Jump to content

Mr-Protocol

Root Admin
  • Posts

    4,227
  • Joined

  • Days Won

    91

Everything posted by Mr-Protocol

  1. I'd suggest finding someone with a Cellebrite UFED/4PC. Maybe local PD if they would be willing to let you use it. It automates the process of backing up the original recovery partition, flashing the custom one, and replacing with the original after extraction.
  2. I just saw a HUGE price drop in 3DR Solo. It used to be ~$1300 and now it is ~$300. It does not come with the gimbal or GoPro (camera). https://3dr.com/solo-drone/
  3. If you don't backup and replace your original recovery partition, the phone will no longer be able to get OTA updates.
  4. Unlock codes vary depending on manufacture. Especially with the lockout times and so on. You may need someone with cellular forensics to take a look. If you can find someone with a Cellebrite UFED or Cellebrite 4PC, they may be able to bypass the pin lock. Otherwise your options are possibly JTAG, which will semi-take apart your phone, hook it up to a firmware flasher box, and pull the storage data off that way. The next option would be either Direct eMMC (similar to JTAG but connects to the chip directly) or chip-off (physically removes the storage chip to read externally).
  5. Bumping is basically "Thread Necro". This thread hasn't had activity since July 22, 2016. Please try the suggestions listed here: https://wifipineapple.github.io/wifipineapple-wiki/legacy/#!reset.md
  6. Yes, this has gotten way out of hand. Thank you for locking. If anyone has questions/issues with it, direct message me.
  7. I found the picture. Took a while haha. But this is a picture I took with my smartphone camera through the lens of a microscope. The centered USB pin is broken and you can see how it's broke on the top part of the soldering. Also the darker blue area that is next to the crack is a lifted trace. Fun times. With this one, my co-worker and I were able to fiberglass brush and remove the blue coating to expose the trace and solder a small jumper wire and read from the device.
  8. The photo is kind of fuzzy to see the real damage on the board. If the pad and trace was pulled up from the board it's going to be a bit of a mess. You can, in theory, use a jumper wire as mentioned above to jumper the connections to the proper trace. You will need some good quality soldering iron and solder, possibly a form of magnification, and small gauge wire. You most likely will need a fiberglass brush to expose the copper trace you need to solder to. I have done fixing on USB thumb drives where the ports were ripped off. The hard part is the unknown potential damage that you cannot see. I have a picture of one I repaired where I took a picture through a microscope to see the damage. I need to find it again :-/.
  9. The pre-installing crap in the Windows ISO would be more for mass installs using the answer file. I don't even know if you can do that anymore to be honest, and it's a TON of BS configuration in my opinion. What I use is a ghost bootable USB. What I have is a really old version of Ghost, but it still works. You may need to disable UEFI boot settings in the BIOS to boot from USB. Instead of ghosting the whole drive, you can backup just the partition. Then you can re-image that image file to the partition. Saves writing out the entire disk that way. You can also look into clonezilla which only images the allocated files. This means the backup image would be smaller. I try to avoid installing applications that constantly get updates, like Chrome, Firefox, etc. Mostly I do it to have my local user account setup. Removed all those stupid tiles from the Windows 10 start menu. Setup my security and power settings. Killed most of the "phone home" stuff with Spybot's anti-beacon. Setup the desktop wallpaper, etc.
  10. https://greatscottgadgets.com/yardstickone/ There are many suppliers listed on there. Hope that helps.
  11. Oh, Happy Days. I'm actually shocked the remote uses RF instead of IR. Good find.
  12. I made a post somewhere with pictures if you need it.
  13. Have the Pineapple connect to the access point, and your devices to the pineapple. Then if you click through the captive portal on one of your devices, they should all be covered because the gateway is the pineapple, and only the Pineapple MAC will be recognized by their network.
  14. I do hope you aren't inquiring to perform sorts of illegal acts.
  15. The ephemeris data I pulled down is more recent. the brdc files are technically "past" data of the location of the satellites. Here is some more info on the file: https://cddis.nasa.gov/Data_and_Derived_Products/GNSS/broadcast_ephemeris_data.html The files are re-generated daily. My brother's iPhone thought the date was October instead of December. Played hell on his certs and basically made it unable to do much. Thought it was pretty funny, so just make sure you use this all in a test environment. Also, since you have a BladRF, you may want to check out this github: https://github.com/osqzss/bladeGPS
  16. Mr-Protocol

    Days won

    Hover over the number for tooltip ;-)
  17. I feel like IRC is more information friendly in regards to I'm not sure where Discord is logging information.
  18. There are some pretty interesting ways to get fingerprints. ;-) Trust me. In short, fingerprints SHOULDN'T BE PASSWORDS! If anything, they should be equated to a user ID. What happens when your in a breach dump? Change your password. How do you change a fingerprint besides what was done in the movie M.I.B.
  19. That's not what we do here.
  20. It should be resolved now. If it happens more in the future, let me know.
  21. Works fine on my Firefox. Just tested it. I'll look into it.
  22. Ah, give this a read: https://en.wikipedia.org/wiki/Off-the-Record_Messaging https://wire.com/download/ http://www.howtogeek.com/190811/how-and-why-to-use-otr-for-private-instant-messaging/
×
×
  • Create New...