Jump to content

Sildaekar

Active Members
  • Posts

    135
  • Joined

  • Last visited

  • Days Won

    3

About Sildaekar

  • Birthday 03/20/1990

Contact Methods

  • Website URL
    http://rejectedfreaks.net/

Profile Information

  • Gender
    Male
  • Location
    Brewton, AL
  • Interests
    Electronics, Coding, Scripting, conquering the galaxy for the empire....ya know....normal stuff.

Recent Profile Visitors

2,038 profile views

Sildaekar's Achievements

Newbie

Newbie (1/14)

  1. https://github.com/midnitesnake/USB-Rubber-Ducky/tree/master/Firmware
  2. I'm jealous, any idea when they're gonna start selling to people other than backers?
  3. We can't help you if we don't know what issues you're having, what you've tried, what errors you are getting, etc etc etc. Also please don't make two topics for the same thing.
  4. This has been discussed many times, please search these forums or google for hsts
  5. LMFAO! Wow, this is priceless.
  6. http://dangerousprototypes.com/docs/Bus_Pirate
  7. From what I've read, this error can be ignored as it does not effect the core functionality of SSLStrip
  8. What software are you using for the honeypot? The best place to start would probably be performing an Nmap scan.
  9. What you're looking for is persistence, take a look at this topic that I started. https://forums.hak5.org/index.php?/topic/35977-meterpreter-auto-run-commands-on-session/#entry262493 This way it will automatically run predefined commands as soon as you get access to the box whether you are there or not, and when you come back if they reboot their machine you'll (hopefully) already have persistence and connect as soon as the machine comes back online.
  10. The routers at Langley Airforce Base in Virginia are fun to mess with.....ummm.....I mean I would think they are....yeah that's it....lol But on a serious note, I just use whatever I can get my hands on...usually a friend's network or something b/c like I said elsewhere....I'm cheap lol. But since all routers usually operate the same way, I would probably just get the cheapest one I could find from a pawn shop or something to play around with. I haven't looked at the one you mentioned but I will check it out, I need to set up a dedicated lab here soon for playing with and learning the metasploit framework.
  11. Well, I think for the most part we've got it figured out, or at least have a pretty good idea of what it is...may as well release the details and specs lol
  12. True true, I see nothing that would hint to wifi being there...plus a turtle is a LANd animal :-) not something in the air...I think it's going tobe strictly ethernet. A "plug and shell" type tool.
  13. Not really a lot to look through. For everyone else that's interested: https://github.com/d8tahead/lanturtle-wiki
  14. Just thought I'd throw this on here, was browsing through kickstarter and happened to find a VHF/UHF Shield in the makes for Arduino. It's supposed to work with data and voice in the following ranges: 134-174 MHz 200-260 MHz 400-520 MHz Not sure if it's full duplex or not, but by the looks of it I would have to assume only half-duplex. Either way, for $100 USD doesn't sound like a bad deal. https://www.kickstarter.com/projects/749835103/hamshield-for-arduino-vhf-uhf-transceiver
  15. I would recommend wireshark. While Zara is right that it can be very complicated, it is a lot easier on the eyes than ettercap, especially the way it organizes and color-codes the packets. The best advice that I can give is google and youtube. Just like google, youtube has pretty much everything.
×
×
  • Create New...