Jump to content

Broti

Active Members
  • Posts

    233
  • Joined

  • Last visited

  • Days Won

    6

Posts posted by Broti

  1. 52 minutes ago, Dave-ee Jones said:

    What phone are you using? OTG cable and USB to Micro suggest a phone, probably with an external MicroSD slot?

    Why do you randomly carry around a guitar pick? 

    Phone: Samsung Galaxy S2 (yeah I know, not the latest model ;) )

    About the pick: It comes quite in handy to open casings, especially when you don't have long fingernails.

  2. I'm currently rebuilding my EDC kit and I'm open to suggestions.

    Content so far:

    Thumb drives

    1. SanDisk Cruzer Blade 16GB: Portable Apps + Sysinternals Suite + Other tools
    2. 3x SanDisk Cruzer Slide 32GB (empty)

    Gadgets

    1. USB Rubber Ducky (standard firmware)
    2. LAN Tap Pro
    3. USB MicroSD card reader
    4. Plectrum
    5. 3.5mm audio jack

    Adapters

    1. USB to MicroUSB
    2. Data Blocker: USB, MicroUSB, Lightning
    3. Watson MicroSD HC

    Cables

    1. kos-OTG
    2. Cat5 Loopback
  3. LiveOverflow? Doesn't ring a bell here.

    Of course I meant legit keygens, hence the mentions of CrackMes. If anyone wants a keygen for <insert product here> he or she is looking in the wrong place.

    What about obsolete algorithms like DES or even more vintage stuff like ENIGMA or Playfair?

  4. 2 hours ago, PoSHMagiC0de said:

    Aren't the CrackMe more binary exploit than crypto?  But if it is solving a crypto challenge then yelp.

    Well it really depends. One could patch the binary to accept any code given OR the more elegant way is to RE it, find the key-algo and then build your own KeyGen for the specific CrackMe.

    So it teaches two things at once. Understanding of the algorithm in use and how to implement it in your program.

     

  5. Hi,

    First question: Here's a good flashing tutorial https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Flashing-ducky

    Second question: Payloads for Windows only work on those. But you can compile them on any system, though.
    Since the ducky emulates a keyboard, the keystrokes work like the systems behaviour. If you use Windows-specific key-compo, they won't have the same effect on Linux/Mac OS - if any.

    Third question: The standard firmware works like a charm. Depending on your payload-needs you may need to use another firmware.
     

  6. Hi,

    according to the FAQ.

    A flashing RED LED means the Ducky can’t read the SDcard.

    My Ducky is flashing RED, what now?

    Take out the SDcard (it can be stiff first of all, so don’t worry), some people have used tweezers or have been fairly gentle with a flat-tipped screwdriver.

    Try reinserting the SDcard, or alternatively insert the card into an SDcard adapter/reader, and see if the host OS (Windows/Unix/OSX) can natively read the card.

    If the host OS can read the card, re-insert it back into the Ducky and try again.

    If the host OS can’t read the card, you may try re-formatting the card (FAT), or simply try another SDcard that you may have (commonly found in mobile phones, cameras, etc).

    A red light is also flashing if now inject.bink is found (iirc)

  7. Sure. Any system has to be up-to-date, but yet nothing is a 100% secure.

    It's possibly that an even lesser known OS is more secure even it is more out-of-date.

    A small recommendation: Lightweight Portable Security by the Department of Defense

    Also runs from USB (which is not accessable after bootup for security reasons)

    PS: Ultimately if anything has memory access, it can screw with the system in one way or another ^_^

×
×
  • Create New...