Jump to content


Popular Content

Showing content with the highest reputation since 12/26/2019 in all areas

  1. 4 points
    You need to turn caps lock off.
  2. 2 points
    You posted them all within 45 minutes of each other. How fast were you expecting replies?
  3. 2 points
    You can't really answer Q2 without answering Q1, since you don't know what penetration methods can be used. You just threw out some tech jargon and common tools, kinda "let's see what sticks" approach. And it sounds like you have no ideas for Q1, so why should you get this job? I would suggest you brush up on penetration techniques, specifically related to Windows and Active Directory. The following Google search yielded some really interesting articles that seem pertinent to what you are looking for: https://www.google.com/search?q=pentest+find+user+machine+from+employee+name&oq=pentest+find+user+machine+from+employee+name&aqs=chrome..69i57j33.9488j1j7&sourceid=chrome&ie=UTF-8 I especially enjoyed the article from https://hausec.com, which walks you through the process from the beginning. I'm not going to give you direct answers, since that would make me more qualified for this job than you. I also don't claim to have all the answers, but I'm not the one interviewing for a infosec job, as much as I would love a career change. I wish you luck on your job search and I hope you can gain the knowledge you need to do your job well and impress the interviewers.
  4. 2 points
    You need to run c2, create a profile for your device, then download the connection file from c2 and ssh into shark Jack and copy it to the location specified in the documentation.
  5. 2 points
    SharkLib - SharkJack Quick Payload Library This Tool was created less than 24 hours after having a "SharkJack", I realized how much of a pain it is to swap back and forth between prior loaded Payloads. So after 7 hours of debugging, testing, and pulling my hair out. - I give to you "SharkLib". SharkLib allows you to Backup/Restore prior loaded Payloads, via SSH Terminal. No more needing to have to "go deploy another script", you can easily use C2 or any SSH Terminal Service to switch your desired payloads. Features: Installs to Local System to allow ease of access of "SharkLib". (/usr/sbin) Syncs on Exit to prevent data corruption in payloads. Easy to use Menu Interface. Switch payloads in seconds with SSH. I will post the Code in here, until Hak5 tells me what "category" this tool falls under in the GitHub Repo. The Code: #!/bin/bash # # Title: SharkLib # Author: REDD of Private-Locker # Version: 1.3 # # This Script is to be ran on the Hak5 SharkJack itself. This Script # makes switching between local stored payloads quick and simple. # VERS=1.3 LIB_DIR="/root/payload/sharklib" DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" >/dev/null 2>&1 && pwd )" START_DIR="$DIR" INSTALL_DIR="/usr/sbin" EXEC_FILE="sharklib" PAYLOAD_DIR="/root/payload" PAYLOAD_FILE="$PAYLOAD_DIR/payload.sh" function install_sharklib() { if [[ "$DIR" != $INSTALL_DIR ]]; then if [ ! -f "$INSTALL_DIR/$EXEC_FILE" ]; then printf " -> Installing SharkLib into System for Easy Access.\n" sleep 1; cp -rf $0 $INSTALL_DIR/$EXEC_FILE printf " -> Fixing Permissions of $EXEC_FILE in $INSTALL_DIR.