Jump to content

S3V3N

Active Members
  • Posts

    36
  • Joined

  • Last visited

Everything posted by S3V3N

  1. I am having an issue finding the latest firmware files... Please post the latest files.
  2. Has anyone used Fram modules instead of the Micro SD card for payload storage in their Rubber Ducky or Peensy??
  3. That is pretty sexy!! But Damn its expensive..
  4. A good payload would be to have a reliable persistent meterpreter payload with switches for multiple OS's. all stored internal to the Teensy 3.1. no need to download files immediately, do it later... :)
  5. Good points, Good points. I will look up grugq, I am always interested in learning more. I am not hiding from anything, just on a journey to educate myself in the proper ways of making this happen and putting it to proper use. Personally, if I were to go to these extremes, I would have a dedicated PC to isolate everything with. I also found another post that takes this all to the extreme. https://www.ivpn.net/privacy-guides/advanced-privacy-and-anonymity-part-1 Interesting reading.. s3v3n
  6. Ok, I have heard of the Dread Pirate Roberts, but he was caught basically because he relied entirely (from what I have read) on Tor to keep his anonymity, but one of the agencies found an exploit in the exit parameters from the Tor node from what I recall.
  7. I will look into Dread Pirate Roberts, I guess I am a noobie as I can't recall hearing that one. But as to lulz/Anonymous, they got sloppy and left meta data in their video posts, which was a big surprise to me that they overlooked that. But regardless. As to the proxychains Linux app, you can chain multiple proxies together, and your data hops from proxy to proxy. The biggest advantage is obviously to the agencies with endless funds or no budgets limits at all. I can concede this as a fact, if they want you, they will "probably" get you but I wouldn't want to make it easy on them. :) there's no money involved here, so no trails there, no partners, so no leaks there... Just trying to cover my basis and know what I am doing, and how to make it all work.
  8. I am not doing these "types" of things, but if I were, I wouldn't want to get caught. But truly it is for my education only. I want to know more about being untraceable (as possible) online regardless of who might be looking.
  9. I have a decent VPN I use to block my ISP, but if I want no traces of what I am doing tracing back to me, then a VPN won't really be enough, as VPN's can be theoretically hacked by the agencies hence the proxychains in countries that don't work with other countries. I don't want anyone with out having to spend many many many hours and lots of money.. Being able to trace back to me. (I know this makes me seem either really paranoid or up to no good)
  10. My thoughts on using multi-VPN's is because I have heard rumors of certain agencies piercing VPN's
  11. The point for me using a VPN, is mainly to hide what I am doing from my ISP. Proxychains is for not allowing my location to be discovered. (Yes I realize that certain Socks5 proxies are needed) but I want a way to make 100% of the traffic route out of the VM through the VPN (so I suppose running the VPN on the VM would not leave any traces of what I am doing on the host PC)
  12. I have also read of some ppl using Tails or the like, but most of them use Tor, which I would prefer not to if possible.
  13. as for the VPS, I have heard of ppl setting up free anon VPS as proxychains hop spots and VPN'ing to these boxes randomly. Any thoughts??
  14. To be honest, I know Tor has been cracked, and I know that not all VPN's can be trusted not to keep logs. I could also use a multi-hop VPN instead of using two, but I don't know of any "Free" reliable VPNs. And Proxychains is a given. Buy I haven't been able to figure out how to run 100% of the traffic from the VM (TCP/UDP and DNS) to the HOST VPN regardless of what connection I might be using (Wifi, 3G/4G or hardwire). Any suggestions?? Obviously this needs to be as transparent as possible. Automatic if possible
  15. Ok, so here is what I want to accomplish... - Run Debian Linux in a VM, routing 100% of traffic (TCP/UDP/DNS) through Proxychains/VPN1 - Run Ubuntu Linux as the Host routing 100% of traffic (VM Traffic + All TCP/UDP/DNS) through VPN2 - If required to increase Anonymity, hop through anonymous VPS running proxychains as well So, it will look like this; VM (Proxychains thru VPN1) --> HOST (VPN2) --> (possible Anon VPS) Please explain how to set this up, and how to test it is working correctly.. ;) Thanks!!
  16. You could also just use a nexus 7 2012 version. Download the free pwnpad firmware that will include all the software that is needed. But good project!! ($200 for the Pwnpad, but will include screen, processor and a touchscreen interface)
  17. Part Number for iPhone up to 4S: MC531ZM Part Number for iPhone 5: MD821ZM
  18. the adapter that will work for the iPhone is called the Apple Camera adapter. I have a few apple devices, and it works for all of them. I have yet to try the iPhone5 yet though as this requires the new camera adapter. Now we just need to get the timing/code corrected as the iPhone is a bit different than the Android. Awesome Work!! Keep it up Darren!!
  19. b00stfr3ak, can you post some instructions on how to properly edit the files and what info is needed to get all of the options setup and running correctly?? Greatly Appreciated, Keep up the AWESOME Work!!
  20. Is it possible to have a sub menu option to set the Meterpreter IP's on the fly (as I use a Multi-hop VPN and my Metasploit IP can change), also add an option to drop a file to load a new Meterpreter into memory at boot up.
  21. OK, on this premise, this will work, but will need to be tweaked a little. Payload delivery : Check (Assuming that it can be modified for Linux/Windows/Mac OSX as Well as Windows Mobile, Android and iOS) I have seen some mention of People wanting a way to connect through VPN. This process will need a means to Spoof Mac Address of the Pineapple, Connect through VPN and Use the Clear WiMax Modem. I would like to create an infusion to tie this all together. is anyone interested in working on this?? presently I am having some issues with getting evilPortal working with the new firmware.
  22. Hello all, I am a bit new to the Wi-Pi scene. I would like to accomplish something with the pineapple, so I am hoping you may be able to point me in the right direction. I want to be able to have people associate with the pineapple on an existing network that I have the credentials for. I would be essentially cloning the pineapple to their SSID so that devices that attempt to automatically login to this network will associate with the Pineapple. When they do they will be posted with an html page hosted on the pineapple that meets their requested page stating that they need to agree with update terms or something like this. when they do, they are wirelessly sent a payload to establish a meterpreter/reverse shell connection back to a machine running Metasploit. The payload will be stored on a removable usb Flash drive. all Macs will be spoofed, and the internet connectivity will need VPN and be routed through a Clear USB Wi-Max modem. I would like to create an infusion to interface and accomplish everything through one interface if possible. looking for someone to help me get this working, anyone interested?? Thanks!!
  23. Yes it did, I appreciate your help!! I am going to start another post with a senario I would like to create, maybe you could take a look and let me know if this is possible. Thanks
×
×
  • Create New...