerpwn.com/EasyBox/>>"./EasyBox-XXXXXX-[0-9A-F][len9]/EasyBoxDefault.txt" mkdir "EEBrightBox-XXXXXX-[word-word-word]" echo https://github.com/wpatoolkit/Word-word-word-Wordlist-Generator>"./EEBrightBox-XXXXXX-[word-word-word]/EEBrightBoxDefault.txt" mkdir "Eircom" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/EircomKeygen.cpp>"./Eircom/EircomDefault.txt" echo http://wpacalculator.altervista.org/XL/Eircom.php>>"./Eircom/EircomDefault.txt" mkdir "ELTEX-XXXX" mkdir "Fastweb" echo http://wpacalculator.altervista.org/XL/Fastweb.php>"./Fastweb/FastwebDefault.txt" mkdir "FRITZ!Box Fon WLAN XXXX-[0-9][len16]" mkdir "HG824x" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/HG824xKeygen.cpp>"./HG824x/HG824xDefault.txt" mkdir "HOME-XXXX(Cisco)-[0-9A-Z][len16]" mkdir "HOME-XXXX(SMC)-[serial_len12]+[0-9A-F_len4]" mkdir "HOME-XXXX-[0-9A-F][len16]" mkdir "Huawei" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/HuaweiKeygen.cpp>"./Huawei/HuaweiDefault.txt" echo http://websec.ca/blog/view/mac2wepkey_huawei>>"./Huawei/HuaweiDefault.txt" echo https://raw.githubusercontent.com/RobertoEstrada/WLANAudit-Android/master/WLANAudit/src/main/java/es/glasspixel/wlanaudit/keyframework/HWeiKeyCalculator.java>>"./Huawei/HuaweiDefault.txt" mkdir "INFINITUMXXXX-[0-9][len10]" mkdir "Infostrada" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/InfostradaKeygen.cpp>"./Infostrada/InfostradaDefault.txt" echo http://wpacalculator.altervista.org/XL/Infostrada.php>>"./Infostrada/InfostradaDefault.txt" mkdir "InterCable" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/InterCableKeygen.cpp>"./InterCable/InterCableDefault.txt" mkdir "JAZZTEL" echo http://wpacalculator.altervista.org/XL/JAZZTEL.php>"./JAZZTEL/JAZZTELDefault.txt" echo https://raw.githubusercontent.com/RobertoEstrada/WLANAudit-Android/master/WLANAudit/src/main/java/es/glasspixel/wlanaudit/keyframework/WLANXXXXKeyCalculator.java>>"./JAZZTEL/JAZZTELDefault.txt" mkdir "Keenetic-XXXX-[a-zA-Z0-9][len8]" mkdir "LinksysXXXXX-[0-9a-z][len10]" mkdir "Livebox-XXXX" mkdir "Maxcom" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/MaxcomKeygen.cpp>"./Maxcom/MaxcomDefault.txt" mkdir "Megared" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/MegaredKeygen.cpp>"./Megared/MegaredDefault.txt" mkdir "MeoPirelli" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/MeoPirelliKeygen.cpp>"./MeoPirelli/MeoPirelliDefault.txt" mkdir "MGTS_GPON_XXXX-[0-9a-f][len8]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./MGTS_GPON_XXXX-[0-9a-f][len8]/MGTSDefault.txt" mkdir "mifi2-[0-9A-Z][len13]" mkdir "MiFiXXXX XXX-[0-9][len11]" mkdir "MobileWifi-XXXX-[0-9][len8]" mkdir "NETGEARXX-[adj+noun+3digs]" echo https://github.com/wpatoolkit/Adj-Noun-Wordlist-Generator>"./NETGEARXX-[adj+noun+3digs]/NetgearDefault.txt" mkdir "NETIASPOT_XXXXXX-[0-9a-z][len12]" mkdir "ONOXXXX-[0-9][len10]" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/OnoKeygen.cpp>"./ONOXXXX-[0-9][len10]/OnoDefault.txt" mkdir "Orange-[0-9a-f][len8] or [0-9A-F][len12]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./Orange-[0-9a-f][len8] or [0-9A-F][len12]/OrangeDefault.txt" mkdir "Orange-XXXX-[2345679ACEF][len8]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./Orange-XXXX-[2345679ACEF][len8]/OrangeDefault.txt" mkdir "Ote" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/OteKeygen.cpp>"./Ote/OteDefault.txt" mkdir "OteBAUD" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/OteBAUDKeygen.cpp>"./OteBAUD/OteBAUDDefault.txt" mkdir "OteHuawei" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/OteHuaweiKeygen.cpp>"./OteHuawei/OteHuaweiDefault.txt" mkdir "PBS" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/PBSKeygen.cpp>"./PBS/PBSDefault.txt" mkdir "Pirelli" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/PirelliKeygen.cpp>"./Pirelli/PirelliDefault.txt" echo https://packetstormsecurity.com/files/131834/Pirelli-Router-P.DG-A4001N-WPA-Key-Reverse-Engineering-Rev-2.html>>"./Pirelli/PirelliDefault.txt" echo http://ednolo.alumnos.upv.es/?p=1883>>"./Pirelli/PirelliDefault.txt" mkdir "PlusnetWireless-XXXXXX-[0-9A-F][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./PlusnetWireless-XXXXXX-[0-9A-F][len10]/PlusnetWirelessDefault.txt" mkdir "PRIMEHOME-XX-[0-9a-f][len8]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./PRIMEHOME-XX-[0-9a-f][len8]/PRIMEHOMEDefault.txt" mkdir "Ptv" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/PtvKeygen.cpp>"./Ptv/PtvDefault.txt" mkdir "ROSTELECOM_XXXX-[ACDEFGHJKMNPQRTUXY3467][len8]" mkdir "SAGEMCOM_XXXX-[ACDEFGHJKMNPQRTUXY3467][len8]" mkdir "SBG123456-[SBG1234]+[0-9A-F_len6]" mkdir "Sitecom" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/SitecomKeygen.cpp>"./Sitecom/SitecomDefault.txt" mkdir "SKYXXXXX-[A-Z][len8]" echo https://github.com/wpatoolkit/Upper-Alpha-Keyspace-Reducer>"./SKYXXXXX-[A-Z][len8]/SkyDefault.txt" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/SkyV1Keygen.cpp>>"./SKYXXXXX-[A-Z][len8]/SkyDefault.txt" mkdir "Speedport500" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/Speedport500Keygen.cpp>"./Speedport500/Speedport500Default.txt" mkdir "SpeedTouchXXXXXX-[0-9A-F][len10]" echo http://wpacalculator.altervista.org/XL/SpeedTouch.php>"./SpeedTouchXXXXXX-[0-9A-F][len10]/SpeedTouchDefault.txt" echo http://www.nickkusters.com/en/services/thomson-speedtouch>>"./SpeedTouchXXXXXX-[0-9A-F][len10]/SpeedTouchDefault.txt" echo http://www.md5this.com/thomson-speedtouch-crack.html>>"./SpeedTouchXXXXXX-[0-9A-F][len10]/SpeedTouchDefault.txt" echo http://www.mentalpitstop.com/touchspeedcalc/calculate_speedtouch_default_wep_wpa_wpa2_password_by_ssid.html>>"./SpeedTouchXXXXXX-[0-9A-F][len10]/SpeedTouchDefault.txt" echo