Jump to content


Active Members
  • Content Count

  • Joined

  • Last visited

About dmsmith1991

  • Rank
  • Birthday 05/17/1991

Contact Methods

  • Website URL
  • ICQ

Profile Information

  • Gender

Recent Profile Visitors

2,326 profile views
  1. Try http://www.crackmes.de, people write and submit programs that contain some kind of security system and it is your job to try and crack/bypass it. Most are like registration systems that you find in commercial software, and you need to write a keygen for it etc. It fun and a legal alternative to cracking commercial software :D
  2. So your saying that the bootloader has a seperate set of ID's which aren't replaced when you change the ID's in usb_private.h?
  3. Ok thanks for your suggestions. I was just exploring the windows minimising as it might be useful for some programs if they give suspicious output. I have found that while a command is executing within command prompt, there is an input buffer which allows you to enter commands while this program is executing. This means that I can open command prompt, type all the commands within a few hundred milliseconds and they will all execute one after then other.
  4. If the vendor_id and product_id's are changed, doesn't that mean teensy loader won't detect the teensy when it is plugged in?
  5. Hi Everyone Just wanted to share my first ducky code. It's similar to others that have been posted, but the keypress functions are modular and the ExecuteCommandViaRunWindow function gives you the option to minimise the executed program's window after it has been created. Simply specify 1 for the minimiseWindow argument, and 0 if you are executing something like notepad.exe which you don't want minimised. The current payload creates a new user for windows named "DuckyWasHere" and adds it to the administrator group. Run "net user DuckyWasHere /delete" in command prompt to delete this accoun
  6. Agreed, no HID access means that the ducky is dead in the water :D
  7. Hi Guys Recently i've been looking into using a OpenWRT hacked Fon 2.0 beta as the interface between a Rover and PC. My initial ideas were to connect the Fon to an Arduino board via USB, and sending it commands via a USB-to-Serial driver installed on the USB port. Having some kind of TCP Server/AJAX interface to send commands to the Fon, which would then send commands down USB to control the cars motors via the digital outputs on the Arduino. I was also thinking of using the PHP exec() function to send commands to the Arduino, something like this; exec("echo 'Hello Arduino' > /de
  8. Thanks for the info, thats exactly what I wanted :) I guess the next step would be to have It configurable by the Web Interface.
  9. But it this possible with just 1 Fon, rather than having to strap two together?? And also, how would I go about getting a remote Web Interface/Shell for Administration, without having to port-forward a router to accept an incoming connection (ie. Reverse Connection). I guess some coding is involved. And in terms of the Interfaces, I meant master mode not monitor, sorry :) Cheers,
  10. How about making a Jasager backpack for your Cat or Dog. Mad, but wouldnt that be sweet?? The HakCat, lol
  11. Hi All Ive been thinking about getting the Fon to piggy-back on a nearby open wireless network, therefore giving it access to the internet. This would open up a multitude of possibilites such as; >>Connecting back to a PC/Server and giving the pentester remote access for administration, either via an SSH shell or the Web Interface. >>Using this open network to give Jasager connected clients access to the internet. The Fon would be stand-alone, instead of having to have a laptop running DHCP server connected to a cell phone etc, so its ultra-compact. Connected Client >
  12. Hi Guys How can I change the BT3 boot options, so I dont have to keep typing the config for my laptop every time I boot BT3. Cheers,
  13. Hi Guys Has anyone got any information on getting caffe-latte working on the latest aircrack release. Im confused over the fact that both airbase-ng and aireplay-ng have a caffe-latte mode, but I dont know if they have to be used together etc. Ive tried google, and cant find any good guides/tutorials. Any help is much appreciated :)
  14. Hi Guys I am wondering if it is possible to build a Caffe-Latte module/auto-run script for Jasager, possibly using the new caffe latte attack mode in the latest aircrack-ng release. It could check whether the selected client was trying to connect to a WEP encrypted network, perform the attack, and save the WEP key to a logfile. I guess it must be used in conjunction with a laptop running a share, as the fon wont have sufficient memory to save the replayed packets captured by airodump. I wouldnt know how to go about it myself, but if anyone who would like to give it a go that would be g
  • Create New...