Jump to content

Darren Kitchen

Root Admin
  • Content Count

    4,826
  • Joined

  • Days Won

    223

Everything posted by Darren Kitchen

  1. The Apple Magic Bluetooth Keyboard is a known issue, as is the Microsoft Surface Bluetooth keyboard. Both have USB capabilities when hard wired, but they do not utilize the standard HID channels. We are working on a patch which would streamline keystroke channel discovery and pass through for keyboards which enumerate as composite devices with multiple endpoints - such as keyboard with certain multimedia keys and RGB LED effects. Your standard, boring office Keyboards from the likes of Microsoft and Logitech without such extended capabilities should work out of the box.
  2. How are you viewing the log? I tend to cat the file here and there in payload development and have yet to have that cause issues. Are you viewing it with an editor like vim or nano? Also, is this with 1.2 or 1.3 beta? In the new version, the file is written more frequently.
  3. We're testing a patch now and will make an update as soon as possible.
  4. Powershell or Bash script?
  5. It shouldn't take but 5 or 6 minutes to fully charge - as indicated by a solid blue LED. See the getting started guide at https://docs.hak5.org/hc/en-us/articles/360034667173-Shark-Jack-Basics and be sure to read the important safety information at https://docs.hak5.org/hc/en-us/articles/360034129974-Important-Safety-Information-and-Warnings
  6. @ot2i7ba are you able to SCP files to / SSH into the Shark Jack manually?
  7. Why? The Shark Jack has its own internal battery - so it's compatible with both POE and the much more common non-powered Ethernet ports. Is there a specific use case you have that would benefit from POE?
  8. Interesting observations. I'm testing on my end with a Microsoft Surface Book machine with the Key Croc connected directly to its USB-A port. I've found that when the system enters sleep, the Key Croc stays awake and I can SSH into it without issue. However, while the target is in sleep mode the Key Croc is unable to inject keystrokes to wake the target (QUACK returns errors). That said, I am unable to reproduce the issue with keystrokes from the attached keyboard not passing through to the target. In my case, pressing keys on the attached keyboard both woke the target and were recorded.
  9. The Key Croc was purpose built as a keylogging pentest implant. Unlike the LAN Turtle, it doesn't feature an Ethernet port so it wouldn't make a very good covert remote access toolkit posing as a USB Ethernet adapter. That said, we provide an unrestricted root shell so you're free to explore whatever options suit your particular scenario best. By all means hack away - just be careful not to brick it as the recovery partition will be useless for factory reset should it become damaged.
  10. Thank you all for the incredible feedback on the Key Croc. We knew in development that we were on to something game changing, so to hear the enthusiasm from you all directly is truly rewarding. The amount of creativity shown in such a short period of time since initial release is encouraging. We hope that with this beta release of Key Croc firmware 1.3 we can further that creativity. As always we welcome your feedback here on the forums and of course on our Discord #beta-testing channel. Thanks for your support and happy hacking! And an especial big thank you to our team – @Korb
  11. What's up with the QUACK STRING "GUI l" part?
  12. It's not supported by default but since it's wpa_supplicant at its base this could be achieved with a script. Firmware v1.3 exposes a wifi connect function which could be used in payloads.
  13. Thanks for the detailed reports. Since the keystrokes are still passing through to Cloud C2 - just not the target - after waking from sleep it gives us a good lead to follow. We'll investigate. Any information you can provide on the USB ports (C with A adapter, hub, powered hub, etc) would be helpful.
  14. The Key Croc is based on the Bash Bunny platform so yes, it shares many of its ATTACKMODE options. That said, the payload execution framework and hardware implementation are very different. Sorta like how certain SUVs and Pickup trucks share the same frame.
  15. I could be mistaken, but I believe media keys pass through a separate HID channel (not the exact terminology) than the regular keys. Do you mind sharing the model of keyboard? It's something we can investigate.
  16. Our of curiosity, what was the issue you had with Finder on your Mac?
  17. It's definitely not trivial but it shouldn't be impossible either. We have a proof of concept, but it's more of a hard-coded thing that's not ideal. We're investigating a more generic solution.
  18. @gigawatts I've been using mine as an AutoHotKey like device - triggering payloads to write canned responses to common emails. Even better since I have the power of bash to be able to use variables. So yes, even outside of pentesting it's a nifty little gadget to have. In regards to supporting other devices – let me be clear that the intended use cases for this turnkey keylogging pentest implant is first and foremost as a keylogger. That said, and in the hacker spirit, of course it's capable of so much more. Just, please understand that we're a small team and don't have the resources to s
  19. I totally agree that dongle life has made things easier on the hardware implant front. Rats nests behind docking stations abound. Heck, most monitors include USB hubs in the back – I know I dock my macbook on a Dell U3818DW with a single USB-C and rely on the screen for my peripherals. Anyway, we'll look into this and see what's possible.
  20. As it stands today it does not passthrough mouse - however it is something we can look into. Is there a particular target keyboard/mouse combination with wireless receiver we should investigate?
  21. There is not a way to get the voltage in software - but I'll take that into consideration.
  22. Key Croc A keylogger armed with pentest tools, remote access and payloads that trigger multi-vector attacks when chosen keywords are typed. Find the manual, or full user documentation for the Key Croc including getting started, software updates, payload development and tips from the Hak5 Documentation Center at: https://docs.hak5.org/hc/en-us/categories/360003797793-Key-Croc
  23. @flipchart the license includes: "Standard Support - valid for 1 year and up to 10 tickets. You will receive a professional response within 2 business days." Additional support thereafter is available on a case by case basis.
  24. Are you talking about SSH connections, or connection attempts? The latter is the nature of running an SSH server on the Internet. The risk is low if you are taking standard precautions (updated SSH server, good passwords, known host fingerprint checking, public key authentication, etc). A SSH SYN does not equal “getting hacked”. My very own VPS logs attempts from China and elsewhere - which is the nature of the beast. If I were concerned, I might restrict the firewall to only allow connections from my home IP address, but I don’t believe that is necessary. If you have data to share to backup y
  25. You are correct, that is the direct link to the essential usb adapters product. In regards to the EFK – I can't say for sure at the moment as those kits are being reworked for Q2.
×
×
  • Create New...