Jump to content

dark_pyrro

Dedicated Members
  • Posts

    2,621
  • Joined

  • Last visited

  • Days Won

    198

Posts posted by dark_pyrro

  1. 48 minutes ago, hackerzero00 said:

    the tar.gz (its unzipped)

    You shouldn't extract it, but do as the documentations says; "Do not extract the .tar.gz archive"

    48 minutes ago, hackerzero00 said:

    current firmware im on is 1.4

    If you are already on fw version 1.4, what are you trying to update to (since 1.4 is the latest available firmware version)?

  2. I would consider this normal. There's no "click in to pop out", you have to pull it out without any aiding mechanism. The thing is that the USB-C connector is a bit in the way of the "path" that the Micro SD card needs to be fully released/pulled out. When in need, I usually just lift it gently with my fingernail and pull it out, or use a spudger to lift it. However, you shouldn't be needing to remove the Micro SD card in a normal situation, just use the button to put the Ducky in "arming mode" and access the content of the card.

  3. 16 minutes ago, Stone131 said:

    Does a mark7 have its own WiFi network that it sends out?

    It has the management AP, the open AP, the Evil WPA, etc. On top of that it can impersonate APs/ESSIDs as well.

    https://docs.hak5.org/wifi-pineapple/ui-overview/pineap

    https://docs.hak5.org/wifi-pineapple/ui-overview/settings#wifi

    21 minutes ago, Stone131 said:

    Can i use it to scan for mobile phone without a wifi netwerk?

    Not all sure what you mean by that, but the Mark VII doesn't have cellular capabilities.

    22 minutes ago, Stone131 said:

    Can a Mark 7 see mobile phones if they are not on the same WiFi network?

    You can see wireless devices, but identifying them as mobile phones specifically might not be successful all the time.

  4. You mean that you have access to the Croc using Cloud C2 and controlling it that way (or using ssh from the same network to which the Croc is connected)?

    When saying "example payload", are you referring to the example_payload.txt that came out of the box with the Croc (i.e. the MATCH on hello)?

    In what way are you going to remove the payload?

  5. Can you use an ordinary wired keyboard along with the phone (i.e. writing on the phone with a keyboard connected using USB)? Did you try with an OTG adapter?

    Even if you successfully get the Ducky to identify itself on the device, that payload will probably not be successful due to the fact that brute forcing the PIN on an Android device most likely will lock down the phone after a certain number of tries. There are a lot of years since the brute force method was successful and I don't think there has been any new attack vector revealed to circumvent this.

  6. Try some of the things I told you to do when you had problems with the Croc (ssh and/or wget) to verify that it's possible to get any response from the C2 server on the Shark. One thing to do first of all is making sure that the Shark has the correct date and time.

  7. no problem, if you open a web browser and load your C2 server web interface in the browser (in simple terms "visiting your C2 server using a browser"), can you see your visit in the service status output, i.e.

    1) Open your C2 server URL in your browser (note the time)

    2) check the C2 server service status using the same command that you displayed in your first post

    Are there error message entries (http2) in the status output that correlates with your attempts to load the C2 user interface in your web browser?

×
×
  • Create New...