\n" sleep 1; chmod +x $INSTALL_DIR/$EXEC_FILE fi fi } function view_payload() { printf "\n"; cat "$PAYLOAD_FILE"; printf "\n"; read -n 1 -s -r -p "Press any key to return to Menu.."; sharklib_menu; } function remove_sharklib() { if [ -f "$INSTALL_DIR/$EXEC_FILE" ]; then printf "\n" printf "Removing SharkLib from local system.\n" rm -rf "$INSTALL_DIR/$EXEC_FILE"; printf "Removing SharkLib Payload Library.\n" rm -rf "$LIB_DIR"; printf "SharkLib has been fully removed.\n\n" fi } function free_space() { FREE_MEM="$(df -h $PWD | awk '/[0-9]%/{print $(NF-2)}')" } function header() { free_space; printf "\n" printf "O========================================O\n" printf "| SharkLib - SharkJack Quick Payload |\n" printf "| Library |\n" printf "O=O====================================O=O\n" printf " | %-29s |\n" "$SHARKLIB_TITLE" printf " O====================================O\n" printf " | Free Space: %-6s Vers: %-3s | \n" "$FREE_MEM" "$VERS" printf " O================================O \n" printf " -Huge Thanks goes to Hak5! \n" printf "\n" } function backup_payload() { clear; SHARKLIB_TITLE=" Backup Payloads" header; if [ -f "$PAYLOAD_FILE" ]; then printf "\n" printf " 1. Backup current payload to SharkLib\n" printf "\n" printf " 2. Return to Previous Menu.\n" printf "\n" printf " Select a Menu Item by # and press ENTER: " read BACKUP_INPUT printf "\n" if [ "$BACKUP_INPUT" = "1" ]; then printf " What would you want to call this Payload?: " read BACKUP_INPUT_1 if [[ "$BACKUP_INPUT_1" != "" ]]; then if [ ! -d "$LIB_DIR/$BACKUP_INPUT_1" ]; then mkdir -p "$LIB_DIR/$BACKUP_INPUT_1" cp -rf "$PAYLOAD_FILE" "$LIB_DIR/$BACKUP_INPUT_1/payload.sh" printf " Created Payload directory named $BACKUP_INPUT_1\n" sleep 2; sharklib_menu; else printf " Removing Old Copy and using New Copy of $BACKUP_INPUT_1\n" rm -rf "$LIB_DIR/$BACKUP_INPUT_1" mkdir -p "$LIB_DIR/$BACKUP_INPUT_1" cp -rf "$PAYLOAD_FILE" "$LIB_DIR/$BACKUP_INPUT_1/payload.sh" sleep 2; sharklib_menu; fi else if [ ! -d "$LIB_DIR/Payload" ]; then printf " Backing up Payload into Default Payload directory..\n" mkdir -p "$LIB_DIR/Payload" cp -rf "$PAYLOAD_FILE" "$LIB_DIR/Payload/payload.sh" sleep 2; sharklib_menu; else printf " Removing Old Copy and using New Copy of $LIB_DIR/Payload\n" rm -rf "$LIB_DIR/Payload" mkdir -p "$LIB_DIR/Payload" cp -rf "$PAYLOAD_FILE" "$LIB_DIR/Payload/payload.sh" sleep 2; sharklib_menu; fi fi elif [ "$BACKUP_INPUT" = "2" ]; then sharklib_menu; else backup_payload; fi else printf " No Payload in $PAYLOAD_DIR.\n" fi } function delete_payload() { DELETE_INPUT=NULL clear; SHARKLIB_TITLE=" Delete Payloads" header; cd "$LIB_DIR" DIR_CNT="NULL" DIR_CNT=$(ls "$LIB_DIR" | grep -v total | wc -l) declare -a DIRS i=1 for d in */; do DIRS[i++]="${d%/}" done if [ "$DIR_CNT" -lt "1" ]; then printf " There are no Payloads to Delete. \n\n" printf " Returning to Previous Menu.\n" sleep 2; sharklib_menu; fi printf " There are ${#DIRS[@]} Payloads in SharkLib:\n" for((i=1;i<=${#DIRS[@]};i++)); do printf " %2d. %-20s\n" "$i" "${DIRS[i]}" done PAYLOAD_TOTAL=${#DIRS[@]} PLUS_QUIT=$((PAYLOAD_TOTAL+1)) printf "\n" printf " %2d. %-20s\n" "$PLUS_QUIT" "Return to Previous Menu." printf "\n" printf " Please choose a Payload by Number: " read DELETE_INPUT printf "\n" if [[ "$DELETE_INPUT" == "$PLUS_QUIT" ]]; then printf " Returning to Previous Menu.