Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation since 02/24/2021 in all areas

  1. That's OK, we believe you. I strongly recommend destroying the phone and terminating all accounts you have with Apple. You are fully compromised and all your data is now infected, you cannot get it back. I would also recommend disinfecting your PC, use a number of different products, just in case one is not enough. Move to Android and also move house, they know where you live now so you'll never be safe.
    2 points
  2. I assume they are configured with two different MAC addresses. Is the device.config file downloaded for each of the Turtles (just to make sure they don't use the same file that might confuse C2)?
    1 point
  3. Im finding limited modules and support for this Pineapple Mark VII, its pretty useless tbh.
    1 point
  4. hey, my pc and cell phone is hacked. whenever i watch videos or listen to music on youtube, twitch or other media platforms i can hear other people talking about my activities in the background. I have no idea how they do it but it bothers me. i capture my network traffic with wireshark and save them. sometimes they cahnge my clock & date or delete folders but the most time i can just hear the really quiet voices in the background. Any idea what it can be and how to do it? i would like to go to the police with it, but it bothers me at the time not being able to use my pc and my m
    1 point
  5. As others have said, we won't help you cheat on specific games. If you are interested in general discussion on how cheating and anti-cheat systems work, then there may be someone who has knowledge about it. If c0ncept is known to cheat, try asking them for specifics, not us.
    1 point
  6. 'Yeah, I worked it out the other day I only changed the other lines and skipped the etc/config/wireless and it works fine, my PineAP recon is working on 2.4GHz as well as 5GHz like a charm
    1 point
  7. Don't you get the bash error when running that string? It should be pretty obvious. The command line is not correct, get rid of all the backslashes, they are not needed when running it as a single line wget https://c2.hak5.org/download/community -O c2.zip && unzip c2.zip && IP=$(curl -s https://checkip.amazonaws.com) && echo "Copy the below setup token to browser http://$IP:8080" && ./c2-*_amd64_linux -hostname $IP-listenip $IP
    1 point
  8. For some reason wget https://c2.hak5.org/dl -O c2.zip doesn't seem to work anymore. If you cat the downloaded file it will most likely be a html file, hence unzip complaining about the fact that it is not recognized as a zip file. Try wget https://c2.hak5.org/download/community -O c2.zip instead. The file should be about 47.5 MB when downloaded.
    1 point
  9. Initial Setup The OTA installation from the stager (initial setup firmware) does not support hidden and open WiFi networks. It only supports WPA WiFi networks. This is addressed in a forthcoming update. WiFi Client Mode This is a known issue related to some WiFi networks on an old firmware (version 1.0.0) which has been solved on subsequent releases. In firmware 1.0.0 the WiFi Client Mode settings were not automatically saved. There was a save button for if you wished to manually save the profile, however we learned that many people were not noticing the sav
    1 point
  10. I am experiencing the same issues as above, I've spent the last hour looking for documentation and found none, I turned on handshake capturing on my own network and cant figure out what it's asking for to get it configured, it wont capture handshakes. I need something that's written for a new user not a user who's used it for 5 years through the different iterations. Yes, I'm a newbie too but right now, I've wasted hours on a Saturday night that I dedicated to understanding how to use the pineapple to capture handshakes. Like above, most of the clients on my own network dont show up. Also, ho
    1 point
  11. I'm having real problems with the Pinapple Mk7. I'm running on this version. 1) Is there any documentation on this product? I can't find anything beyond a basic setup guide. Is there a guide that tells you what each feature does and how to use it? 2) Recon doesn't work well at all. -- A 30 second scan seems to work pretty reliably, but running a continuous scan... not so much. The scan seems to stop randomly. The "Settings" panel will say that it's still scanning, but updates stop happening (no client updates, no new clients found). -- Handshake Capture seems sketchy
    1 point
  12. The Key Croc is based on the Bash Bunny platform so yes, it shares many of its ATTACKMODE options. That said, the payload execution framework and hardware implementation are very different. Sorta like how certain SUVs and Pickup trucks share the same frame.
    1 point
  13. The best tool is the Javascript encoder from our repository at https://downloads.hak5.org/api/devices/usbrubberducky/tools/jsencoder/1.0/ This creates the inject.bin file from your ducky script all in browser with just a single HTML file - so no java, python or online tool needed.
    1 point
×
×
  • Create New...