Jump to content

p1rat33r

Active Members
  • Posts

    10
  • Joined

  • Last visited

Posts posted by p1rat33r

  1. Hey guys,

    I've got a question about router/modem combinations.

    I live in university housing, and there has been a netgear modem/wireless router connected since I got here. The problem is the password is the same as every other unit in the building, and my neighbors have been leeching my connection for months.

    I need to kick out my neighbors without screwing over my roommates. The configuration password is something other than default. My concern is that hard resetting the router will erase some important config and I'll be hosed because support is virtually nonexistent from the university or the ISP (each tells me to call the other), and I won't be able to configure the device.

    So, my question is: Has anyone had experience configuring one of these things? Can I safely default the device to factory settings, or will i lose the ability to connect?

    This is the model we have, CG814WG: http://www.netgear.com/upload/product/cg81...4wg_12jan07.pdf

  2. still I don't fully understand the duck hunt program but if its only HID devices with keyboard and mouse why would scripts be effected, just a thought i just came up with what if the ducky's keyboard mimicked the attached keyboard it has to have some unique ID tag or something it can get. but if the computer things the HID is its own keyboard that's perfectly legit just makes me wonder if it would really pull it off.

    The rubber ducky doesn't use scripts, it simulates keystrokes. The ducky's ability to do so gives it power because it won't be blocked by mechanisms built into Windows Vista and 7 which block autorun code execution without the user's knowledge. If duck hunt prevents your device from sending signals to the machine, you are dead. There is no script execution, nor any key presses sent to the machine. This is why scripts would be effected.

  3. It would probably be easiest to get the Ducky to FTP to your server and download and execute your payload of happiness.

    Sounds exactly how botnets and such work. This kind of a thing is called a dropper. The dropper is a lightweight piece of code which is less likely to be noticed by countermeasures. This code the surreptitiously fetches your bigger payloads from the net.

  4. I remember watching a segment some time ago where Hak5 showed how to set up a honey pot to attract malware and such, including details on monitoring software. I could be wrong about it being hak5 though because I can't find the episode. The keyword "honeypot" isn't in shownotes. 4x04 goes over infecting a VM with virii but this isn't what I'm looking for. Am I crazy?

    I think I am crazy and read about it in 2600 while watching hak5 so they meshed together. =P

  5. yea i'm using PocketKnife. What you said only makes it work automatically when you do. I'm wondering if its possible to force a victim to do the same.

    Also, I tested when you select "Open folder to view files", it doesn't autorun.

  6. I successfully modded the fon using hak5's guide, everything works great when it's not plugged into the internet, but I can't do very many interesting things while it's in this state.

    At my university, I can't connect to the internet unless I disable the router's DHCP. But doing this means that I have no idea what IP address the router is given, and therefore can't pull up the http interface.

    Is there a workaround for this besides going to the net admin and reserving an IP for the device?

×
×
  • Create New...