\n" sleep 2; sharklib_menu; elif [[ "$DELETE_INPUT" == "" ]]; then printf " Please Input a choice.\n" sleep 2; delete_payload; elif ! [[ "$DELETE_INPUT" =~ ^[0-9]+$ ]]; then printf " Please Input a choice.\n" sleep 2; delete_payload; elif [[ "$DELETE_INPUT" == "0" ]]; then printf " Please Input a choice.\n" sleep 2; delete_payload; elif [[ "$DELETE_INPUT" -gt "$PLUS_QUIT" ]]; then printf " Please Input a choice.\n" sleep 2; delete_payload; elif [[ "$DELETE_INPUT" -le "$PLUS_QUIT" ]]; then printf " Deleting payload ${DIRS[$DELETE_INPUT]} from SharkJack. \n" rm -rf "$LIB_DIR/${DIRS[$DELETE_INPUT]}" cd "$START_DIR" sleep 2; sharklib_menu; else printf " Wrong Choice, going back to Previous Menu.\n" cd "$START_DIR" sleep 2; sharklib_menu; fi } function restore_payload() { LOAD_INPUT=NULL clear; SHARKLIB_TITLE=" Restore Payloads" header; cd "$LIB_DIR" DIR_CNT=$(ls "$LIB_DIR" | grep -v total | wc -l) declare -a DIRS i=1 for d in */; do DIRS[i++]="${d%/}" done if [ "$DIR_CNT" -lt "1" ]; then printf " There are no Payloads to Restore. \n\n" printf " Returning to Previous Menu.\n" sleep 2; sharklib_menu; fi printf " There are ${#DIRS[@]} Payloads in SharkLib:\n" for((i=1;i<=${#DIRS[@]};i++)); do printf " %2d. %-20s\n" "$i" "${DIRS[i]}" done PAYLOAD_TOTAL=${#DIRS[@]} PLUS_QUIT=$((PAYLOAD_TOTAL+1)) printf "\n" printf " %2d. %-20s\n" "$PLUS_QUIT" "Return to Previous Menu." printf "\n" printf " Please choose a Payload by Number: " read LOAD_INPUT printf "\n" if [[ "$LOAD_INPUT" == "$PLUS_QUIT" ]]; then printf " Returning to Previous Menu.\n" sleep 2; sharklib_menu; elif [[ "$LOAD_INPUT" == "" ]]; then printf " Please Input a choice.\n" sleep 2; restore_payload; elif ! [[ "$LOAD_INPUT" =~ ^[0-9]+$ ]]; then printf " Please Input a choice.\n" sleep 2; restore_payload; elif [[ "$LOAD_INPUT" == "0" ]]; then printf " Please Input a choice.\n" sleep 2; restore_payload; elif [[ "$LOAD_INPUT" -gt "$PLUS_QUIT" ]]; then printf " Please Input a choice.\n" sleep 2; restore_payload; elif [[ "$LOAD_INPUT" -le "$PLUS_QUIT" ]]; then printf " Loading payload ${DIRS[$LOAD_INPUT]} to SharkJack. \n" cp -rf "$LIB_DIR/${DIRS[$LOAD_INPUT]}/payload.sh" "$PAYLOAD_FILE" cd "$START_DIR" sleep 2; sharklib_menu; else printf " Wrong Choice, going back to Previous Menu.\n" cd "$START_DIR" sleep 2; sharklib_menu; fi } function cleanup_ctrl { echo -en "\n -> Caught SIGINT! \n" printf " -> Cleaning up and Exiting..\n\n" sync sleep 1; exit $? } function exit_sharklib() { printf " -> Cleaning up and Exiting..\n\n" sync sleep 1; exit 0; } function sharklib_menu() { clear; trap cleanup_ctrl SIGINT trap cleanup_ctrl SIGTERM MENU_INPUT=NULL if [ ! -d "$LIB_DIR" ]; then printf " -> Creating SharkLib Payload Library directory.