Jump to content

Forgiven

Active Members
  • Posts

    59
  • Joined

  • Last visited

Recent Profile Visitors

3,031 profile views

Forgiven's Achievements

Newbie

Newbie (1/14)

  1. Yeah, I posted about this a long time ago. https://forums.hak5.org/topic/30273-hack-a-sandisk-32g-wifi-enabled-flash-drive/ A new poster was able to brute force into it: https://forums.hak5.org/topic/41977-sandisk-connect-32gb-wireless-media-drive-root/
  2. https://forums.hak5.org/topic/30273-hack-a-sandisk-32g-wifi-enabled-flash-drive/
  3. Yes I wrote the original post on trying to hack the Sandisk Connect to make an Evil AP or for other giggles. Nice job. The post has long since fallen off search. I found it like on page 5 or 6.
  4. I have a Mark V, the original box, I'd be consider parting with for that price.
  5. The youtube video showing how to flash uses WinSCP and Putty. Isn't there some terminal kungfu that can allow me to load my /desktop/upgrade.bin onto that bugger directly? I'm not sure what file to transfer the upgrade.bin into and quite frankly I'm an SSH idiot. Some scripts for this would be dandy. Note...v1.0.0 doesn't do firmware upload online :(
  6. Hi, Does anyone know how long it takes to get a Keybase account? Anybody have any invites they'd like to spread around?
  7. The best place for your question above is in the Rubber Ducky forum.
  8. I was an original K k starter supporter. I have a Nexus 7 running Kali Net Hunter. Anywho I see on the website for Net Hunter that it appears to be ready to roll for the HackRF. It's not. I have loaded the libhackrf and hackrf_info now sees my device, but I can't get startx to run. I'm thinking my gnuradio-companion is not properly installed. Anyone have this running properly in Net Hunter that can share how to get rolling? Updated to add: apt-cache show hackrf-tools gave a description of the tools as a "transitional dummy package." Error I get: root@kali:~# gnuradio-companion /usr/lib/python2.7/dist-packages/gtk-2.0/gtk/__init__.py:57: GtkWarning: could not open display warnings.warn(str(e), _gtk.Warning) /usr/lib/python2.7/dist-packages/gnuradio/grc/gui/Actions.py:30: GtkWarning: IA__gdk_keymap_get_for_display: assertion `GDK_IS_DISPLAY (display)' failed _keymap = gtk.gdk.keymap_get_default() /usr/lib/python2.7/dist-packages/gnuradio/grc/gui/Colors.py:24: GtkWarning: IA__gdk_screen_get_system_colormap: assertion `GDK_IS_SCREEN (screen)' failed _COLORMAP = gtk.gdk.colormap_get_system() #create all of the colors Traceback (most recent call last): File "/usr/bin/gnuradio-companion", line 67, in <module> from gnuradio.grc.python.Platform import Platform File "/usr/lib/python2.7/dist-packages/gnuradio/grc/python/Platform.py", line 24, in <module> from FlowGraph import FlowGraph as _FlowGraph File "/usr/lib/python2.7/dist-packages/gnuradio/grc/python/FlowGraph.py", line 22, in <module> from .. gui.FlowGraph import FlowGraph as _GUIFlowGraph File "/usr/lib/python2.7/dist-packages/gnuradio/grc/gui/FlowGraph.py", line 22, in <module> import Colors File "/usr/lib/python2.7/dist-packages/gnuradio/grc/gui/Colors.py", line 27, in <module> HIGHLIGHT_COLOR = get_color('#00FFFF') File "/usr/lib/python2.7/dist-packages/gnuradio/grc/gui/Colors.py", line 25, in get_color def get_color(color_code): return _COLORMAP.alloc_color(color_code, True, True) AttributeError: 'NoneType' object has no attribute 'alloc_color' root@kali:~#
  9. Seems like devilsclaw has been making some good progress on this hack. I'm inspired to head back in!
  10. Darren, I certainly can appreciate not wanting to reinvent the wheel and know that a small team has limits on activities. My thoughts were geared more towards the community of contributors. The Wired article describes a recently reported wild variant of heartbleed: Snippet follows "On Thursday, the OpenSSL Foundation published an advisory warning to users to update their SSL yet again, this time to fix a previously unknown but more than decade-old bug in the software that allows any network eavesdropper to strip away its encryption. The non-profit foundation, whose encryption is used by the majority of the Web’s SSL servers, issued a patch and advised sites that use its software to upgrade immediately. The new attack, found by Japanese researcher Masashi Kikuchi, takes advantage of a portion of OpenSSL’s “handshake” for establishing encrypted connections known as ChangeCipherSpec, allowing the attacker to force the PC and server performing the handshake to use weak keys that allows a “man-in-the-middle” snoop to decrypt and read the traffic. “This vulnerability allows malicious intermediate nodes to intercept encrypted data and decrypt them while forcing SSL clients to use weak keys which are exposed to the malicious nodes,” reads an FAQ published by Kikuchi’s employer, the software firm Lepidum. Ashkan Soltani, a privacy researcher who has been involved in analyzing the Snowden NSA leaks for the NSA and closely tracked SSL’s woes, offers this translation: “Basically, as you and I are establishing a secure connection, an attacker injects a command that fools us to thinking we’re using a ‘private’ password whereas we’re actually using a public one.”" It almost seems like a side-door....
  11. Boy this would be a creepy exploit to deploy on the Mark V as an infusion. Heartbleed Redux from Wired.
  12. The only thing I had to modify with the rsync method was type in sudo before your script. THANKS A TON. It worked great.
×
×
  • Create New...