Jump to content

Search the Community

Showing results for tags 'hacking'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • New USB Rubber Ducky
    • WiFi Pineapple
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
    • WiFi Coconut
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • Legacy Devices
    • Classic USB Rubber Ducky
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

  1. Hello guys, I have been working on VulnHub/Root-me.org/Hackthebox.eu watching the hak5 show a lot on youtube lately one of the common things i have noticed on all the platforms is that people looking for a starting point to get into the security field to help everyone whose new to this field, you need a strong will a lot of persistence and above all "Try Harder" attitude to help the community further I made a blog where I will be posting CTF guides/Attack Methodology from metasploit to reverse engineering everything so please check out this blog and please tell me about your views! http://openexploit.blogspot.in/2017/10/ "Security is hard, Just dive in" - Jared Demott
  2. Can you spoof or zombie an ip using smb-flood.nse in nmap.
  3. Hello everybody! It is my first post here. I'm new to this forum and I just wanted to show off some of my video tutorials on YouTube. I hope they will help some beginer ethical hackers. :) If there is something wrong in my video or in my post, please write it down. Thanks.
  4. So i bought the wifipineapple TETRA, and ive been experimenting with modules and such. Now i have 2 questions which i couldent really figure out my self, thus im asking here. (Im also not sure into which subforum to post this but hey...) - i thought about creating a "fake ap" which, when you connect to it, asks you to login w/ your gmail or facebook account. If someone could suggest me a module that enables me to do this (with a reasonable tutorial), i would be very greatfull. - 2cnd question is probably simple but yet indid not find this option... How do i protect my fake ap with a password encryption (wpa/wpa2) ? It should really work with modules enabled..... is this possible? huge thanks in advance ;)
  5. How to make a USB hacking tool? how to hack into systems with a usb just by inserting and creating a backdoor of it?
  6. Hi Guys, I'm just curios that is there anyway to get a reverse shell or to host things in the network without using a router?? Uhmm well i want to know that whether we can find alternatives for portforwarding?,...like tunneling for example reverse ssh tunneling and vpn gateways...blah blah blah.I want a solution for this stuff. Please guys help me make out! I'm having a mobile with 4g internet connection.I'm mconnecting my laptop to the internet via usb tethering,also my laptop has wifi interface incase you can suggest alternatives! I want a way to pentest in the WAN with my mobile usb tethering! THANKS Hak5!
  7. I'm looking at getting a portable device (tablet) for hacking. I was looking at getting the surface pro 4, do you guys think that's my best option or would you recommend something else? Thanks
  8. Yes before anyone says it I am aware of the command called "wash" that shows if the router is WPS protected it slipped my mind in the video but I really just made this cause I had some time so it isn't the greatest thing ever but I talk about my 3 favorite programs I use to crack WPS pins. Any way hope someone learns something new and I hope you all enjoy the video.
  9. New VM just sent in... to Vulnhub.com but here is a link for anyone who is into all that and wants to try it out now. D0Not5top Boot2Root This is my second public Boot2Root, It’s intended to be a little more difficult that the last one I made. That being said, it will depend on you how hard it is :D It's filled with a few little things to make the player smile. Again there are a few “Red Herrings”, and enumeration is key. DIFFICULTY ????? CAPTURE THE FLAGS There are 7 flags to collect, designed to get progressively more difficult to obtain DETAILS File: D0Not5top_3mrgnc3_v1.0.ova OS: ????? VM Type: VirtualBox IP Address: DHCP Size: 700 MB DOWNLOAD https://3mrgnc3.ninja/files/D0Not5top_3mrgnc3_v1.0.ova SUPPORT Any support issues can be directed to 3mrgnc3@techie.com SCREENSHOT I hope you all enjoy it! 3mrgnc3 ;D P.s. my previous challenge can be found here. https://3mrgnc3.ninja/2016/12/64base/ ------------------------------------------- NOTE: I Origionally posted this in 'everything else' forum but wanted to move it here. Not sure how to do that... Mods please feel free to remove origional.
  10. I want to build a workstation to polish my Pen test Skills for my Security Analyst job interviews and want to have something powerful to do the all Security related work. so I want to know that what GPU and CPU is better for such Cracking passwords and hashes plus can also handle serious workload?. Are professional GPUs better for hacking sort of work or the Gaming GPUs?. I also want to know which CPU is better to go for Xeon or i7 extreme?.Thanks
  11. Hello, I am trying to redirect the people on my IP address from a site like CNN to my own version of CNN and that everyone can view it on my IP. Can someone guide me on what to do, I basically know ettercap and some stuff but have encounter several problems 1. When using HTTrack I cannot download Cnn, I can get other sites but CNN, usually I press cancel after a few scans but for CNN it doesn't work 2. How can I edit the site after I download it like I want to keep most of the stuff except for the title and contents of a few articles 3. How do I than get it to redirect? Thank you much help appreciated
  12. Once I deploy the LAN Turtle, SSH into it using my own VPS, is it possible to run my own custom python scripts using the LAN turtle terminal. For example: I write my own python keylogger script and SCP it onto my LAN Turtle. Is there a way to run this? I'm unsure if this will work as this is connected via ethernet, not necessarily a normal USB stick. Thanks for your time.
  13. is it possible to mount say a ntfs (windows) from your computer through say the serial connection? this is what i get with lsblk through serial console or maybe a way to directly boot into the linux distro at startup without putting another distro on the storage..?
  14. BioBoss