\n" mkdir -p "$LIB_DIR" fi cd "$LIB_DIR" SHARKLIB_TITLE=" By REDD" header; printf " 1. Backup Payload to SharkLib\n" printf " 2. Restore Payload from SharkLib\n" printf " 3. Delete Payload from SharkLib\n" printf "\n" printf " 4. View Current Payload on SharkJack\n" printf "\n" printf " 5. Exit\n" printf "\n" printf " Select a Menu Item by # and press ENTER: " read MENU_INPUT printf "\n" if ! [[ "$MENU_INPUT" =~ ^[0-9]+$ ]]; then sharklib_menu; elif [[ "$MENU_INPUT" = "0" ]]; then sharklib_menu; elif [[ "$MENU_INPUT" = "1" ]]; then backup_payload; elif [[ "$MENU_INPUT" = "2" ]]; then restore_payload; elif [[ "$MENU_INPUT" = "3" ]]; then delete_payload; elif [[ "$MENU_INPUT" = "4" ]]; then view_payload; elif [[ "$MENU_INPUT" = "5" ]]; then exit_sharklib; elif [[ "$MENU_INPUT" -ge "6" ]]; then sharklib_menu; elif [[ "$MENU_INPUT" == "" ]]; then sharklib_menu; else sharklib_menu; fi } if [ "$1" == "--install" ]; then install_sharklib; exit 0; elif [ "$1" == "--remove" ]; then remove_sharklib; else install_sharklib; sharklib_menu; fi Suggestions are always welcome! Huge Thanks to Hak5 for the wonderful gear! REDD (Ar1k88)
  6. 2 points
    You may want to check the correct forum section: https://forums.hak5.org/forum/43-security/ and particularly this post: https://forums.hak5.org/topic/913-hacking-where-to-begin/ It seems that you are not just a "new hacker", you are a new "forum user" and "searching user" as well. Next time, do a little research, do a little Googling, watch some youtube videos, (Hak5 youtube channel is a good place to start) instead of just asking people to tell you how to get started. That is not even how people get started in this field. If you have to ask, you are probably not the right person for hacking. If you think it's an easy way to make money, it's not - you will be competing with people much smarter than you and more experienced. If you truly have the passion for hacking and hardware and experimenting and all that, you would have found some sources along the way, because your passion and unquenchable taste for computers would lead the way for you. I'm not trying to be mean, just telling it like it is. Better to be honest with you up front, than spoon-feed you answers.
  7. 1 point
    This is a ethical hacking forum. You may want to ask at the gopro forum.
  8. 1 point
    I'm using a Samsung galaxy note 10 and work fine
  9. 1 point
    "LANO208B" LAN to USB2.0 adapter. Shows up in Windows 10 as "ASIX AX88772B USB2.0 to Fast Ethernet Adapter". No special drivers installed.
  10. 1 point
    My gut feeling here is that the purposes of this request may be nefarious. Just feel their are red flags. Separately, if someone would want to help out, you need to provide more information. Additionally, the fact you did not post for a payload for a specific post or tool makes me thing you wouldnt know how to execute a "custom payload", one that would be executed on?? (That is the question, where are you executing the payload?)
  11. 1 point
    https://forums.hak5.org/forum/92-bash-bunny/ Every item has it's own section. It's best to look and ask there.
  12. 1 point
    The Source can be downloaded here.. https://git.private-locker.com/project/sharkhelper/blob/master/SharkHelper.cmd Direct Download Link: (You'll need to rename the file to SharkHelper.cmd instead of SharkHelper.txt) https://git.private-locker.com/project/sharkhelper/raw/master/SharkHelper.cmd?inline=false Or you can copy the code above, Copy/Paste it into Notepad. "Save As.." file as "SharkHelper.cmd".
