Jump to content

sierrabrav0

Active Members
  • Posts

    12
  • Joined

  • Last visited

Profile Information

  • Gender
    Male
  • Location
    Quebec, Canada

Recent Profile Visitors

740 profile views

sierrabrav0's Achievements

Newbie

Newbie (1/14)

  1. I guess it would be cool if you can connect your Raspberry Pi and the Pineapple with a small ethernet cord and acess remotely the Raspberry PI with SSH or even with your favorite VNC client on your mobile phone or your tablet.
  2. PwnPi 3.0 "PwnPi is a Linux-based penetration testing dropbox distribution for the Raspberry Pi. It currently has 200+ network security tools pre-installed to aid the penetration tester. It is built a stripped down version of the Debian Wheezy image from the Raspberry Pi foundation's website and uses Openbox as the window manager. PwnPi can be easily setup to send reverse connections from inside a target network by editing a simple configuration file". http://pwnpi.sourceforge.net/
  3. Prey Anti Theft: Track & find stolen Phones, Tablets and Laptops. It's lightweight, open source software that gives you full and remote control, 24/7. http://preyproject.com/
  4. https://www.youtube.com/watch?v=X7McMB_Gbj8 I'v tried it on my Galaxy Nexus and it worked 1# Boot the phone in booloader mode 2# Flash the recovery partition with fastboot and the ClockWorkMod Recovery image fastboot flash recovery recovery.img 3# Boot in recovery mode 4# Mount the /system and /data partitions 5# In the terminal start ADB Shell > adb shell > cd /data/system > rm *.key > touch gesture.key > touch password.key 6# Reboot the phone and you can now unlock the phone without any password or with any pattern. > reboot
  5. I also suggest you to use this addon https://www.requestpolicy.com
  6. People can also download an active torrent with few seeders here. https://code.google.com/p/distributed-wpa-cracking/downloads/detail?name=wpa_psk-h1kari_renderman.torrent
  7. The thing is that the Bluetooth Device Address BD_ADDR isn't 100% secure because it could be easily spoof.
  8. "The first is a Gnome applet called BlueProximity that automatically locks and unlocks the system based on how far away a Bluetooth device is. The second is a bluetooth Pluggable Authentication Module (PAM) for authentication based on the presence of a Bluetooth device. The result of using both is that I can now log-in and automatically have the screen lock/unlock (and run other commands) based on the presence of my mobile phone. Seeing as it is usually in my pocket this means if I walk away from the PC I don't need to remember to manually lock the screen." http://tjworld.net/wiki/Linux/Ubuntu/BluetoothLoginAndLocking
  9. Instead of trying to redirect your ex-girlfriend on to a phishing page you could try to do a MITM attack using session cookies hijacking with SSL STRIP or HAMSTER&FERRET Please Don't do anything evil / try it in your lab for POC purpose and not against innocent people.
  10. http://www.sans.org/reading_room/whitepapers/covert/inside-out-vulnerabilities-reverse-shells_1663
  11. I agree, you could also use the DNS port 53 if I'm not mistaken. The disadvantage with the port 53 is it will likely trigger the IDS but I guess it could work on home network.
×
×
  • Create New...