Jump to content

THCMinister

Active Members
  • Content Count

    256
  • Joined

  • Last visited

  • Days Won

    1

About THCMinister

  • Rank
    Hak5 Pirate

Profile Information

  • Gender
    Male

Recent Profile Visitors

2,284 profile views
  1. More information would be needed. Is it a weblogin, user account, etc? The basics are very quite simple, Create an array of passwords(preferably from a file/db), create loop to try each array item, validate iteration, profit.
  2. Why not create a guest account on the laptop with no password. When that account logs in, have it run the scripts to do what you want. Thieves are more than likely to take the path of least resistance. If they can log in and connect it to the internet, they'll use it. all others will factory reset/wipe if they can't get in. Limit the the rights on the account. Install and configure remote monitoring software. I use a very similar thing on my son's PC with a reverse meterpreter shell/custom scripts and tools.
  3. This seems like a good start. https://nuxview.blogspot.com/2016/11/poisontap-setting-up-backend.html?m=1
  4. I will definitely put these scripts on here at some point, been pretty hectic in my life offline. Plus the bash bunny just dropped... It is mainly looking at probe requests and having them output to a log. another script reads the log and alerts me via the pushover.net api. You can do this just as easily from the wifi pineapple. I also have it tailored to alert when they connect to my network.
  5. The crazy thing is, I actually do this at home to detect when my in-laws and such are close by as I don't live far from them. I'm using a Pi3 running kali with some custom scripts I have. Depending on the mac showing up, I have different actions set to happen.
×
×
  • Create New...