Search the Community

Showing results for tags 'hacking'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple / Jasager
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • Mark V
    • Mark IV
    • Pineapple Modules
    • WiFi Pineapple University
    • Mark I, II, III
  • Active Projects
    • Bash Bunny
    • Lan Turtle
    • USB Rubber Ducky
    • SDR - Software Defined Radio
    • Community Projects
  • Hak5 Shows
    • Hak5
    • HakTip
    • Metasploit Minute
    • Threatwire
  • Community
    • Forums and Wiki
    • #Hak5
  • Other Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Found 32 results

  1. Hello everybody! It is my first post here. I'm new to this forum and I just wanted to show off some of my video tutorials on YouTube. I hope they will help some beginer ethical hackers. :) If there is something wrong in my video or in my post, please write it down. Thanks.
  2. windows

    Hi, I put together a CTF-like competition that mimics a small real corporate environment on https://www.hacklikeapornstar.com/training/ No simulation, no regex based wargames, no far-fetched hacking-like tricks that only work in CTF games. You have 24 hours to find real flaws on real machines and get the flag. You also get a free book describing the solutions in a didactic way : https://www.amazon.com/dp/B071ZXK2CR On the menu : - Multiple windows machines in AD environment - Local restrictions (applocker, GPO, etc.) - Pivoting on other machines I could go on but I don't wanna spoil the whole thing :-) https://www.hacklikeapornstar.com/training/ Cheers, Sparc F.
  3. Has anyone else played this game? If you like terminal based puzzle games with an interesting story this might be the game for you. Catchy sound track too. http://www.hacknet-os.com/
  4. I found this game called graal online classic it's an online rpg, apparently its really old. It reminds me of old gb zelda. I've been messing around with it for a while doing simple hacks. But I'm curious has anyone else ever heard of it, its confusing at first but kinda fun. I'm looking into creating a hacked client or something but still looking for exploits. There seems to be a small loyal community around the game. anyway here's the link: http://classic.graalonline.com/ here's the form: http://www.graalians.com/forums/
  5. So i bought the wifipineapple TETRA, and ive been experimenting with modules and such. Now i have 2 questions which i couldent really figure out my self, thus im asking here. (Im also not sure into which subforum to post this but hey...) - i thought about creating a "fake ap" which, when you connect to it, asks you to login w/ your gmail or facebook account. If someone could suggest me a module that enables me to do this (with a reasonable tutorial), i would be very greatfull. - 2cnd question is probably simple but yet indid not find this option... How do i protect my fake ap with a password encryption (wpa/wpa2) ? It should really work with modules enabled..... is this possible? huge thanks in advance ;)
  6. How to make a USB hacking tool? how to hack into systems with a usb just by inserting and creating a backdoor of it?
  7. Hi Guys, I'm just curios that is there anyway to get a reverse shell or to host things in the network without using a router?? Uhmm well i want to know that whether we can find alternatives for portforwarding?,...like tunneling for example reverse ssh tunneling and vpn gateways...blah blah blah.I want a solution for this stuff. Please guys help me make out! I'm having a mobile with 4g internet connection.I'm mconnecting my laptop to the internet via usb tethering,also my laptop has wifi interface incase you can suggest alternatives! I want a way to pentest in the WAN with my mobile usb tethering! THANKS Hak5!
  8. i have created an information recon payload for the usb rubber ducky you download it at http://anonsw1tchbl4d3.weebly.com/irp.html
  9. I'm looking at getting a portable device (tablet) for hacking. I was looking at getting the surface pro 4, do you guys think that's my best option or would you recommend something else? Thanks
  10. Yes before anyone says it I am aware of the command called "wash" that shows if the router is WPS protected it slipped my mind in the video but I really just made this cause I had some time so it isn't the greatest thing ever but I talk about my 3 favorite programs I use to crack WPS pins. Any way hope someone learns something new and I hope you all enjoy the video.
  11. New VM just sent in... to Vulnhub.com but here is a link for anyone who is into all that and wants to try it out now. D0Not5top Boot2Root This is my second public Boot2Root, It’s intended to be a little more difficult that the last one I made. That being said, it will depend on you how hard it is :D It's filled with a few little things to make the player smile. Again there are a few “Red Herrings”, and enumeration is key. DIFFICULTY ????? CAPTURE THE FLAGS There are 7 flags to collect, designed to get progressively more difficult to obtain DETAILS File: D0Not5top_3mrgnc3_v1.0.ova OS: ????? VM Type: VirtualBox IP Address: DHCP Size: 700 MB DOWNLOAD https://3mrgnc3.ninja/files/D0Not5top_3mrgnc3_v1.0.ova SUPPORT Any support issues can be directed to 3mrgnc3@techie.com SCREENSHOT I hope you all enjoy it! 3mrgnc3 ;D P.s. my previous challenge can be found here. https://3mrgnc3.ninja/2016/12/64base/ ------------------------------------------- NOTE: I Origionally posted this in 'everything else' forum but wanted to move it here. Not sure how to do that... Mods please feel free to remove origional.
  12. I want to build a workstation to polish my Pen test Skills for my Security Analyst job interviews and want to have something powerful to do the all Security related work. so I want to know that what GPU and CPU is better for such Cracking passwords and hashes plus can also handle serious workload?. Are professional GPUs better for hacking sort of work or the Gaming GPUs?. I also want to know which CPU is better to go for Xeon or i7 extreme?.Thanks