http://klasseonline.aboehler.at/stuff/thomson/>>"./SpeedTouchXXXXXX-[0-9A-F][len10]/SpeedTouchDefault.txt" echo http://amigdalo.tk/ST/>>"./SpeedTouchXXXXXX-[0-9A-F][len10]/SpeedTouchDefault.txt" echo http://www.hakim.ws/st585/KevinDevine/>>"./SpeedTouchXXXXXX-[0-9A-F][len10]/SpeedTouchDefault.txt" echo http://sodki.org/data/uploads/code/thomson.sh>>"./SpeedTouchXXXXXX-[0-9A-F][len10]/SpeedTouchDefault.txt" echo https://github.com/wpatoolkit/10-Hex-Generator>>"./SpeedTouchXXXXXX-[0-9A-F][len10]/SpeedTouchDefault.txt" mkdir "TAKASHI-XXXXXX-[0-9A-F][len8]" mkdir "TALKTALK-XXXXXX-[ABCDEFGHJKMNPQRTUVWXY346789][len8]" mkdir "Technicolor-[0-9A-F][len10]" echo http://wpacalculator.altervista.org/XL/Technicolor.php>"./Technicolor-[0-9A-F][len10]/TechnicolorDefault.txt" echo https://github.com/wpatoolkit/10-Hex-Generator>>"./Technicolor-[0-9A-F][len10]/TechnicolorDefault.txt" mkdir "Tecom" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/TecomKeygen.cpp>"./Tecom/TecomDefault.txt" mkdir "Tele2Tu" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/TeletuKeygen.cpp>"./Tele2Tu/Tele2TuDefault.txt" echo http://wpacalculator.altervista.org/XL/Tele2.php>>"./Tele2Tu/Tele2TuDefault.txt" mkdir "Telsey" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/TelseyKeygen.cpp>"./Telsey/TelseyDefault.txt" mkdir "TELUSXXXX-[0-9a-f][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./TELUSXXXX-[0-9a-f][len10]/TELUSDefault.txt" mkdir "TelstraXXXXXX-[0-9A-F][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./TelstraXXXXXX-[0-9A-F][len10]/TelstraDefault.txt" mkdir "TG123456-[TG1234]+[0-9A-F_len6]" mkdir "ThomsonXXXXXX-[0-9A-F][len10]" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/ThomsonKeygen.cpp>"./ThomsonXXXXXX-[0-9A-F][len10]/ThomsonDefault.txt" echo https://github.com/wpatoolkit/10-Hex-Generator>>"./ThomsonXXXXXX-[0-9A-F][len10]/ThomsonDefault.txt" mkdir "TIM_PN51T_XXXX-[0-9][len8]" mkdir "TNCAPXXXXXX-[0-9A-F][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./TNCAPXXXXXX-[0-9A-F][len10]/TNCAPDefault.txt" mkdir "TPG-XXXX" mkdir "TP-LINK_Pocket_XXXX_MMMMMM" mkdir "TP-LINK_XXXXXX-[0-9A-F][len8]" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/TplinkKeygen.cpp>"./TP-LINK_XXXXXX-[0-9A-F][len8]/TPLinkDefault.txt" echo http://www.backtrack-linux.org/forums/showthread.php?t=62673>>"./TP-LINK_XXXXXX-[0-9A-F][len8]/TPLinkDefault.txt" echo https://github.com/wpatoolkit/10-Hex-Generator>>"./TP-LINK_XXXXXX-[0-9A-F][len8]/TPLinkDefault.txt" mkdir "U12345678-[U123456]+[0-9A-F_len6]" mkdir "UNITE-XXXX-[0-9][len8]" mkdir "UPCXXXXXXX-[A-Z][len8]" echo https://github.com/wpatoolkit/Upper-Alpha-Keyspace-Reducer>"./UPCXXXXXXX-[A-Z][len8]/UPCDefault.txt" echo https://raw.githubusercontent.com/sporkbomb/wifi-opener/master/upc/upc0wn.sh>>"./UPCXXXXXXX-[A-Z][len8]/UPCDefault.txt" mkdir "Verizon" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/VerizonKeygen.cpp>"./Verizon/VerizonDefault.txt" echo http://wpacalculator.altervista.org/XL/Verizon.php>>"./Verizon/VerizonDefault.txt" echo http://aruljohn.com/fios/>>"./Verizon/VerizonDefault.txt" echo http://www.xkyle.com/verizon-fios-wireless-key-calculator/>>"./Verizon/VerizonDefault.txt" echo https://gist.githubusercontent.com/Eleadon/780b46a73782a12b4454/raw/6ed3749792e170953e76592c7e7324eab102d69f/verizon_fios_wep_keygen.js>>"./Verizon/VerizonDefault.txt" mkdir "Verizon MIFIXXXX XXXX-[0-9][len11]" mkdir "virginmediaXXXXXXX-[abcdefghjklmnpqrstuvwxyz][len8]" echo https://github.com/wpatoolkit/Lower-Alpha-Keyspace-Reducer>"./virginmediaXXXXXXX-[abcdefghjklmnpqrstuvwxyz][len8]/VirginDefault.txt" mkdir "VirginMobile MiFiXXXX XXX-[0-9][len11]" mkdir "VMXXXXXX-2G-[abcdefghjklmnpqrstuvwxyz][len8]" echo https://github.com/wpatoolkit/Lower-Alpha-Keyspace-Reducer>"./VMXXXXXX-2G-[abcdefghjklmnpqrstuvwxyz][len8]/VirginDefault.txt" mkdir "VMXXXXXX-5G-[abcdefghjklmnpqrstuvwxyz][len8]" echo https://github.com/wpatoolkit/Lower-Alpha-Keyspace-Reducer>"./VMXXXXXX-5G-[abcdefghjklmnpqrstuvwxyz][len8]/VirginDefault.txt" mkdir "WiFi-Arnet-XXXX(Pirelli)-[0-9a-z][len10]" mkdir "WiFi-Arnet-XXXX-[0-9a-zA-Z][len13]" mkdir "WifimediaR" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/WifimediaRKeygen.cpp>"./WifimediaR/WifimediaRDefault.txt" mkdir "WLAN" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/Wlan2Keygen.cpp>"./WLAN/WLANDefault.txt" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/Wlan6Keygen.cpp>>"./WLAN/WLANDefault.txt" echo http://wpacalculator.altervista.org/XL/WLAN.php>>"./WLAN/WLANDefault.txt" echo https://raw.githubusercontent.com/RobertoEstrada/WLANAudit-Android/master/WLANAudit/src/main/java/es/glasspixel/wlanaudit/keyframework/WLANXXXXKeyCalculator.java>>"./WLAN/WLANDefault.txt" echo https://raw.githubusercontent.com/RobertoEstrada/WLANAudit-Android/master/WLANAudit/src/main/java/es/glasspixel/wlanaudit/keyframework/WiFiXXXXXXKeyCalculator.java>>"./WLAN/WLANDefault.txt" mkdir "WLAN1-XXXXXX-[0-9A-F][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./WLAN1-XXXXXX-[0-9A-F][len10]/WLAN1Default.txt" mkdir "XXXXX-[0-9A-Z][len16]" mkdir "ZyXELXXXXXX-[0-9A-Z][len13]" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/ZyxelKeygen.cpp>"./ZyXELXXXXXX-[0-9A-Z][len13]/ZyXELDefault.txt"
  40. 2 points
    Ouch. Now all you need to do is sit it in your garage, stick a VPN or TeamViewer on it and start passing it some hashes from your phone while you roam around, like a supercomputer that's waiting to crack something you send it.
  41. 2 points
    He also said you should know about this if you actually had that job.. Right there.
  42. 2 points
    for those people that don't know any better: do not give up your employees email addresses, its a joke.
