Jump to content

anode

Active Members
  • Posts

    197
  • Joined

  • Last visited

  • Days Won

    3

Everything posted by anode

  1. anode

    WordList

    Another source: https://wiki.skullsecurity.org/index.php?title=Passwords and KoreLogic's site I think has some along with rules. They have run the Crack Me If You Can comps. This looks god too: http://www.netmux.com/blog/cracking-12-character-above-passwords
  2. Might not be the answer, but I'll use a traceroute -m 5 yahoo.com and see what comes back. Lots of times I'll see that i'm a hop or two before I exit, telling me I have 'upper' subnets to explore.
  3. anode

    Help w/ Stego

    Do you know/have the Stego application used? Stego is easily-ish findable, but knowing what/how it was put in,and how and what the encryption (if it was used) to extract the hash. search for stego2john and the like.
  4. A quick plug for No Starch Press. If you buy the paper version of the book, you get a free (DRM free too!) e-book version. (and even if you buy a paper version at a con! Support your local B-Sides!) Love the guys at No Starch Press!
  5. If $75 (US) is your budget: a LAN turtle. Its $50, and gives you a highly tight linux computer to work with. Getting things done on this will vastly improve your chops. (a raspberry Pi *not* running kali to start. Metasploit, the only thing I haven't gotten installed on Raspbian, is not what you need yet) But if just starting out? Command line. (NO mouse, NO GUI) Learn linux/bash, and networking. (setting a gateway, and a DNS isn't learning networking, its bare basics. Proxies, static routes, wpasuplicant, etc. is what you want to understand very well.) I *almost* love bash. I can get just about any system type stuff done. But it typically, involves SED and AWK, and as awesomely powerful they are, they are archaic, convoluted, and beyond confusing. But *need* to be learned at their basic levels. Bash is that annoying loyal friend you need to keep around.
  6. anode

    WordList

    +1 rockyou.txt Hashcat with rules, and a script that stuffs found PW's back into rockyou.txt If you are doing hashcat, learn rules, combiner, and hybrid attacks. Know your target. Straight up dictionary is almost pointless (though local area code phone numbers and rockyou.txt get a *lot* of WiFi PWs in these parts) Crackstaion.txt is all but useless (for a multi GB file), but have gotten a few positives from it. If you look at it, it has a TON of crap. Like full windows path/filenames. Its a bloody mess of junk.
  7. Ok. Building a new hashcat rig. Gonna/Wanna make some custom cables. Typical video cards need a little extra power then the PCI bus can provide, so they put a connector on a corner to run power from the PSU. My question (and prefer people that back up their answers) *why* 3 or 4 separate 12volt and common lines? They *all* go to the same 'rails' inside the PSU, and on the card. Basic electronics states electricity will follow the path of least resistance, thus going over 3 wires vs 1, its going to 'bounce' a bit as the wires heat up and the resistance change from the heat. (running 2 'hot' leads to an outlet to cover the amp draw would *never* pass NEC) My suspected reason is cable flexibility.
  8. So if making a site (simple) from scratch and hard coding it all, what lang to sanitize input for a MySQL database, and general 'glue' for backend stuff? From what I've gathered PHP is way to hard to keep secure overall. Is Python an viable option? Been a decade since I fumbled about with Java (didn't enjoy it at *all*) I'd prefer something established, and not in the possible fad range. Thanks hackers and hackettes
  9. The instructions on the wiki works well for me.
  10. I started looking at this. I Think it possible, but not as simple as a apt-get or git clone. The git is too big to fit on the turtle (and thats without the dependancies ) You have to chop off all the un-needed/wanted features/modules, and tweak the main python a bit I'd think. Though also not to sure how you would trigger the target machine to try to connect to your share.
  11. Basic Windows Defender (or what ever its called now) has flagged *every* MSVenom payload I've thrown at it (no matter the encoding/encryption). AV is starting to flag Veil, Empire, etc, Ben0xA did a talk at this past Derbycon about running powershell on a machine where powershell.exe was removed and even doing it in memory. http://www.irongeek.com/i.php?page=videos/derbycon6/106-powershell-secrets-and-tactics-ben0xa (Plus he's a fun speaker)
  12. Hashcat is my goto. But pixie is milliseconds, if its vulnerable. (gonna poke around a bit, saw something that might lead somewhere. I tossed the Q out there as to not reinvent the wheel if there was something already out there.)
  13. Title kinda says it all, but can you run the PixieDust attack against a pcap/4-way hasndshake file? Or is it strictly WPS based?
  14. Only did a quick skim, but what window stays alive? CMD? If 'exit' doesn't work try/add a ALT-F4
  15. Nice when things work as expected and described huh? I shot my self in the foot applying MK4/5 methods. (I don't change gears well after months away along with being a 'man' and refusing to RTFM)
  16. Which firmware is installed? There is a twin-duck that will be a keyboard *and* a keyboard. There are a few of them (3 I think) *one* of the twin ducks will work ad both on insertion, Others need an event to trigger the keyboard aspect. A stock/basic firmware should 'just run' My suggestion would be: 1) insert, let the windows victim machine stabilize (spouse click away). then hit the button the ducky and see what happens. Also does a new removable device show up and can you see the inject.bin file? 2) have a few other *real* machines to play with? (I've had issues on VMs.) Even an android with a OTG adapter with a hello world script. Does it still show up as a drive? I'd do all this with a basic text editor in focus and a simple hello world script.
  17. Yeah, Hascat can be a bit overwhelming (near infinitely tweakable), but it also does most hashes, not just NTLM variants. I've scripted out Hashcat for my needs nicely with logging
  18. What would be the compelling reason to *buy* L0phtCrack over just using the free open source HachCat? Has anyone done head-to-head comparisons? AMD vs Nvidia?
  19. I believe you just 'cat' the public keyfile (id_rsa.pub) to the authorized_keys file on both ends. Obviously you are putting the AWS pub key on the turtle and the turtle's public key on the AWS server. I haven't played with AWS, so I might be talking out my poop-hole.
  20. For which OS? Linking to a 'text' file that is a php file as your first post to a 'hacking' site is a bit dubious. We typically post the actual code here, not blind links.
  21. Looking to install some python modules for a project. pip is not there. Tried a workaround that seemed have failed. So what are my options? And can I get a list of python modules available for the Turtle ahead of time? (to avoid wasting time)
  22. Run encoder from a command line and you will see the error that need to be addressed. java -jar encoder.jar -i <textfilename> -o inject.bin
  23. /etc/config/dhcp: config odhcpd 'odhcpd' option maindhcp '1' option leasefile '/tmp/hosts/odhcpd' option leasetrigger '/usr/sbin/odhcpd-update' make sure option maindhcp '1' is set to 1 and not 0 this worked for me
  24. Found it !!!! in /etc/config/dhcp at the bottom config odhcpd 'odhcpd' option maindhcp '1' option leasefile '/tmp/hosts/odhcpd' option leasetrigger '/usr/sbin/odhcpd-update' option maindhcp '1' was set to '0' putting it to 1 fixed the prob. woohoo!
×
×
  • Create New...