  13. Hello, I am trying to redirect the people on my IP address from a site like CNN to my own version of CNN and that everyone can view it on my IP. Can someone guide me on what to do, I basically know ettercap and some stuff but have encounter several problems 1. When using HTTrack I cannot download Cnn, I can get other sites but CNN, usually I press cancel after a few scans but for CNN it doesn't work 2. How can I edit the site after I download it like I want to keep most of the stuff except for the title and contents of a few articles 3. How do I than get it to redirect? Thank you much help appreciated
  14. Once I deploy the LAN Turtle, SSH into it using my own VPS, is it possible to run my own custom python scripts using the LAN turtle terminal. For example: I write my own python keylogger script and SCP it onto my LAN Turtle. Is there a way to run this? I'm unsure if this will work as this is connected via ethernet, not necessarily a normal USB stick. Thanks for your time.
  15. is it possible to mount say a ntfs (windows) from your computer through say the serial connection? this is what i get with lsblk through serial console or maybe a way to directly boot into the linux distro at startup without putting another distro on the storage..?
  16. Picture: Picture with wrong AM waves: Hello guys, I recieved and recorded an ASK_OOK signal from an auto remote key. But when I opened the wav file there wasn't the right wave forms( like in hak5 youtube show (reply attacks with yardstick one)). Please look at the pic. It would be very nice if someone can help me. Thanx JoJo
  17. I am a pretty tech savvy person, and I was thinking about getting into hacking. What should I learn to get into it? From what I've heard; networking, MySQL, Linux, Kali (linux), Unix, Perl, PHP, Python, Java, HTML, Wireshark, C#, C++. Am I missing anything? Where should I start? Thanks in advance.
  18. So I was wondering how do you program your own payload/backdoor? I usually use veil-evasion but I wanna learn how to program it my self.
  19. Hi i am very new i just wanted to know if someone can help me i want to get into hacking and to get more skills with a computer i have a lot to learn and i was wondering is someone can help me please help me.
  20. I am not sure if this is the right bored to be talking about this I am willing to code Trojans,Viruses,Bots and any other type of malware in exchange for bitcoins. It could do just about anything you want example: Backdoor a system, Destroy the entire computer, Delete files, Record video and audio, etc pm me if your interested
  21. Is there any possible ways of doing MITM attacks that would take usernames and passwords. When I try to use Xerosploit, PytheM, or even bettercap. None of these methods work on websites such as Facebook, Twitter, Paypal, Gmail, etc. Is there any new methods that is the latest that is working right now?
  22. While the tubes video below go through scenarios for ethical hacking. Can we start posting different "detailed" steps to do such ethical hacking for various scenarios. I would like to see step by step instructions from starting Tetra to using tools,acquiring etc. Go through each tool setup and use. I know HAK5 team has a online doc but can we start one to address how to"s with detailed steps. The PineAP book is good but want more details If Hak5 will allow ( subject to the forums ethical rules ----- can we start it here and post different scenarios ? If ok--separate each scenario with cut lines like below with Q&A to follow in each scenario If not ok to post please advise , or where to do such --all on the basis of ethical pen testing and educational uses for knowledge acquiring https://www.youtube.com/watch?v=eHnQwTCKe2o https://www.youtube.com/watch?v=ZiPAjruB1n4 ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Scenario One I have been asked to test security for a group of people with cell phones and open router points who have assembled close to my location. What are the steps from starting the Tetra, Recon,Clients mode, Pine AP, etc.. Please list in steps 1,2,3 etc.. ---------------------------------------------------------------------------------------------------------- Scenario Two ------------------------------------------------------------------------------------------------------------ Scenario Three --------------------------------------------------------------------------------------------------------------------
  23. so i got my usb rubberducky in the mail, and upon watching the instructionals on youtube i have to say im at a complete loss of wtf to do. im new to all this. ive tried downloading the duckencoder but the .jar file cant be opened. i also downloaded DuckyScript UDL, Duck Firmware.hex, and notepad ++. still im stumped. please help!
  24. Venom .dll vector(winrar/sfx compressed + fast_migrate.rc)-By Spirit Hello Hak5 members, Actually i am new here and i love Hak5 show. I am also a YouTuber and i will love to share my tutorials here. So if you don't know me then let me introduce myself I'm Spirit , 15 years old YouTuber and today i'm here to tell you about the malicious " .dll vector " to exploit windows OS's. In this tutorial we will compress two file(our payload) to one .exe executable file with SFX and we will also use fast_migrate to migrate our process to wininit.exe. So in this tutorial Our, Attacker machine::Backbox (which is using Venom The Shellcode Generator) Victim::Windows 7 Framework that we will use::Metasploit So, if you like my tutorial then please Subscribe/Like/Share my Channel. ------------------------------------------------------------------------------------------------------------ This tutorial is for educational purpose only. I'll not be responsible for any harm. ------------------------------------------------------------------------------------------------------------ Please Subscribe my channel:: www.youtube.com/c/Pentestingwithspirit && Please like our facebook page also:: www.facebook.com/Pentestingwithspirit Follow me on twitter:: @spirit3113
  25. Hello there guys! nice to see you! Just wanted to know about the power of python from you leets, im a beginner! trying to learn new things of python can you please tell me what are the things could be done with python?? Can I use python for IoT devices? is it gonna help me only in scripting ?