Jump to content


Dedicated Members
  • Posts

  • Joined

  • Last visited

  • Days Won


Everything posted by no42

  1. I think your trying to say "the sdcard adapter is not working?" is this right?
  2. please post a link to this file.
  3. read the links in my signature, also there is a pinned post on flashing on windows in the forum.
  4. thanks!! I'll add this to the svn, and it'll get incorporated into the jar file in later builds. Ducky Dev points ++
  5. Sounds like a timing / focus / payload issue. Follow some examples, the ducky will always type in the active window, sometimes timings are OS dependant , also payloads are usually OS dependant. Have you read the links in my signature? Read others posts in the forums - theres a lot of info there; could be information overload? start with the ducky guide and FAQs Start with a slightly longer delay between commands, and once a script has successfully run; reduce the timings to find the optimal payload speed. like any hacking device/ programming language practise,practise,practise. The duck is your friend.
  6. what encoder command are you using? and what language flag if any? if you need to create your own language.properties file, with corrected codes, copy one of the examples here https://code.google.com/p/ducky-decode/source/browse/#svn%2Ftrunk%2FEncoder%2Fv2%2Fresources basically you need to swap the codes round for @ and "
  7. are you using fr.properties or macfr.properties I don't see macfr.properties anywhere to check the codes. Basically there is an error in this file.
  8. Use the composite-duck from ducky-decode. Ducky does the HID injection and appears as Mass Storage Drive. Look for on the download section/google drive C_Duck_v2.1.hex Check out the links in my signature.
  9. The micro-controller sounds fine. It sounds like dirt on the micro-sd slot. Possible solutions: 1)Try to clean the the sd-card slot with something small 2) Try replacing the sdcard with an entirely different one (sometimes these small cards fail?) 3) very gently (there are delicate pins that may break if your too rough) with a wooden toothpick, try to gently probe out any dirt from the sd-card slot 4) club together with some mates and do a big hakshop purchase and replace the ducky Warning... possibly harmful to your ducky... 5) desolder the sd-card slot & then clean and re-solder the card slot back on? 6) desolder the sd-card slot & replace with one from rd-online / digikey / farnell? note: I bare no responsibility if you harm your ducky. Best of Luck...
  10. Xcode is free! Its in the app store https://itunes.apple.com/us/app/xcode/id497799835?ls=1&mt=12 then use macports(or brew) to install all the gnu tools you may need?
  11. Karma can see, and mimic WPA/WPA2 probes. Problem is that many OS's now record details about the AP, i.e. was it previously encrypted? MAC addresses etc. So when the Pineapple is issuing Probe Responses with "I'm xyz", the host OS may choose to ignore them, and/or present the user with a warning that the WiFi network is different than previously used; As is the case for my IOS/OSX devices.
  12. Apologies this is brief, but should give you the right idea. 1)You may have to go through the BIOS, or onboard system configuration tool to add the disks. 2)Then they should show up as extra disks / datastores within vmware. 3)to add a drive to a vm, right-click the vm. choose edit settings add hard drive configure harddrive location, size etc finish 4)then within the powered-up OS of the virtualised machine, you have to configure the drive letter/mount point.
  13. Replacing images can be done in one of two ways 1) etterap filters http://www.irongeek.com/i.php?page=security/ettercapfilter 2) squid http://www.crapflingingmonkey.com/wp/2010/03/april-fools-prank/ & http://www.ex-parrot.com/pete/upside-down-ternet.html it will be released around/after defcon in the new firmware as the power-proxy or named something else but equally similar ;)
  14. final step add a new user, and login via that account instead of root. this page may help explain the process: http://www.howtogeek.com/howto/ubuntu/add-a-user-on-ubuntu-server/
  15. sounds like dumpcap is not in root's PATH sudo su updatedb locate dumpcap that should get you the full path to dumpcap then chmod 4755 <full path to dumpcap>
  16. no42

    Ducky DOA?

    Doesn't sound good. But first try everything here: https://forums.hak5.org/index.php?/topic/28824-faq-frequently-asked-questions/ If re-seating the sdcard, and playing with the black button, doesn't do anything, I advise Hak5's return policy.
  17. http://wiki.wireshark.org/CaptureSetup/CapturePrivileges Wireshark has implemented Privilege Separation which means that the Wireshark GUI (or the tshark CLI) can run as a normal user while the dumpcap capture utility runs as root. This can be achieved by installing dumpcap setuid root. The advantage of this solution is that while dumpcap is run as root the vast majority of Wireshark's code is run as a normal user (where it can do much less damage). the following should do the trick if 'dumpcap' is within the user 'root''s path: sudo su chmod 4755 `which dumpcap` exit
  18. try these links for starters: http://www.openwall.com/passwords/microsoft-word http://www.password-crackers.com/crack/guaword.html http://www.ntechcomm.com/2013/10/crack-microsoft-word-password/
  19. What was the kali source that you used? - live dvd or vm, I worked from the vm-image download. If that makes any difference???
  20. http://wiki.openwrt.org/toh/tp-link/tl-wr703n#hardware.mods
  21. ok failing that : apt-get update apt-get --reinstall install gnuradio-dev cmake git libboost-all-dev libusb-1.0-0 libusb-1.0-0-dev libfftw3-dev swig python-numpy I did have the same error as you? all i did was reinstall some packages and i got it working, can't remember which package exactly maybe it was the gnuradio-dev not the gnuradio?
  22. power requirements here: https://forums.hak5.org/index.php?/topic/31667-answers-to-common-questions/
  23. See this thread for a list of books: Can someone help For Labs (virtualised) as a starter you have DeICEd DVDs, VulnHUB, etc - there are quite a lot out there use google. This site lists a good number of ones available : http://m4g1c5t0rm.blogspot.co.uk/2011/12/pentest-lab-hacker-training.html Courses: I like people to do OSCP (Pentesting with Kali, by Offensive Security), its a good starting point.
  24. Its precompiled with Java 1.7 https://code.google.com/p/ducky-decode/wiki/Encoder_Howto either install java 1.7 (all info is in the link above for OSX), or recompile the program with Java 1.6
  • Create New...