Jump to content


Active Members
  • Content Count

  • Joined

  • Last visited

  • Days Won


1 Follower

About Computer_Security

  • Rank
    Security Connoisseur
  • Birthday 04/20/1969

Profile Information

  • Gender
  • Location
    Take a guess

Recent Profile Visitors

1,882 profile views
  1. @Darren Kitchen Sorry to hear that man. I know the whole community is here for you!
  2. Hmmmm... I am not familiar with any laws surrounding collecting users MAC Addresses but I would suggest that you actually use two raspberry pi zeros instead. They are super cheap and you can probably write a python script to do exactly what you described in an hour.
  3. What firmware version are you on? What wifi pineapple are you using?
  4. Hey looks like the github link leads to a 404 😕
  5. Looks good! I was trying to search for more meaningful bugs but could only find one small one.🤷‍♂️ On line 29 of file "payload.txt" echo "- Can't find mode script" >> $LOG_PATH I am not sure if you did this on purpose but I believe you meant to type: echo "- Can't find $MODE script" >> $LOG_PATH Thanks for sharing your code I really liked it! 👍
  6. I have been poking at an IP camera for a while now, and have found a few cool things but I was wondering if anyone knew of some good youtubers or forums for specifically IOT hacking, I can't seem to find one. Also back to my project, looking at the traffic in Wireshark shows me that the traffic is unencrypted, would there be any way to watch the stream from within Wireshark? Or any other way to collect the packets and just watch the unencrypted stream? Also since the camera is motorized I am able to see the commands sent to the camera. How would I go about crafting and sending my own packets to the device to make it function? (just looking to be pointed in the right direction, not step by step) I'm guessing this would be some type of python package. Also if anyone has any other ideas for me I would love to hear them.
  7. Anytime plugging in my BB into any windows computer a weird message pops up saying that there is an error or something. After a few seconds it goes away and works as normal. Is this due to the boot up phase and something for me not to worry about? Thanks
  8. Thanks, It just seemed odd that it wasn't already an option built in. Seems like a good opportunity to gain serious trust
  9. Weird question I know. But think of it this way nowadays a lot of people understand that they shouldn't connect to open wifi's. Windows even gives you an alert when your about to connect to a "free wifi". As far as i can tell the Nano doesn't have an option to enable a passkey for the open network. If it did and you were in a pen testing scenario you could leave pieces of paper that have the ssid and password on it for people to connect to. I feel like they would feel a lot more secure and even less suspicious. What do you guys think, its just an idea.
  10. Just like the title says, after changing my time zone 100 times it simply won't save. I don't know if this is a bug or not but its just annoying. Also what is the timezone used for with the nano, obviously to know the current time but why would it need to know that? just curious.
  11. I was just wondering the benefits of purchasing a tetra over a mark v. Im guessing updated hardware and updated gui but other than that can you do any different attacks with new radios or other hardware? Also what are the main differences and advantages of having a tetra over a nano? Thanks
  • Create New...