  13. 1 point
    If you have Android phone. You just need to download connector. https://play.google.com/store/apps/details?id=org.hak5.pineappleconnector Only one search away 😵
  14. 1 point
  15. 1 point
    Nexus, OnePlus, Pixel phones should all work.
  16. 1 point
    im highly interested on kismet on the signal owl any news or a ETA?
  17. 1 point
    Pwnagotchi on PI 4 using any display https://cyberarms.wordpress.com/tag/tech/
  18. 1 point
    Ok mission accomplished. I actually built this thing and got it up and running. Very cool way of learning about networks and how insecure they are. For us n00bs I would highly recommend this project. Many thanks to hackster for the link. Now if I can get my SharkJack and Signal Owl firing on all cylinders ....
  19. 1 point
    Let me guess.. Plugging straight into the Router?.. Some routers wont allow the SharkJack to get a IP straight from the router. It's that way with my NightHawk.. I have to pass a line through to my 8-Port Switch, then plug the SharkJack into that to get a IP from the DHCP Server on my Router.. So attempt that too if you can..
  20. 1 point
    here a tuto: https://www.youtube.com/watch?v=HWfO2Xh5Wbc Problem will be always about decrypting handshake,not capture it....
  21. 1 point
    What you doing with it?!.. Playing Hacky sack?.. I have mine on my keyring and I throw my keys around aimlessly..
  22. 1 point
    Hi Treebug, You really shoudn't be using port 80 for SSH as this port is used for HTTP. SSH is normally on port 22 (and for C2 2022). I would remove the "-sshport 80" and rerun your script. Your devices are trying to communicate via port 2022, but you're only listening on port 80, hence why C2 can't communicate and vice versa. Refer to my guide if you need a better understanding. Happy belated X-Mas! Best, VB
  23. 1 point
  24. 1 point
    Hallo zusammen, Schade das zu wenig zum Thema Wifi Pineapple kommt... je mehr Ideen kommen desto mehr könnte man zu diesen Thema machen Ich würde es gerne erst einmal bei der Wifi Pineapple belassen meine Ideen wären als Menüpunkte 1. Erste Schritte Einrichtung 2. Grundwissen OpenWRT Ordnerstrukturen 3. Konsole Standartbefehle 4. Webinterface (Muss ich mir noch was einfallen lassen) 5. Entwicklung Da ich jetzt im Winterurlaub bin hätte ich zeit da einmal was zu Planen mit euren Wünschen und Anträgen zum Thema WifiPineapple Nächstes Jahr ist bei mir mit Arbeit und Schule mein Hobby Pentester wieder Zeitlich begrenzt Ihr könnt euch auch gerne bei mir unter Discord melden Olaf Mufjay#3170 Oder schreibt einen Forum Beitrag wir hätten Jemanden der das hostet !!! Meine Befürchtung ist dass, das alles wieder einschläft ich wünsche euch ein frohes Fest evtl liegt ja eine Pineapple bei den einen oder anderen unter dem Baum :) Grüße Olaf Mufjay
  25. 1 point
    To run the server on your PC, you need knowledge and experience. You will need special programs and settings to ensure stable server operation: - configure Apache + PHP + MySQL; - distribution of Core ISOs; - setting the IP address. To monitor the server and collect statistics, use this instruction host-tracker.com/Blog/server_m If there are any other questions, then ask them, I will help you.
  26. 1 point
    SharkLib showing Example of Backed Up Payloads:
  27. 1 point
    First question, are you getting an non-RFC 1918 address on your router? If not, then you can't scan it from outside as you'd be scanning whatever infrastructure comes in front of it. If you are, then get something like OpenVAS or sign up for a demo Nessus.io account and use that.
  28. 1 point
    Hey y'all, I set this up for myself, but I thought others of you might find it useful. It's a simple way to run Cloud C2 in docker. https://gitlab.com/faithfulst3ward/cloudc2docker
  29. 1 point
    Hi, For data recovery, you can just download a program on your Android phone. There are many choices on the net, but if you want a free and efficient one, there are not many programs to choose from. I used the Bitwar Data Recovery which is free and good to use, maybe you can also have a try.
