Jump to content
Hak5 Forums

Search the Community

Showing results for tags 'hacking'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapple University
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Bash Bunny
    • Packet Squirrel
    • LAN Turtle
    • USB Rubber Ducky
  • Hak5 Shows
    • Hak5
    • HakTip
    • Metasploit Minute
    • Threatwire
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Found 26 results

  1. Unknown Computer appeared on RAT?

    Hello, something really weird happened to me yesterday. I created a RAT that I encrypted in a WinRar File and wanted to troll some of my friends with. I send the file in the chat of my discord server (similar to Teamspeak) and before that tested it on virustotal.com and a similar site. No one downloaded it (unfortunately ^^), but a few hours later (when none of the people that were on the discord were online) anymore, I saw a connection coming in. I used a cracked version of NanoCore that I got from some hacking forum (it was created by Alcatraz3222 and thousands of people downloaded it). The Computer had an IP from the USA (doesn't have to be true, it show that I'm from England even tho I have a German IP) and had no Antivirus installed. The name of it was something with a C at the beginning, and a y and an o (don't remember it exactly). I wanted to know who that was and opened the windows to the screen. He had some old version of Windows installed which I didn't know (its the one with the gray taskbar, pretty basic). There was a command prompt running, which had a python logo and was named "clock". I don't remember what was in it, but it was testing for something the whole time and once said something about "found" and "terminated". The only other thing I saw was Wireshark on the desktop. A few seconds after that, he disappeared from my client list. I didn't use any protection like VPN or a firewall at that moment. After that, I got really scared for some reason and turned off my computer. Does someone know how he got on my list and what he was doing? Maybe I'm getting ratted and he wanted to see what that file was, or a discord server ran the file? I really need your help ;) Cheers, contrix_ PS: Sry for my bad English, I'm German and just 14 years old as you probably already assumed by my writing ^^ PPS: While writing this text I overwrote my text two times, even tho I don't think I touched the insert button. I'm getting really paranoid xD
  2. Hi, im new to this forum and i have a question related to wireless penetration testing. I have a Alfa AWUS036NH Card and amped it to 33dBm and a Yagi-uno antenna with 25dBi of gain.. If i'm correct the EIRP calculation should result in 58 Watts / EIRP. So my question is how far would i get with this setup and another thing i live in a place where surrounded with a lot of houses does that mean that the walls, roofs etc block the signal and decrease the signal so i get less further than when (i.e on top of a building.)
  3. usb rubber ducky

    Guys please help ASAP if the usb port is disabled from the registery editor( HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\usbstor then start value changed to 4 which means its disabled) will the USB rubber ducky work please help!!
  4. Hello guys, I have been working on VulnHub/Root-me.org/Hackthebox.eu watching the hak5 show a lot on youtube lately one of the common things i have noticed on all the platforms is that people looking for a starting point to get into the security field to help everyone whose new to this field, you need a strong will a lot of persistence and above all "Try Harder" attitude to help the community further I made a blog where I will be posting CTF guides/Attack Methodology from metasploit to reverse engineering everything so please check out this blog and please tell me about your views! http://openexploit.blogspot.in/2017/10/ "Security is hard, Just dive in" - Jared Demott
  5. Hello guys, I have been working on VulnHub/Root-me.org/Hackthebox.eu watching the hak5 show a lot on youtube lately one of the common things i have noticed on all the platforms is that people looking for a starting point to get into the security field to help everyone whose new to this field, you need a strong will a lot of persistence and above all "Try Harder" attitude to help the community further I made a blog where I will be posting CTF guides/Attack Methodology from metasploit to reverse engineering everything so please check out this blog and please tell me about your views! http://openexploit.blogspot.in/2017/10/ "Security is hard, Just dive in" - Jared Demott
  6. smb-flood.nse question

    Can you spoof or zombie an ip using smb-flood.nse in nmap.
  7. The best 10 hacking tools that I use

