Jump to content

Mr-Protocol

Root Admin
  • Posts

    4,227
  • Joined

  • Days Won

    91

Everything posted by Mr-Protocol

  1. In the last picture, you see that tag on the left arm? Registry Lookup: http://registry.faa.gov/aircraftinquiry/NNum_Results.aspx?NNumbertxt=N24HZ UAS: http://www.dji.com/product/spreading-wings-s1000-plus
  2. If you have the parts, you can make one. I made a Cisco console cable but I had the cable, crimp DB9 connector, and RJ45. Look up the pin-outs and you can slice and dice some cables together and make it work. You just need a multi-meter to check continuity and make sure the pins are in the right place.
  3. A simpler flow would be: Sniff the handshake Send to cloud cracking Use the key and setup to be in access point mode and broadcast the network Deauth all clients on the "real" WPA AP to force a connection on yours.
  4. While I cannot speak on the status of firmware, I have personally seen Seb's board of firmware things to work on a couple months ago. I can assure you that it's not at a standstill. The NANO section has pertinant sticky threads as you described. Regardless the best place to view the latest firmware change log and download is https://www.wifipineapple.com/downloadsand that is for TETRA, NANO, MK5, and even MK4. I believe it is safe to say that things are still busy in both the Hak5 and personal aspects of life.
  5. Yeah, they were pretty hit or miss. I just started spending the little extra for quality cables.
  6. I would use caution when buying low price OTG. I have purchased a good amount of OTG cables/adapters in the past and a lot of them didn't work well or at all with some devices. I think it may be the gauge of wire used or something.
  7. That is program mode for the Ducky firmware. If you just want to put your inject.bin on it, it goes on the root of the SD card.
  8. Please review this: https://hakshop.myshopify.com/pages/policy#warranty Do you have another micro SD card you can try? Format it with FAT.
  9. Where did you purchase the adapter? Have you tried plugging it into a Linux machine (Computer, laptop, etc)? Get the same errors?
  10. If it's connected with a serial port, most likely it will be RS-232.
  11. It would help to know what the device is. Make/Model/Manufacturer, etc.
  12. You would have to create a text file and the commands to type out the entire 2000 word document. Then compile that payload to a .bin file, and transfer it to the Ducky's micro SD card. Here is a link for some examples. http://usbrubberducky.com/#!duckyscript.md
  13. Sorry, I meant to reply to this. It all comes down to the driver and finding a third party with a signed driver that supports monitor mode. Would be easier to either use USB Pass-through on a VM or use a live USB boot to Kali or similar linux distro. That is based off the info i read from wireshark and winpcap websites. https://wiki.wireshark.org/CaptureSetup/WLAN#Monitor_mode https://wiki.wireshark.org/CaptureSetup/WLAN#Turning_on_monitor_mode https://wiki.wireshark.org/CaptureSetup/WLAN#Windows
  14. Just found this: https://www.fireeye.com/blog/threat-research/2016/05/exploiting_cve-2016-.html
  15. The argument is a bit too broad. Things to consider: OS Version - Not all manufacturers/carriers allow newest Android OS updates or are extremely delayed. They can also modify the build. This also brings up the Google build server vs everyone else's which most likely will have a kernel version difference. Storage - iPhone has encryption, Nexus devices enable encryption by default. Not all Android have encryption enabled by default. When it comes down to it, latest and greatest Android and Apple are pretty much equally secure as far as we know. And that is the trick, you don't know it's broken until it's known. Just living in a blissful ignorance until someone is like "Here is some PoC code". Both Google and Apple try and vet their apps for malicious activity. I know for a fact that some apps have gotten into both stores. One was a straight up backdoor for Apple devices. It would install, download remote code, and reverse shell to the creator's computer.
  16. I just took mine apart and reassembled to create the following. To reassemble: Here is a picture of the parts. Starting with the white piece having the pins facing down, the circuit board should fit into the space and sort of lock in. See below. Here is an image of the same step but flipped over. Now place the black plastic spacer over the circuit board and it too will somewhat lock into place. Carefully flip the whole thing over and apply the smoke colored plastic cover. It has tiny prongs that will fit into holes on the white plastic on the edge. The tricky part: Picking up the whole set without losing the black plastic spacer, and inserting into the metal shield and it should fit snugly in. Make sure to push it all the way in. Test it out, make sure it works. Cheers!
  17. In regards to the admins and xiopan site, I can only assume you are referring to me because of the account name and avatar possible similarities. I assure you that it is/was not me back in 2012 when that account was created, or in 2013 from the last post I could find on that account. I have been a member here since 2009 (before that too but can't remember that account, I digress) and am always consistent with my handle. Not to mention I couldn't even phonetically pronounce xiopan. I also work very closely with the team to help better the product line and experience overall. That includes programming, testing, training, etc. The Hak5 crew are my friends family. It appears you have some resentment and are making allegations without merit. That would not be the first person, or the last, to try and copy my online presence via handle or otherwise.
  18. I'm in a webex all day. I'll test the NEH I have when I can install wireshark and see what I can come up with.
  19. Are you running Wireshark with Administrative permissions? I haven't played with wireshark on Windows in a long time.
  20. You need to put in a delay at the start of your script for it to initialize. Did the default inject.bin work?
  21. I'm getting the same hash as you. I thought this was corrected a couple months ago an issue like this was reported. Please stand by for an update.
  22. You should be able to install it, but don't expect it to show up in the "Modules" on the WebUI. You would have to use ssh to run it.
  23. Basically build a birdhouse, insert pineapple with battery pack.
  24. It is the same as the booklet that comes with the Mark 5. Here is a copy I found locally: Link removed Obsolete Mark 5 manual added to this post booklet.pdf
×
×
  • Create New...