dustbyter

Active Members
  • Content count

    329
  • Joined

  • Last visited

  • Days Won

    6

1 Follower

About dustbyter

  • Rank
    Hak5 Pirate

Recent Profile Visitors

2,746 profile views
  1. Can someone recommend a good resource to start learning about reading through the packets captured in wireshark? I also saw that there are two differnt modes for capture using ubertooth-btle (-f and -p) how do they differ? Thanks!
  2. Those instructions are nice to have! thanks!
  3. Let's see... Let's see!!!
  4. Sorry, but we do not condone this type of activities on the forum. I am sure a moderator will lock this up shortly.
  5. Look at my past posts. I wrote most of this but never finished it. I provided code for the python scripts... Just set up the dependecies. had it names wigleAgent
  6. I tested instagram. I was able to get it to route traffic to burp, but I used proxydroid, I also installed the burp certificate on the android phone. is your phone rooted?
  7. Are you talking about doing wardriving with the nano? It would be that with out the GPS component.
  8. I have not tested those applications that you are referring to, however some applications are implementing certificate pinning. The applications in those cases would stop processing requests is they see that the certificate they receive is not the one expected. The pinning occurs by having the application check for hard coded values within the certificate. In your case, did the application still function correctly when trying to run it through burp? From my experience, I use ProxyDroid to set up the address of the machine that is running burp (requires root on device), sounds like you may have a different set up in your environment.
  9. Sorry guys, I have not been around lately. McFly, sounds like the issue is resolved. Can you confirm this? Thanks!
  10. Is there any way to query the information stored within the interface of the nano from a 3rd party application using an API? I saw the API Token module, but its not clear how to use that. I have an idea to use some of the information that the nano can get and display it in an interesting way. More details to come once I can confirm if it can be done.
  11. You can also route with iptables to another machine and use wireshark. Otherwise you can use tcpdump to save the pcap... and analyze it later.
  12. Just an update from my end. The new update to the DWall module corrected any issues that I had before. Thanks!
  13. Staging could be a way to get it working. Depending how the first stager is coded, it can be loaded with a reflective dll. I was experimenting with A/V evasion, but haven't had much luck. I wrong some code that for now just XOR'ed the payload to hide it from AV. The XOR works fine, but when using the memcpy method on the buf that is XOR decrypted, A/V triggers. Some how, A/V is keeping track of the buf that is XOR'ed and then checks if its copied with memcpy. Have not found a way to bypass that...
  14. thanks for your input guys.
  15. TextWrangler on my Mac. But looks like Sublime may be editor of choice from what I have been seeing.