Jump to content

anto0522

Active Members
  • Posts

    6
  • Joined

  • Last visited

Profile Information

  • Gender
    Male

Recent Profile Visitors

450 profile views

anto0522's Achievements

Newbie

Newbie (1/14)

  1. Hi everyone, I recently bought a macbook from Ebay and after having received it I formatted the hard drive to do a clean install of the OS. That's were things got a bit tricky... I can't reinstall the OS since I am prompted for the EFI password every time I attempt to boot from a CD or a bootable usb key. Neither I or the previous owner know the password and Apple wants to charge me a fait bit of money to recover it. I've done some research, and it seems possible to brute force the password which is most likely a 4digits pin code. I decided to use the rubber ducky to create a payload similar to the one Darren uses to hack the pin of an android phone but I haven't had much luck so far. The laptop seems to recognise the ducky as an external keyboard but doesn't type the full pin and only a single digit ends up being typed. I reckon it's pretty much the same problem than this user ran into : https://forums.hak5.org/index.php?/topic/32410-macosx-efi-anyone-have-payload-for-efi-password/ I've done a fair bit of research and it seems that people wanting to bruteforce the EFI password mostly use the teensy development board. I'm pretty sure that the ducky is perfectly capable of doing the same thing and I would like to use this thread to come up with a payload that everyone can use to bruteforce mac EFIs. I have noticed that a few people have already posted on this forum about this issue (see link bellow) but no one has posted a working payload yet. https://forums.hak5.org/index.php?/topic/30800-payload-on-macbook-air2010-2013-help-needed/ This is the non working payload I have been using so far, any help would be greatly appreciated DELAY 5000 STRING 0000 ENTER DELAY 10000 STRING 0001 ENTER DELAY 10000 STRING 0002 ENTER DELAY 10000 ... Useful link. http://www.hackmac.org/forum/topic/1524-efi-pin-bruteforcing/
  2. Hey guys, Do you know when we can expect a fix for the Tor infusion ?
  3. Okk ! That explains it ! :) Thanks for your answer
  4. Hello everyone ! :) So I got my wifi pineapple about two weeks ago and everything seemed to be working fine until now. Today, I wanted to install some new infusions and I noticed that the pineapple bar (Available section) was not loading and when I would click on "show ip" I would just get an error. I restored the pineapple to its factory settings but it didn't fix it. The really strange thing is that clients connected to the pineapple have full access to internet. I also have access to the web interface. Wlan1 is connected to my router and clients are connected on wlan0 Here is my ifconfig ... br-lan Link encap:Ethernet HWaddr 00:13:37:A5:1C:56 inet addr:172.16.42.1 Bcast:172.16.42.255 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:16211 errors:0 dropped:0 overruns:0 frame:0 TX packets:14341 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:2101322 (2.0 MiB) TX bytes:7672823 (7.3 MiB) eth0 Link encap:Ethernet HWaddr 00:13:37:A5:1C:56 UP BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) Interrupt:4 lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:431 errors:0 dropped:0 overruns:0 frame:0 TX packets:431 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:31605 (30.8 KiB) TX bytes:31605 (30.8 KiB) wlan0 Link encap:Ethernet HWaddr 00:13:37:A5:1C:56 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:16214 errors:0 dropped:0 overruns:0 frame:0 TX packets:15042 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:2328504 (2.2 MiB) TX bytes:8183507 (7.8 MiB) wlan1 Link encap:Ethernet HWaddr 00:13:37:93:50:78 inet addr:192.168.2.25 Bcast:192.168.2.255 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:8090 errors:0 dropped:0 overruns:0 frame:0 TX packets:8918 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:4958221 (4.7 MiB) TX bytes:1531170 (1.4 MiB) Thank you in advance for your help !
×
×
  • Create New...