Jump to content

Darren Kitchen

Root Admin
  • Posts

    4,836
  • Joined

  • Days Won

    230

Everything posted by Darren Kitchen

  1. Our of curiosity, what was the issue you had with Finder on your Mac?
  2. It's definitely not trivial but it shouldn't be impossible either. We have a proof of concept, but it's more of a hard-coded thing that's not ideal. We're investigating a more generic solution.
  3. @gigawatts I've been using mine as an AutoHotKey like device - triggering payloads to write canned responses to common emails. Even better since I have the power of bash to be able to use variables. So yes, even outside of pentesting it's a nifty little gadget to have. In regards to supporting other devices – let me be clear that the intended use cases for this turnkey keylogging pentest implant is first and foremost as a keylogger. That said, and in the hacker spirit, of course it's capable of so much more. Just, please understand that we're a small team and don't have the resources to support every possible device under the sun. If you attach a NIC and it works - great. If it doesn't - sorry, that wasn't within the scope of what we're trying to do here. Will we be helpful and point you in the right direction if we have that ability? Of course. But I just want to set clear expectations that while it can absolutely be used for use cases outside the intended function, we're limited in what we can "officially" support. So, with that I might mention that our friend @GlytchTech recently added support for an RTL-SDR dongle so he could pick up Software Defined Radio signals on the Key Croc. It that totally cool? Yes. Is it an absolute hack? Of course - and we love it.
  4. I totally agree that dongle life has made things easier on the hardware implant front. Rats nests behind docking stations abound. Heck, most monitors include USB hubs in the back – I know I dock my macbook on a Dell U3818DW with a single USB-C and rely on the screen for my peripherals. Anyway, we'll look into this and see what's possible.
  5. As it stands today it does not passthrough mouse - however it is something we can look into. Is there a particular target keyboard/mouse combination with wireless receiver we should investigate?
  6. There is not a way to get the voltage in software - but I'll take that into consideration.
  7. Key Croc A keylogger armed with pentest tools, remote access and payloads that trigger multi-vector attacks when chosen keywords are typed. Find the manual, or full user documentation for the Key Croc including getting started, software updates, payload development and tips from the Hak5 Documentation Center at: https://docs.hak5.org/hc/en-us/categories/360003797793-Key-Croc
  8. @flipchart the license includes: "Standard Support - valid for 1 year and up to 10 tickets. You will receive a professional response within 2 business days." Additional support thereafter is available on a case by case basis.
  9. Are you talking about SSH connections, or connection attempts? The latter is the nature of running an SSH server on the Internet. The risk is low if you are taking standard precautions (updated SSH server, good passwords, known host fingerprint checking, public key authentication, etc). A SSH SYN does not equal “getting hacked”. My very own VPS logs attempts from China and elsewhere - which is the nature of the beast. If I were concerned, I might restrict the firewall to only allow connections from my home IP address, but I don’t believe that is necessary. If you have data to share to backup your claim of a security vulnerability, we are obviously all ears and in fact have channels for such bug reporting. I don’t assume you are acting with anything less than good intentions, however making such a claim without data is not the most helpful.
  10. You are correct, that is the direct link to the essential usb adapters product. In regards to the EFK – I can't say for sure at the moment as those kits are being reworked for Q2.
  11. Keep in mind you can always access your WiFi Pineapple's serial console - which will provide a bash terminal on the linux OS - right from the UART port. This is incredibly helpful for debugging as you'll see the system log live as the device boots and while interacting with the shell. Here's more on this feature: https://docs.hak5.org/hc/en-us/articles/360010555553-Serial-Access-WiFi-Pineapple-TETRA
  12. Are you able to connect any other Hak5 gear to your Cloud C2 server from the same network that is hosting the Screen Crab?
  13. Yes. The ATTACKMODE command supports spoofing multiple ID values including VID, PID, Manufacturer, and Serial Number.
  14. Too long, and that's my fault. I really need to find a scalable solution to this but thus far haven't.
  15. 2 TB - which AFAIK at time of writing are not commercially available yet. The Screen Crab features an SDXC card reader, which supports cards up to 2 TiB. I have had great experience with a Samsung Evo 512 GB card. That said, I cannot list every possible cards compatibility as I do not have access to them all for testing. In theory as long as they're all adhering to the spec, any SDXC card should work - but YMMV.
  16. Foxtrot will be releasing the new firmware early next week. In addition to fixing live recon, it also fixes reporting emails and openvpn crashes. Full details to come. Thanks again for all the valuable feedback
  17. Thanks everyone for the detailed bug reports. After investigating the issue, we were able to identify and reproduce the bug. Currently firmware v2.6.3 is being validated, and can confirm it fixes live recon. Once testing has completed, we'll get this published to downloads.hak5.org I really appreciate the reports and welcome any further constructive feedback. Thank you!
  18. I haven't had a chance to read this entire thread but I can respond to the OP and say, absolutely not, Hak5 is very much alive. I understand that we haven't put out many of our regular videos lately. Personally I've been taking a bit of a hiatus to restructure some things in my life that needed attention. With that said we have a lot of great programming right around the corner coming to the channel - some familiar faces, some new faces, and some fantastic shows all around. Stay tuned for a channel teaser in the next few weeks.
  19. Be sure that the WiFi Pineapple NANO is provided the requisite 9W of power. See the power consideration article at https://docs.hak5.org/hc/en-us/articles/360010471754-Power-Considerations Essentially, a typical 2A USB source will be adequate - but if an unpowered hub is used with other accessories attached, you'll experience reboots and/or boot loops if the device isn't adequately powered.
  20. The WiFi Pineapple TETRA requires 24W for normal stable operation. See the power considerations article at https://docs.hak5.org/hc/en-us/articles/360010471754-Power-Considerations While it can be operated from USB power, it would require both USB ports to be supplied 12W each (2.4A USB port) from either a single or two separate batteries to achieve this.
  21. The WiFi Pineapple TETRA will be back in stock in about a week or two. You can sign up to be notified when they're available again. We didn't anticipate the extended factory downtime post-Chinese New Year caused by COVID-19, which has caused disruption in our supply chain - especially to our tactical variants.
  22. It is possible to roll back the firmware. You can follow the instructions here https://docs.hak5.org/hc/en-us/articles/360025819673-Manual-Firmware-Installation If you're able to isolate the issue to firmware 2.6.2, please let us know and we'll see if there isn't a configuration change or dependency that has caused it to stop working.
  23. It looks like at first your eth1 interface is set to 172.16.42.42 (which is what the WiFi Pineapple expects for ICS), then moments later eth1 has an IP address of 172.16.42.170 - likely obtained from the WiFi Pineapple's DHCP server. This leads me to believe your Kali Linux system is configured in such a way that a service, like network manager, is attempting to obtain an IP address from DHCP, overriding the statically assigned IP address previously set. I recommend looking into any service that may be overriding this setting. I'll give it a spin with a fresh Kali Linux VM and see if I can reproduce these results.
  24. Maybe I'm not understanding you properly, but the WiFi Pineapple is in itself a Linux computer with a web interface accessible from any modern browser. There isn't any desktop software to install on your host computer. You just connect to it via WiFi or Ethernet and open http://172.16.42.1:1471 on your browser. I've used my WiFi Pineapple NANO on my 16" Macbook Pro without any issue, and the same could be said for just about any modern OS.
  25. It should be back up on Google play in the next day or two. Sorry for the inconvenience!
×
×
  • Create New...