  30. 1 point
    This is actually an interesting project. It uses some AI to help drive the actions that bettercap executes. Given I have some experience with testing it, it works pretty well to help capture the handshakes. It also has an API, it may be worth trying to see if any opportunities exist to integrate it with the pineapple.
  31. 1 point
    Hi, Yes that is arguably the best approach, also you can screen grab and make notes so that you can always refer to them later..... Hope this helps 😎
  32. 1 point
  33. 1 point
    You need a server (pi would work just fine) to host the cloud platform. Then you need either a dedicated IP or a service like No-IP or DynDNS to resolve your address. This is all that is required to make C2 work. There are additional setup steps required like loading the config file on the device. I am actually working on a write up to do this with a desktop running linux and a raspberry pi setup. I can confirm that Debian machine with C2 loaded using No-IP service does work.
  34. 1 point
    Why not just use the business's firewall? 99.99% of them have that capability.
  35. 1 point
    Hello, I do not think the new Firmware is ready yet. The out of the box shark jack does not support c2.
  36. 1 point
    Hi Bigbiz, Not sure where to start with this post..........oh well, here goes....... I followed your 7 steps to success and I cannot beige that it actually worked!! 🔥🔥🔥🔥Not that I didn't believe you, it was more of whether I believed in myself.....and that is the honest truth. Upon reflection and comparing all the advice I had received from other sources, I realise where I wasted 48 hrs and was going wrong. How to get it all wrong: First of all do NOT believe that simply installing the said Kali NetHunter App Store will get you anywhere fast (by the way, as you didn't mention the store I decided not to do that on this occasion, I did on at least 5 other occasions). Secondly, flashing kernels and the like........what a waste of time that is.........get the phone rooted and crack on.......🔥🔥🔥🔥 Thirdly, Installing SuperSu simply crashes and when it is granted all of the permissions known to man, it tells you that your device is not rooted properly.........deleted it and decided to try Root Checker 🔥🔥🔥🔥 and behold it stated what I already knew........device is rooted...... And last but by no means least.........unzipping the Kali file using Magisk Manager when one should be TWRP......... So, I can only thank you Bigbiz.........for finally letting me see the light and using your wisdom to assist me........especially appreciated as I didn't have to sit for another 6 + hours of useless YOUTUBE videos claiming they have the answer, when clearly 99% do not.😈 Thanks again Bigbiz 🙏
  37. 1 point
    Ok ill tell #1 unlock bootloader #2 root android (open supersu then busybox) #3 download nethunter zip file https://www.offensive-security.com/kali-linux-nethunter-download/ #4 from the custom recovery (i use twrp) go to install, then downloads select zip file. #5 swipe icon to right wait could take 20 minutes to install #6 reboot to bootloader (android) #7 select nethunter app grant permissions with supersu ( then do same with nethunter terminal) Should be good hope it helps
  38. 1 point
    Rkiver has provided you with excellent advice and I echo them to you. It can be a bit confusing out there, so place a key term or word in the search section and let the computer do the rest. Hope this helps you in some way 😎
  39. 1 point
    Hi Guys, After rooting and then unrooting and then rooting the nexus 6p again🤓, I thought I would try the QR scan on the OS Kali NetHunter website and it worked with ease. I am going to (later today) try and install each of the apps to see if they work on root and without the need for F-Droid. I did install the Magisk Master as well. That should allow for the use of other services on the device without any clashes. I shall let you know how I progress 😊 Cheers 😎
  40. 1 point
    When you purchase The Hacker's Play Book, be sure to check the online links for updated information. It continually updates and changes. There are an onslaught of good books from which to choose. Here's A List That Helped Me: The Hackers Playbook 3, Hacking: The Art of Exploitation (check for latest Edition and updated links in book), The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws, Penetration Testing: A Hands-On Introduction to Hacking----------Books For Reference: RedTeam Field Manual, Blue Team Manual------------Books For Programming Hacking: Black Hat Python, Grey Hat Python. There is also the route of certifications. In regards to the them, many speak condescendingly. However, the right prep-courses, books and labs you could pass in just over a month. As a major benefit of obtaining the certifications, you gain strong foundations! Recommendation For Certs.: Security +, Network +, and your C.E.H., when you obtain the needed experience and proctor. Another cert. you can look into are those provided by Offensive Security(Kali).. Get those and see where you would like to specialize. "Cyber Security" and "Information Security" are massive field/s. Find your calling within it. Hope this helped a little. Good luck with your future decisions! Regards, Mr. ClassiC
  41. 1 point
    looks like you only installed hcxtools (for converting capture file) and forgot to install hcxdumptool?
