DELETE ME
-
Posts
21 -
Joined
-
Last visited
Posts posted by DELETE ME
-
-
Have you got the mk1 or mk2 version of the 'Pineapple'
Mk1 has a fixed battery pack which is soldered onto the board.
Mk2 has a battery pack which plugs into the normal power input.
With out seeing a picture, I can only suggest re-solder the wire back on if its a Mk1, and I'm not to sure about the Mk2 but it might be the same solution as Mk1
-
Sounds like the problem I was having, when running on the battery pack. When they got low but still had enough power to power the device, when more clients connected to it the device pulled more power and the signal dropped when they disconnected again it was back to normal. This man not be whats happening with your device but its something I have notice when running mine using the battery pack.
-
If you have the 'Pineapple' in the Fonera (or Open Mesh) white case, there are small screws under
the two rubber feet in the front, its just a case of removing them and lifting the top lid off.
Once you can see the insides un-screw the antenna nut, be careful not to twist the antenna wire when doing this because you may damage it (use some long nose pliers to hold onto the bolt while removing the nut). From this you should be able to lift out the circuit and place it in anything you want.
-
Episode 5x04
in Hak5
Bit of a bump, sorry.
If anyone is still having issues with DNS tunneling, below is how I got it working using DynDNS and a free co.cc domain
DynDNS
Create a account and domain linked to your IP addressDomain
Signup at www.co.cc for a free domainSelect your new domainSelect Name Server and enter your dyndns.org addressSave changes ( make take up to 48 hours to make the change )Server ( Ubuntu 9.04 )
Install perl mime base32 module ( sudo apt-get install libmime-base32-perl )Install perl net dns module ( sudo apt-get install libnet-dns-perl )Install OpenSSH ( sudo apt-get install openssh-server )Download OzymanExtract Ozyman in rootOpen shell goto ozyman folderRun - sudo ./nomde.pl -i 0.0.0.0 <domain>.co.ccRouter
Open port 53 (DNS) to serverOpen port 22 (SSH) to serverClient ( Windows 7 )
Install CygWin with Perl and OpenSSH options selectedInstall MIME:Base32 and NET:DNSMIME:Base32Download -Place it C:/cygwin/lib/perl5/5.10/Mime/NET:DNSDownload -Place it C:/cygwin/lib/perl5/5.10/Net/Download OzymanExtract to C:/cygwin/home/<username>/Open CygWinRun - ssh -D 8080 -C -o ProxyCommand="/home/<username>/droute.pl sshdns.<domain>.co.cc" <ubuntu username>@<domain>.co.ccFirefox - set proxy settingsTools > Options > Advanced > Network > SettingsManual proxy configSOCKS Host: localhostPort: 8080 -
Hi,
Don't know where to post this but, Episode 822 and 824 are not shown on the HD iTunes feed.
-
Episode 8x23
in Hak5
From what Darren said
Intel i5 2400 x2 - http://ark.intel.com/Product.aspx?id=52207
Intel i5 2500K x1 - http://ark.intel.com/Product.aspx?id=52210&processor=i5-2500K&spec-codes=SR008
Asus P8H67-M LE x3 - http://www.asus.com/product.aspx?P_ID=anRBLQ8WEKcWZHSt
Hard Drive 2.5 7200 laptop drive (Unknown Make)
Power Supply (Unknown Make)
8GB Ram (Unknown Make)
Case - Motherboard box
All for around
1200$
From Frys and Mico Center ??
-
If anyone is interested
Episode 816
26:47
100101100110100101101001
150 105 105
End credits
10010110011010010110100110010110
150 105 105 150
-
clues so fair
803
23:33
Evil Server .. 'Ahh fookit who whats to join my botnet'
804
1:13
Been playing with some botnet stuff and ... Did I say botnet I meant honeypot ... 'There is no such thing as a hak5 darknet'
30:39:20:46:39:20:31:31:20:30:32:20:39:44:20:37:34:20:45:33:20:35:42:20:44:38:20:34:31:20:35:36:20:43:35:20:36:33:20:35:36:20:38:38:20:43:30
Hex to ASCII: 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0
Which is the HD-DVD Processing Key string.
---- Forums
Darren: Remember, there's no such thing as a Hak5 darknet
----
805
1:19
Darren: Season 9 is where the magic happens ( is this when the darknet/botnet is going to show case?)
No real Clues?
