Jump to content

bigthinker

Active Members
  • Posts

    37
  • Joined

  • Last visited

Posts posted by bigthinker

  1. First LOIC is backdoored and contains a virus. Second it is very traceable. Third most big companys allready have a backup rout incase you dos/ddos them. dos/ddos is pointless anyways IMHO.

    bleh, thats the risk you take when using pretty much anything.

    thejester claims to of developed the new tool xerxes, if your wanting to learn about DOS/DDOS you may want to google that. There are tons of tutorials around the net teaching you about it.

  2. I was reading a thread about a user who was using kali installed on the pi paired up with the mark v and thought of an idea. Kali is really overkill for the pi and mark v, a better solution would be just pairing the mark v with an actual computer running kali that has enough power to effectively run what you want to do .... BUT

    a custom linux distro built specifically to be placed on the pi and to be ran with the Mark V ....

  3. http://hak5.org/store/the-interceptor

    Wasn't the interceptor just a way to capture traffic while preforming a MITM

    shouldn't this be very easy to achieve with the pineapple? did the original interceptor only offer remittance of the captured data via vpn or wifi and no storage for later retrieval?

    im having a hard time getting what this device did .. it looks like it was only a wifi tap, no eth like the star tap or whatever they call it?

    did the device use jasager to trick the device into connecting to the "home" network?

  4. im wanting to use my just as a wireless card while using another usb wireless card. Since its over ethernet my connection doesnt really work right.

    Im trying to use one as my connection, and the usb wifi card in monitor mode but network manager keeps kicking me into one or the other.

  5. maybe it is just me, but with the mk4, I used the AP on many different computers and was constantly having to chase down the internet setup script ... wp4.sh or whatever

    did anyone else have this headache? Seems like having the ability to have this script readily available or easily downloadable from the wp5 would be nice.

  6. @Darren

    out of interest, can you confirm why the installation of the original firmware occurs in the users possession and not preflashed prior to purchase. My original assumption is maybe something legal, or maybe because the manufacture would charge a fee for this installation wich would drive the cost higher? either way im interested to know why.

    • Power: DC in Variable 5-12v, ~1A, 5.5mm*2.1mm connector, International Power Supply

    Certainly appears to!

    telot

    are you saying it supports POE because of the listed DC in? at 5-12 volts and POE supporting 25w give or take then it "should" work, did i follow you correctly there?

  7. @darren

    could you see doing some tutorials on metasploit with the mk5 in the future or is that past the scope or depth of the show for the audience? I'm pretty good with metasploit but its so indepth/complex/big there is something always new to learn and seeing how mk5 and metasploit can play together would be nice.

  8. with the inclusion of the sd card for expanded memory, can anyone comment on the likelyhood of getting metasploit running on the mk5, and if it would be worth your time. If im not mistaken it's running open wrt, i dont see any pre-made packages but I know it can be done. I might be interested in playing around with this (getting it running). Has anyone played around with this?

    http://jollyblog.squarespace.com/updates/2006/5/19/metasploit-openwrt.html

    http://hackaday.com/2006/05/19/metasploit-running-on-a-wrt/

  9. westy 12 @leevai? Thats the beer of all beers, it litterly doesnt get any better than that. Worlds best ranked beers, and most interesting If you can find it. Belguim beer, brewed by monks, that have only shipped a small batch to the US once to pay for a new part of their church.

    I drink the trappist 10 on occasion.

    I agree, darren should try a westy.

    http://beeradvocate.com/beer/profile/313/1545

    http://www.npr.org/blogs/thesalt/2012/12/12/166987378/a-sign-from-above-needing-new-roof-monks-sell-rare-beer-in-u-s

    http://www.beerboxx.com/trappist-westvleteren-12-33cl.html

  10. device that allows you to create dns redirects, facilitate mitm, and sniff login creds doesnt allow you to share phishing pages. odd

    While I can understand the stance and the reason why (legality, public perception worries when the site is dependent on hardware sales and advertisment/sponsorship), it is an odd place for a hacker friendly site to be in. As hackers, we stand for common principles, one of which is the free flow of information regardless of the skill factor, political nature, public perception, and to some even legality.

    Let us remember that legal concerns are temporal, dependent on location, and are subject to change with short notice. And remember, when we say NO DOGS Allowed, they are really just saying not allowed here.

    one must ask themself, if we cant create or share phishing pages what else cant we do. What other features of the pineapple could be heald back ... in the internet world censorship isn't well liked.

  11. That's exactly what I was saying. I'm sure updates are in the works. I however didn't put in that link to pwnieexpress. Don't know why you added that.

    I think my link to the product is being deleted by a moderator. Not sure why.

    sorry, im posting from a mobile device so I must of posted the link in your quoted text in error.

    What i was saying is, devices already exist that are what I would consider "hack in the box". For example the pwn plug r2.

    http://pwnieexpress.com/products/pwn-plug-r2

    now, this device cost's a heck of a lot more, but ... check out what all it can do.

×
×
  • Create New...