    Hello everybody! It is my first post here. I'm new to this forum and I just wanted to show off some of my video tutorials on YouTube. I hope they will help some beginer ethical hackers. :) If there is something wrong in my video or in my post, please write it down. Thanks.
  8. Phishing facebook/gmail

    So i bought the wifipineapple TETRA, and ive been experimenting with modules and such. Now i have 2 questions which i couldent really figure out my self, thus im asking here. (Im also not sure into which subforum to post this but hey...) - i thought about creating a "fake ap" which, when you connect to it, asks you to login w/ your gmail or facebook account. If someone could suggest me a module that enables me to do this (with a reasonable tutorial), i would be very greatfull. - 2cnd question is probably simple but yet indid not find this option... How do i protect my fake ap with a password encryption (wpa/wpa2) ? It should really work with modules enabled..... is this possible? huge thanks in advance ;)
  9. Yes before anyone says it I am aware of the command called "wash" that shows if the router is WPS protected it slipped my mind in the video but I really just made this cause I had some time so it isn't the greatest thing ever but I talk about my 3 favorite programs I use to crack WPS pins. Any way hope someone learns something new and I hope you all enjoy the video.
  10. Portable Device

    I'm looking at getting a portable device (tablet) for hacking. I was looking at getting the surface pro 4, do you guys think that's my best option or would you recommend something else? Thanks
  11. Boot2Root Challenge ctf VM

    New VM just sent in... to Vulnhub.com but here is a link for anyone who is into all that and wants to try it out now. D0Not5top Boot2Root This is my second public Boot2Root, It’s intended to be a little more difficult that the last one I made. That being said, it will depend on you how hard it is :D It's filled with a few little things to make the player smile. Again there are a few “Red Herrings”, and enumeration is key. DIFFICULTY ????? CAPTURE THE FLAGS There are 7 flags to collect, designed to get progressively more difficult to obtain DETAILS File: D0Not5top_3mrgnc3_v1.0.ova OS: ????? VM Type: VirtualBox IP Address: DHCP Size: 700 MB DOWNLOAD https://3mrgnc3.ninja/files/D0Not5top_3mrgnc3_v1.0.ova SUPPORT Any support issues can be directed to [email protected] SCREENSHOT I hope you all enjoy it! 3mrgnc3 ;D P.s. my previous challenge can be found here. https://3mrgnc3.ninja/2016/12/64base/ ------------------------------------------- NOTE: I Origionally posted this in 'everything else' forum but wanted to move it here. Not sure how to do that... Mods please feel free to remove origional.
  12. I want to build a workstation to polish my Pen test Skills for my Security Analyst job interviews and want to have something powerful to do the all Security related work. so I want to know that what GPU and CPU is better for such Cracking passwords and hashes plus can also handle serious workload?. Are professional GPUs better for hacking sort of work or the Gaming GPUs?. I also want to know which CPU is better to go for Xeon or i7 extreme?.Thanks
  13. Hello, I am trying to redirect the people on my IP address from a site like CNN to my own version of CNN and that everyone can view it on my IP. Can someone guide me on what to do, I basically know ettercap and some stuff but have encounter several problems 1. When using HTTrack I cannot download Cnn, I can get other sites but CNN, usually I press cancel after a few scans but for CNN it doesn't work 2. How can I edit the site after I download it like I want to keep most of the stuff except for the title and contents of a few articles 3. How do I than get it to redirect? Thank you much help appreciated
  14. Mounting the computer drive?

    is it possible to mount say a ntfs (windows) from your computer through say the serial connection? this is what i get with lsblk through serial console or maybe a way to directly boot into the linux distro at startup without putting another distro on the storage..?
  15. Old Online Game

    I found this game called graal online classic it's an online rpg, apparently its really old. It reminds me of old gb zelda. I've been messing around with it for a while doing simple hacks. But I'm curious has anyone else ever heard of it, its confusing at first but kinda fun. I'm looking into creating a hacked client or something but still looking for exploits. There seems to be a small loyal community around the game. anyway here's the link: http://classic.graalonline.com/ here's the form: http://www.graalians.com/forums/
  16. Picture: Picture with wrong AM waves: Hello guys, I recieved and recorded an ASK_OOK signal from an auto remote key. But when I opened the wav file there wasn't the right wave forms( like in hak5 youtube show (reply attacks with yardstick one)). Please look at the pic. It would be very nice if someone can help me. Thanx JoJo
  17. How to become a hacker?