806
28:28
Darren: Lets give them another hit to the darknet *points to the wall mounted server*
Clue: EEF5204D6A
807
32:55
Darren: Hold on ... I'm sending a text ... 'EEF5204D6A'
---- Forums
Darren's QR code image file name: RRS5204Q6N
----
808
7:47
Darren: If we had some clues like 'darknet.hak5.org port 1337'
---- Forums
If you ping eef5204d6a.hak5.org it resolves to 127.0.0.1
cbodor used the command dig txt darknet.hak5.org to get:
;; ANSWER SECTION:darknet.hak5.org. 14400 IN TXT "EEF5204D6A"
Hmmmmm. Waste uses port 1337.Was noted that the Darren's QR icon was next to his twitterphishr.com image (twitterphishr.com being mentioned a few times in preivous episodes)
Phil K. posted a interesting article http://www.team-cymru.org/Services/darknets.html
----
809
810
-
EEF5204D6A - Code the the episode
RRS5204Q6A - Darren's QR code image file name
The middle (5204) and the end (6A) are the same
-
I used this guild http://www.hak5.org/forums/index.php?showtopic=15293 to install Jasager and was using a FON2100 so should work in your case.
-
If you followed Darren's steps then you should find it at http://10.42.43.1/webif.html , for the OpenWRT web interface and http://10.42.43.1/ for Jasager.
Other wise if you just used DigiNinja's firmware then you will be able to find Jasager at http://10.42.43.1:1471
-
If you are using it on a battery pack try replacing the batteries, there might be just enough power to power the LEDS but nothing else.
-
Had this email come through today, basically its a discounted Fonera+ for £24.95
With over half a million hotspots in the UK alone, there is no better time to connect to BT FON. To get free access that starts immediately, just buy a Fonera+ and connect it to broadband anywhere. It's that simple!Take advantage of our special offer and buy a Fonera+ for £24.95 (shipping costs included), £13 off the recommended retail price.
http://www.fon.com/en/promos/betterThan3g?...amp;pricePlus=2
-
I got the same problem when flashing my fon the first time. My guess to why it failed, was while the fon was flashing it self with the new firmware,the batty pack went dead, but the leds where still on making it look like it just froze. After messing around I made myself a USB power cable and then flashed the fon using veyron guild here it took about 15 minutes to do and worked first time.
-
I'm no linux guru, but after looking around I came up with this, I have no idea if it works but it might point you in the right area.
Generic Toggle Script
Create a file called
wogglein
/sbin and paste this into it:
#!/bin/sh KARMA_STATE = `get_karma` Case "$KARMA_STATE" in 1) # Karma is on karma_cli -s off hostapd 0) # karma is off killall -9 hostapd karma_cli -s on tcpdump -i ath0 -w /mnt/tcpdump esac
Then set
chmod +x /sbin/woggle
Hotplugging
Now to get hotplugging working, create a directory in
/etc/hotplug.d
called
button
and then create a file in
/etc/hotplug.d/button
called
01-radio-toggle
as in the original wifi toggle script (above). Paste this into that file:
if [ "$BUTTON" = "ses" ]; then if [ "$ACTION" = "pressed" ]; then /sbin/woggle fi fi
and set
chmod +x 01-radio-toggle
Ref:
http://wiki.openwrt.org/oldwiki/openwrtdoc...ware/wifitoggle
-
Edit: Scrap that, messed around with it today and thought I plug my multimeter in and low and behold 4.2V just enough to power the LED's etc but not the Ethernet and serial, got it flashed and working after changing the battery's, I feel like a fool now :P
-
Hey,
I'm having some trouble with my for2100 UK (got it off ebay).
The first problem, I cant fully connect to the serial port, I get +PHY ID is 0022:5521 in Putty and it seems every thing stops, I've left it like that for a good 20 minutes and nothing has changed.
The other problem is that the Ethernet keeps cutting out, it comes online for 20 sec then does off again so the flashing process fails.
Any ideas on whats going on?
[Version 1][artical] Hackers Pierce Network With Jerry-rigged Mouse
in Classic USB Rubber Ducky
Posted
"The Teensy microcontroller programmed by the Netragard hackers was programmed to wait 60 seconds after being plugged
in to a computer and then enter commands into its keyboard that executed malware stored on the custom-built flash drive
snuck into the guts of the Logitech mouse. To squelch warnings from McAfee antivirus, which was protecting the customer's
PCs, the microcontroller contained undocumented exploit code that subverted the program's dialogue boxes to evade detection."
Hackers Pierce Network With Jerry-rigged Mouse