Jump to content

zoro25

Active Members
  • Content Count

    79
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by zoro25

  1. @nest are there plans to link facial recognition to https://t.co/hEW9dj8Cuz it seems backward that I have to relink… https://t.co/nRpvfOP2NQ

  2. A Krack module would be nice - - - -just putting it out there
  3. Yes it seems that there is a bug on the latest firmware where tools are not being installed, I'll attempt the same recovery method to get this working. In my case I had responder installed but I removed it and after no tools will install :-(
  4. This is nice, it would be great if @Darren Kitchen or someone on the Hak5 team could do a video of how to config and use something like this. Put their main tools , PineApple , BashBunny, Ducky, Squirrel together to make a full-on Pentest Rig. A lot of us have all these tools but don't use them together in one set up as you've done.
  5. http://newosxbook.com/liberios/ - and Link to Morpheus who did the hack https://twitter.com/Morpheus______ This was released 2 days ago and works with all IOS 11 devices, However Cydia hasn't been updated to work with IOS 11 so any tweaks or sideloading of apps may not work just yet, but with this you can easily get SSH access into the device and play with binaries and command utilities you may want. I suggest using a spare device for any type of ARM/IOS hacking. Also expect this to be patched very soon.
  6. @firt @kickstarter @elonmusk Been there and had the same thing happen, @kickstarter won't do anything, In my case,… https://t.co/wtR4kI6fKI

  7. As a person who worked on one of the most popular IOS and Android apps (tens of millions of users on both platforms) I can confirm that both Google and Apple check updates especially if any update requires extra user permissions If no extra permissions are requested then once approved (and it will certainly be checked before being allowed in their app stores) they will just do random checks on the app. Any IOS/Android exploits are too valuable to be out in the wild, the going rate for an IOS current version hack is $1,000,000 and there was one shown just a few weeks ago (it won't be released) see https://keen-lab.com/jailbreak/11.1/ for current IOS firmware hack that will be sold to highest bidder. Team Keen has said that they will release the hack but my guess is that it's already been sold and will be released publically at the same time as a new IOS upgrade release. This happens a lot and either exploit vendors/ antivirus companies and software company consortiums who get together and purchase a lot of the zero days in an effort to help better protect their users and the original researcher will release the zero-day on the day of the patch release (the same thing happened with the Krack exploit)
  8. If you really are interested then I would recommend this book http://zygosec.com/Products by Billy Ellis. He also has a decent youtube channel where he walks through the latest exploits with tips and tricks for reverse engineering Arm based software. https://www.youtube.com/user/pr0Hacks2014/videos
  9. It's been shown that the same Israeli company (Cellebrite I think their name is) that helped the FBI to bypass the IOS security on the San Bernadino shooters phone can also bypass later firmware as well. Also, their CEO claims they can also bypass the current firmware (however have stated that they won't give any details or show that hack working as it's only for their 3 letter agency type customers). My guess is that there are a large number of zero days for IOS which are floating around but only released to top paying bidders.
  10. there will be a new firmware release for the PineApples within the next 4 days or so, I would wait and give that a try to see if it fixes your issues, if not then it seems that a return/replacement unit may be needed.
  11. While I've not done this on the pineapple, only on websites I've tested. My advice would be to take a look at RFD attacks (Reflected File Download attacks). It should be possible to set up a vulnerable page/site using EvilPortal or something similar on the pineapple and then your link should auto-download and run shell commands on the users device. (works on both win and nix but I've only tested against windows users) I'm not going to walk you through the whole attack but it's easy to do and requires little to no input from a user (it's also possible to bypass all browser security warnings also) Here is a very good walkthrough by Oren Hafif who now works for FaceBook security I think. FACEBOOK RFD ATTACKS Good luck. PS this would make an awesome module (hint hint @Foxtrot and would give easy total pwnage to the pineapple devices)
  12. @CrookdHillary @MatthewKick No idea where you get your 0-6months as Cornell law , https://t.co/tPgUmFHu6X states 5 years max

  13. @testertested Never feel bad about screwing up, we all that (in one way or another). The fact that you realized it… https://t.co/syGpmMyjPX

  14. Okay Alexa install the PineApple skill. or Hey Google run the KrackAttack again SSID Comcast123 Who needs shell commands or the terminal anymore when we have digital assistants :-)
  15. Sorry to be a bit of a dick, but can you clarify "short order", Are we talking days, weeks, months? I understand that new bugs pop up that needs to be fixed as newer features are added but I'm guessing there is some internal date that could be given (feel free to pad the date with extra time to fix the unknown - unknowns)
  16. @Bonsaiuser Just to let you know that @Sebkinne is supposed to be working on a module for this (or maybe a newer firmware). Feel free to make your own but you might want to reach out to him first.
  17. @mattbarcomb I've worked at 3 companies where this is encouraged @CPM__UK @Microsoft & @Skype, 1 of the 54 likes th… https://t.co/2S6ycD1qvk

  18. I didn't read it as a worm but to attack machines attached to a switch, (let's say 8 devices) As previously mentioned it's going to be hard as it sounds like he's looking for persistence. Those 8 machines could be any OS/IOT devices so yes you can MITM them to grab credentials etc, but getting persistent access is going to be hard as this usually means exploiting some kind of bug in the underlying OS or software running on the device. (see the earlier reply from PoSHMagiC0de) I think you should instead be looking at how to exploit 1 device on the switch with high certainty using the squirrel and then you need to know/learn how to pivot from there to gain further access to other devices. This is how most engagements work. People never really start with owning the network, but find a weak point (phishing etc) and pivot from there.
  19. Does anyone know anything about that "Friday thing" mentioned in today's Hak5 video? or what I'm guessing is a new PineApple firmware release or at least a new Krack module ****EDIT**** (after watching it back it seems that the Friday thing may have been last weeks Packet Squirrel announcement, I watched the recorded streams but didn't see anything new pineapple or Krack related)
  20. @smartthings @nvidiashield Thanks for the clarification

  21. @Random_Robbie Good work ,

  22. All the ones I mentioned could all be BS domains :-) The Squirrel is the only one we know is real.
  23. See my post here about other possible items, While nothing is confirmed by the team, these are registered by Darren. However, it should be noted that only the PacketSquirrel.com domain has any content. The others all give errors. Also even if those were the names of new tools, a name still gives us nothing about how the tool carries out its attack or what it can do to aid pivoting. Except maybe the way it connects for example USBLadyBug = USB device attack meaning physical access to device under test will be needed ScreenCrab = No idea on attack style but it seems like it could be a remote screen grabbing tool (I've no idea how this could work if it was that) USBBoomStick = again USB in name so suppose another tool needing physical access Only about 2 days to go
  24. Darren confirmed that 3 devices are going to be released on Friday. - Packet Squirrel just seems to be one of them (unless there are 2 versions of the squirrel - like the Nano and Tetra are 2 versions of the same tool). Anyway looking forward. Still no pre-order, Seems I'm going to have to be okay with ordering on the unveiling, just hope the team can ship quickly. (otherwise, I can always play when I get back from my trip)
×
×
  • Create New...