    Old Online Game

    I found this game called graal online classic it's an online rpg, apparently its really old. It reminds me of old gb zelda. I've been messing around with it for a while doing simple hacks. But I'm curious has anyone else ever heard of it, its confusing at first but kinda fun. I'm looking into creating a hacked client or something but still looking for exploits. There seems to be a small loyal community around the game. anyway here's the link: http://classic.graalonline.com/ here's the form: http://www.graalians.com/forums/
  15. Picture: Picture with wrong AM waves: Hello guys, I recieved and recorded an ASK_OOK signal from an auto remote key. But when I opened the wav file there wasn't the right wave forms( like in hak5 youtube show (reply attacks with yardstick one)). Please look at the pic. It would be very nice if someone can help me. Thanx JoJo
  16. I am a pretty tech savvy person, and I was thinking about getting into hacking. What should I learn to get into it? From what I've heard; networking, MySQL, Linux, Kali (linux), Unix, Perl, PHP, Python, Java, HTML, Wireshark, C#, C++. Am I missing anything? Where should I start? Thanks in advance.
  17. So I was wondering how do you program your own payload/backdoor? I usually use veil-evasion but I wanna learn how to program it my self.
  18. Hi i am very new i just wanted to know if someone can help me i want to get into hacking and to get more skills with a computer i have a lot to learn and i was wondering is someone can help me please help me.
  19. Is there any possible ways of doing MITM attacks that would take usernames and passwords. When I try to use Xerosploit, PytheM, or even bettercap. None of these methods work on websites such as Facebook, Twitter, Paypal, Gmail, etc. Is there any new methods that is the latest that is working right now?
  20. While the tubes video below go through scenarios for ethical hacking. Can we start posting different "detailed" steps to do such ethical hacking for various scenarios. I would like to see step by step instructions from starting Tetra to using tools,acquiring etc. Go through each tool setup and use. I know HAK5 team has a online doc but can we start one to address how to"s with detailed steps. The PineAP book is good but want more details If Hak5 will allow ( subject to the forums ethical rules ----- can we start it here and post different scenarios ? If ok--separate each scenario with cut lines like below with Q&A to follow in each scenario If not ok to post please advise , or where to do such --all on the basis of ethical pen testing and educational uses for knowledge acquiring https://www.youtube.com/watch?v=eHnQwTCKe2o https://www.youtube.com/watch?v=ZiPAjruB1n4 ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Scenario One I have been asked to test security for a group of people with cell phones and open router points who have assembled close to my location. What are the steps from starting the Tetra, Recon,Clients mode, Pine AP, etc.. Please list in steps 1,2,3 etc.. ---------------------------------------------------------------------------------------------------------- Scenario Two ------------------------------------------------------------------------------------------------------------ Scenario Three --------------------------------------------------------------------------------------------------------------------
  21. Venom .dll vector(winrar/sfx compressed + fast_migrate.rc)-By Spirit Hello Hak5 members, Actually i am new here and i love Hak5 show. I am also a YouTuber and i will love to share my tutorials here. So if you don't know me then let me introduce myself I'm Spirit , 15 years old YouTuber and today i'm here to tell you about the malicious " .dll vector " to exploit windows OS's. In this tutorial we will compress two file(our payload) to one .exe executable file with SFX and we will also use fast_migrate to migrate our process to wininit.exe. So in this tutorial Our, Attacker machine::Backbox (which is using Venom The Shellcode Generator) Victim::Windows 7 Framework that we will use::Metasploit So, if you like my tutorial then please Subscribe/Like/Share my Channel. ------------------------------------------------------------------------------------------------------------ This tutorial is for educational purpose only. I'll not be responsible for any harm. ------------------------------------------------------------------------------------------------------------ Please Subscribe my channel:: www.youtube.com/c/Pentestingwithspirit && Please like our facebook page also:: www.facebook.com/Pentestingwithspirit Follow me on twitter:: @spirit3113
  22. Hello there guys! nice to see you! Just wanted to know about the power of python from you leets, im a beginner! trying to learn new things of python can you please tell me what are the things could be done with python?? Can I use python for IoT devices? is it gonna help me only in scripting ?
  23. Hey there! This is my first post! Just wanted to know on how to start with hacks and mods on this cool website? Any suggestions? I'm a moderate level beginner in hacking. Thanks in Advance!
  24. Hello there! Anybody know about Warberry Pi ? I have a link which will take you to the code of it, but I don't have an exact idea about its technology and other stuff, and my question is what is the hardware required to use this? or only these scripts would work? Here's the link! https://github.com/secgroundzero/warberry
  25. Ezio

    Cruch Usage

    hey guys, I was hoping anyone could help me out with creating a wordlist how i desire with crunch. eg- usr1pass1, usr2pass2, usr3pass3......usr99pass99
×
×
  • Create New...