    I am a pretty tech savvy person, and I was thinking about getting into hacking. What should I learn to get into it? From what I've heard; networking, MySQL, Linux, Kali (linux), Unix, Perl, PHP, Python, Java, HTML, Wireshark, C#, C++. Am I missing anything? Where should I start? Thanks in advance.
  18. So I was wondering how do you program your own payload/backdoor? I usually use veil-evasion but I wanna learn how to program it my self.
  19. Upload python scripts

    Once I deploy the LAN Turtle, SSH into it using my own VPS, is it possible to run my own custom python scripts using the LAN turtle terminal. For example: I write my own python keylogger script and SCP it onto my LAN Turtle. Is there a way to run this? I'm unsure if this will work as this is connected via ethernet, not necessarily a normal USB stick. Thanks for your time.
  20. OS X Malware Writing

    I am not sure if this is the right bored to be talking about this I am willing to code Trojans,Viruses,Bots and any other type of malware in exchange for bitcoins. It could do just about anything you want example: Backdoor a system, Destroy the entire computer, Delete files, Record video and audio, etc pm me if your interested
  21. Hi Guys, I'm just curios that is there anyway to get a reverse shell or to host things in the network without using a router?? Uhmm well i want to know that whether we can find alternatives for portforwarding?,...like tunneling for example reverse ssh tunneling and vpn gateways...blah blah blah.I want a solution for this stuff. Please guys help me make out! I'm having a mobile with 4g internet connection.I'm mconnecting my laptop to the internet via usb tethering,also my laptop has wifi interface incase you can suggest alternatives! I want a way to pentest in the WAN with my mobile usb tethering! THANKS Hak5!
  22. Information Recon Payload

    i have created an information recon payload for the usb rubber ducky you download it at http://anonsw1tchbl4d3.weebly.com/irp.html
  23. While the tubes video below go through scenarios for ethical hacking. Can we start posting different "detailed" steps to do such ethical hacking for various scenarios. I would like to see step by step instructions from starting Tetra to using tools,acquiring etc. Go through each tool setup and use. I know HAK5 team has a online doc but can we start one to address how to"s with detailed steps. The PineAP book is good but want more details If Hak5 will allow ( subject to the forums ethical rules ----- can we start it here and post different scenarios ? If ok--separate each scenario with cut lines like below with Q&A to follow in each scenario If not ok to post please advise , or where to do such --all on the basis of ethical pen testing and educational uses for knowledge acquiring https://www.youtube.com/watch?v=eHnQwTCKe2o https://www.youtube.com/watch?v=ZiPAjruB1n4 ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Scenario One I have been asked to test security for a group of people with cell phones and open router points who have assembled close to my location. What are the steps from starting the Tetra, Recon,Clients mode, Pine AP, etc.. Please list in steps 1,2,3 etc.. ---------------------------------------------------------------------------------------------------------- Scenario Two ------------------------------------------------------------------------------------------------------------ Scenario Three --------------------------------------------------------------------------------------------------------------------
  24. Im new so hi

    Hi i am very new i just wanted to know if someone can help me i want to get into hacking and to get more skills with a computer i have a lot to learn and i was wondering is someone can help me please help me.
  25. How to make a USB hacking tool?

    How to make a USB hacking tool? how to hack into systems with a usb just by inserting and creating a backdoor of it?
×