  42. 1 point
    Willkommen im Forum! Ich passe schon auf euch auf ? Eigentlich sind wir ein englisches Forum, aber ich habe kein Problem mit einem Deutschen Thread, so lange der als solcher gekennzeichnet ist.
  43. 1 point
    What kind of combinations did you try ? because It should be Lely Lely. admin - admin Lely - Lely lely - lely .. .. .
  44. 1 point
    The clients will only try to connect if the AP they're looking for is open. If the AP the client is looking for normally is encrypted with WPA, then it won't try to connect to your open network. (Unless it has the exact same encryption + keys) The de-auth is used to kick the client of the open network they're already connected to, and force them to use your open network instead.
  45. 1 point
    Thats strange just tried it again for me and it logged in: login as: lely lely@'s password: Linux elink-tab 3.10.17-R07 #1 SMP PREEMPT Mon Feb 15 15:14:56 CET 2016 armv7l The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. Last login: Mon Sep 11 23:34:29 2017 from lely@elink-tab:~$ ls / bin dev home lib media opt root sbin sys usr boot etc lely_install lib64 mnt proc run srv tmp var lely@elink-tab:~$
  46. 1 point
    Hi Everyone, update time. I plugged in a keyboard and it did do interesting things, sort of. Ctrl + Alt + FX (X != 2 ) directs you to a console login. I tried all the obvious-ish default passwords. Lely, Password, 123456, etc. It is quite slow on the password denied response, so perhaps I need to buy a rubber ducky and let it go all night long or something. The good news is it does keep milking cows while messing with it, you just have to remember to CtrlAltF2 before you unplug the keyboard. Video: I haven't done a hard reboot, I think that's the next step, remove power and see what shows up during boot.
  47. 1 point
    Hi Artuk, Wlan0 is for running the Open AP (hidden by default, used for pulling clients in), and Management AP (the WPA2 one you set up on first boot). Wlan1 is usually used in monitor mode in conjunction with PineAP, Recon, or other modules and tools.
  48. 1 point
    The nano has a rp-sma connection, the yaggi from the hakshop has an sma connection. You need a RP-SMA to SMA adapter to hook them up together. The hakShop used to sell them individually but I think they only come with the LONG RANGE WIFI BOOSTER KIT now. Which isn't a bad option. You can use the Yaggi for directed for one of the wlans and then use the booster on the other so the investment would work out fairly well. I've had them both on the nano and it works great however you have to remember the booster needs power from a usb as well so either the usb on the nano will be taken or you'll want a battery pack that has two ports for the nano power and for the booster.
  49. 1 point
    Just thought I would share some pics of my setup. I was able to get the second battery into the narrow pocket. It took a little force but none of the fabric or stitching ripped and now it slides in and out easily.
  50. 1 point
    We're assembling quite a large libarary of links, thanks guys! It's already almost to the point where it needs to be cleaned up. I just want to make sure that we keep the focus on people who are new to the scene and not focus to much on all the different details. Maybe i'll make posts further down like an appendix and point to those for more details.
  • Create New...