  43. 2 points
    Just give us their emails and we will take care of it :)
  44. 2 points
    Yeah, I just wans't sure if it was going to actually make any difference in reception and signal strength. Antenna design is not something I've played a lot with, but I know that there is a bit of math involved for dialing in the length for different kinds of antennas. The can part I mentioned was more like a collector and bounce the signal back at the antenna part itself, like a dish behind an LMB, the dish doesn't act as an antenna, it's only there to hone the signal back at the antenna part itself. Kind of like:
  45. 2 points
    When I designed this appliance router was a last thing I had in mind. The rationale behind was to create a multi-radio gadget flexible enough to throw any currently available and future radio cards. As a matter of fact appliance allows you to install even "extended" size radio cards that do require additional 5V rail for power amps (visit Compex web site a d you will see what I am talking about). Bare in mind that coming soon quad chain Wave 2 AC mini PCIe cards do consume up to 13W - good luck with standard mini PCIe slots in legacy boards. On the other hand, having x12 slots that do support anything, one can create very sophisticated router/gateway/bridge indeed - sky is a limit. BUT, I did create this beast for one sole reason - to make tools like Kismet to benefit from multi-radio environment. Take a look what Kismet creator says about it : http://blog.kismetwireless.net/2017/05/fun-with-new-toy-kismet-on-alftel-airbud.html We worked with dragorn extensively and as a matter of fact some current (git) multi-radio Kismet features will be very hard to realize on any other platform. Another point is that after being long time ARM designer and follower, I finally got fed with constant dependency from silicon vendors and their overseas support forces (TI, STMicro, NXP to name a few). The only true platform that will allow you to drop-in anything you want at will is x86. Airbud is using commercial grade x86 board, but we already sent few samples to community members with pcengines APU3 (absence of video is somewhat annoying, but Ubuntu server with serial console runs just fine). Remember that our quad x86 CPU has only 5W TDP (Thermal Design Profile), and bits any quad ARM to the dust when it comes to legacy software packages. You can treat it as a development platform, and we have current plans to create a specialized 4 chain radio cards for it, such as sub-GHz, 2.4 ISM, BTLE5, etc. Also on a table very special antenna split circuit that will allow us to decrease antennas count x4 times with very significant and ultra low noise RX amplification. Current plans also include fixing ath10k firmware and drivers to create a solid and reliable RX sniffer environment with 40MHz, 80MHz and 160MHz channel width capture capabilities. You can always approach me directly via email (on our web site). BTW - we will station Airbud live permanently at Wireless Village, DEFCON 25, Las Vegas, July 27-30 - come and take a look, I will be somewhere around as well (including a small talk on Saturday).
  46. 2 points
    MAC machines today, use everything windows and linux do. Most of the hardware is the same, other than the casing on the mac book pro machines, they run intel i7 with Nvidia and AMD gpu's, so it's a matter of, do I want to spend money for the shiny one, or get 10 tons more shit for less with the black one and a windows sticker that I can always put linux on anyway.
  47. 2 points
    A lot of them have switched to MAC i guess because the base system is BSD and Unix, similar to the Linux command line environment, and also, because it's not windows..lol
  48. 2 points
    If you have access to your Bash Bunny, the correct way to perform a factory reset is the following: Boot the device in ARMING mode Serial into the device and execute "udisk reformat". The storage partition will now be formatted and the device will reboot Serial into the device and execute "factory_reset_bunny". The Bash Bunny will reboot and be restored to firmware v1.0 Download and upgrade your Bash Bunny to the latest firmware version You should be ready to go after this.
  49. 2 points
    This is be my DefCon carry pretty much. wallet phone (Pixel XL) battery pack USBC-USBA cable most likely a water bottle Debating if I want to bring anything more than that. There is always so much going on it almost becomes a hassle to lug around. I may bring the 5.11 All Hazards Prime backpack just to hold things I collect, etc during the conference. My laptop is a monster and a pain in the butt to carry around.
  50. 2 points
    Instead of step's 3 and 4, you can copy my payload.txt to one of the switch directories and it will git clone the payloads directly on the device. That way, you can just run `git pull origin master` from /root/udisk to keep your library up to date. The payload will also run the git pull command the second time you use it. Git Bunny Git: https://github.com/hak5/bashbunny-payloads/tree/master/payloads/library/GitBunnyGit
×