Jump to content

Mr-Protocol

Root Admin
  • Posts

    4,227
  • Joined

  • Days Won

    91

Everything posted by Mr-Protocol

  1. Here is a pretty solid resource: https://www.offensive-security.com/metasploit-unleashed/ msfvenom specific: https://www.offensive-security.com/metasploit-unleashed/msfvenom/
  2. I have an El Capitan mac at work. I will bring my turtle into work and test it on my lunch break. If I have time, I will test the VM passthrough. We have seen issues with passthrough with virtualbox in the past with the turtle though. Telot, what was the OS in the VM? Kali?
  3. Not sure what you mean by both have individual fire records. A trigger pull is a trigger pull. That's what is logged.
  4. Table vice and sledge hammer here. Kaboom right in half.
  5. That is only a theoretical method from many many years ago. While the theory seems simple enough, good luck rebuilding that data even if you could get all the platters back in alignment and not screw up the sector orientation. Aside from that, modern disks, as mentioned earlier, have a higher bit density and you would be unable to get an accurate residual read due to the proximity of the other bits.
  6. The inject.bin is what the actual code is that the rubber ducky runs. You cannot upload a txt file directly for a new payload. It will need to be compiled. Attached is the default inject.bin. Make sure to unzip it. inject.zip
  7. Give it a try now with uploading your own image and see how it works. Forum got an upgrade, the file size was seta bit low so I gave it a little bump larger. Should work fine now.
  8. What OS are you using? And is it the code from the first post? The bash code from the first post cannot be directly imported into the online compiler. Although if you trust me as forum admin, all around good guy, etc :P I can compile the code and send you the .bin to use for your class.
  9. The better way to access the turtle over WAN is to have it auto-ssh out of the network to you. Since on a pentest deployment, outside SSH will most likely be blocked.
  10. Hmmm, I'll make a test account and try. Edit: Interesting. I will look into it further. For now you may have to upload it somewhere and link it, or use Gravatar.
  11. I was limiting to spinning disk wiping. But yes, trying to use DD to wipe an SSD will not work out well and just thrash the wear cycles.
  12. Take my word for it, once you overwrite the data, it's gone. One pass is all that is needed.
  13. Non Destructive: Literally the fastest way is to use ddrescue or dd_rescue and /dev/zero. "Secure erase" is just a buzzword for overwrite. Destructive: Table vice and a sledge will break the disk in half in a couple of hits. Or use your imagination.
  14. DBAN is overkill. DBAN, luks, DBAN, luks is way overkill. One overwrite is good enough. If you increase the block size from the default 512 to something larger it will go faster. If you use dd rescue it will use a variable block size depending on drive performance.
  15. DefCon happens. Keep an eye on the shop and it should become available soon.
  16. You are in the "Active Members" group and should be able to. Double check the avatar requirements to make sure you are within the specifications.
  17. Is this in regards to the Turtle? Or just general sshfs?
  18. I think it's invite only. I'm fresh out. I think Shannon put some hashtags on the Hak5 post (Twitter) for the episode to follow for invites. Check the comments too. Edit: Was her tweet: https://twitter.com/Snubs/status/643505269788553216
  19. Can you provide a full list of commands, step by step, of what you did. I'll give it a try. I will be on a plane shortly so response may be delayed.
  20. There is limited space on the internal storage. Also "Clearing" the root is not something you want to do. Store files to the SD card which should be mounted at /sd if memory serves me correctly.
  21. It works. The UI may not pick up the interface if you plug it in after boot. Having it plugged in before giving the pineapple power will show it in the UI. WLAN0 is dedicated for clients / karma. Use wlan1 for de-auth. Use wlan2 to connect to an AP for internet source.
  22. Have you tried the solution listed here: http://askubuntu.com/questions/595359/fglrx-wont-install-unable-to-correct-problems-you-have-held-broken-packages http://askubuntu.com/questions/588742/packages-are-broken-with-unmet-dependencies-cannot-install-fglrx
  23. Have you tried apt-get -f install fglrx-driver
  24. That doesn't make sense to me. Boot off of internal, store everything on SD card. Just like my OS boots off my SSD and I store everything on multi traditional hard disks.
×
×
  • Create New...