Jump to content

Computer_Security

Active Members
  • Content Count

    179
  • Joined

  • Last visited

  • Days Won

    2

1 Follower

About Computer_Security

  • Rank
    Security Connoisseur
  • Birthday 04/20/1969

Profile Information

  • Gender
    Male
  • Location
    Take a guess

Recent Profile Visitors

1,779 profile views
  1. Fair point. Even the ones outside of the USA?
  2. Sounds like you have a DNS problem on your hands. See how your network adapter is configured and if you want to statically assign a DNS server I suggest 1.1.1.1
  3. @Darren Kitchen Sorry to hear that man. I know the whole community is here for you!
  4. Just curious why a security-driven community would block tor exit-nodes from accessing the forum?
  5. Hmmmm... I am not familiar with any laws surrounding collecting users MAC Addresses but I would suggest that you actually use two raspberry pi zeros instead. They are super cheap and you can probably write a python script to do exactly what you described in an hour.
  6. What firmware version are you on? What wifi pineapple are you using?
  7. Hey looks like the github link leads to a 404 😕
  8. Looks good! I was trying to search for more meaningful bugs but could only find one small one.🤷‍♂️ On line 29 of file "payload.txt" echo "- Can't find mode script" >> $LOG_PATH I am not sure if you did this on purpose but I believe you meant to type: echo "- Can't find $MODE script" >> $LOG_PATH Thanks for sharing your code I really liked it! 👍
  9. I don't know if anyone is familiar with this exploit framework but I have recently been messing around with it. I have a device on my network that has a vulnerable FTP with default creds. When I use the framework it is fine but once it "finds" the credentials it never displays them to the user. Anyone else have the same issue or know any fix? rsf (FTP Default Creds) > run [*] Running module... [*] Starting attack against FTP service [*] thread-0 thread is starting... [*] thread-1 thread is starting... [*] thread-2 thread is starting... [*] thread-3 thread is starting... [*] thread-4 thread is starting... [*] thread-5 thread is starting... [*] thread-6 thread is starting... [*] thread-7 thread is starting... [*] thread-0 thread is terminated. [*] thread-1 thread is terminated. [*] thread-2 thread is terminated. [*] thread-3 thread is terminated. [*] thread-4 thread is terminated. [*] thread-5 thread is terminated. [*] thread-6 thread is terminated. [*] thread-7 thread is terminated. [*] Elapsed time: 5.070053577423096 seconds [+] Credentials found!
  10. I have been poking at an IP camera for a while now, and have found a few cool things but I was wondering if anyone knew of some good youtubers or forums for specifically IOT hacking, I can't seem to find one. Also back to my project, looking at the traffic in Wireshark shows me that the traffic is unencrypted, would there be any way to watch the stream from within Wireshark? Or any other way to collect the packets and just watch the unencrypted stream? Also since the camera is motorized I am able to see the commands sent to the camera. How would I go about crafting and sending my own packets to the device to make it function? (just looking to be pointed in the right direction, not step by step) I'm guessing this would be some type of python package. Also if anyone has any other ideas for me I would love to hear them.
  11. Anytime plugging in my BB into any windows computer a weird message pops up saying that there is an error or something. After a few seconds it goes away and works as normal. Is this due to the boot up phase and something for me not to worry about? Thanks
  12. Thanks, It just seemed odd that it wasn't already an option built in. Seems like a good opportunity to gain serious trust
×
×
  • Create New...