JPaulMora
Active Members-
Posts
12 -
Joined
-
Last visited
-
Days Won
1
Everything posted by JPaulMora
-
You sir, have enlightened me.
- 4 replies
-
- help
- metaspolit
-
(and 2 more)
Tagged with:
-
Are you saying this needs to get injected directly to RAM? Could you point me to an example? isn't there a way to call it as a java function?
- 4 replies
-
- help
- metaspolit
-
(and 2 more)
Tagged with:
-
Hey guys, I have a JAVA project and I want to add this msfvenom payload to it, but I have no idea how to "execute" this buf. Anyone know how to do this? or is there any other option on injecting code ? --the payload was generated with './msfvenom -p osx/x64/say TEXT="it works" -f java' thanks. buf = new byte[] { (byte) 0x48, (byte) 0x31, (byte) 0xc0, (byte) 0xb8, (byte) 0x3b, (byte) 0x00, (byte) 0x00, (byte) 0x02, (byte) 0xe8, (byte) 0x16, (byte) 0x00, (byte) 0x00, (byte) 0x00, (byte) 0x2f, (byte) 0x75, (byte) 0x73, (byte) 0x72, (byte) 0x2f, (byte) 0x62, (byte) 0x69, (byte) 0x6e, (byte) 0x2f, (byte) 0x73, (byte) 0x61, (byte) 0x79, (byte) 0x00, (byte) 0x69, (byte) 0x74, (byte) 0x20, (byte) 0x77, (byte) 0x6f, (byte) 0x72, (byte) 0x6b, (byte) 0x73, (byte) 0x00, (byte) 0x48, (byte) 0x8b, (byte) 0x3c, (byte) 0x24, (byte) 0x4c, (byte) 0x8d, (byte) 0x57, (byte) 0x0d, (byte) 0x48, (byte) 0x31, (byte) 0xd2, (byte) 0x52, (byte) 0x41, (byte) 0x52, (byte) 0x57, (byte) 0x48, (byte) 0x89, (byte) 0xe6, (byte) 0x0f, (byte) 0x05 };
- 4 replies
-
- help
- metaspolit
-
(and 2 more)
Tagged with:
-
[UPDATED] Pyrit WPA cracker back on track.
JPaulMora replied to JPaulMora's topic in Community Projects
not really, Pyrit's modular nature lets you update either side of the code wether its a GPU module or the main module. so other than a warning about different module versions, rebuilding Pyrit's core should get you updated (as the GPU modules haven't been updated). -
[UPDATED] Pyrit WPA cracker back on track.
JPaulMora replied to JPaulMora's topic in Community Projects
I agree that clustering is a very important feature, based on my testing and your tested speeds, I would recommend a wired network. WiFi is simply not fit for the task when it comes to transferring GBs of data really fast, even having one of those 12MB/s WiFi routers, this is pretty slow when you need to transfer huge wordlists back and forth over LAN. I might add a tutorial on the GitHub wiki referring to this topic. -
[UPDATED] Pyrit WPA cracker back on track.
JPaulMora replied to JPaulMora's topic in Community Projects
Yes, ATM there hasn't been discovered any 'universal' weakness to WPA/WPA2 other than bruteforcing the PSK. So as Cooper mentioned, this is just a specialized version of a GPU+CPU cracker with the advantage of storing whatever you have already computed. -
[UPDATED] Pyrit WPA cracker back on track.
JPaulMora replied to JPaulMora's topic in Community Projects
Version 0.5.0 is out! go ahead and grab a copy! Added CUDA and OpenCL switch in config plus now you can run pyrit completely on GPU! Note: if you have used pyrit previously, delete/backup your config file at ~/.pyrit/config as the program must recreate it. -
Pyrit WPA password cracker updated! Ive been maintaining this project for a while now, please spread the word: https://github.com/JPaulMora/Pyrit Added some extra options and performance improvements.
-
SAM file saved onto flash drive? Any advice?
JPaulMora replied to jmeacha89's topic in Classic USB Rubber Ducky
Thats right, you may not be pressing yes in the confirmation window, you may wanna check my Ultimate version of bypass-UAC It should work on almost any windows computer, even the ones with the confirmation window disabled. https://github.com/JPaulMora/BypassUAC Also, remember you got the REPEAT command (Zeta's example is great) and you should note that when using it, the first command is not executed. ie. DOWNARROW REPEAT 3 equals DOWNARROW DOWNARROW DOWNARROW and not DOWNARROW DOWNARROW DOWNARROW DOWNARROW -
Already added a section on how to submit character mappings, check the github repo for updates you can go ahead and clone the source and give it a try, tell me if you find any bugs or if you have ideas on improvements Thanks
-
Ever wanted to know whats inside all of those saved bins? forgot what your payload did and is too risky to try? check out my python scrip to decode them at: https://github.com/JPaulMora/Duck-Decoder help is much appreciated! need support for non-english keyboards. run it without args for help. Fully tested & working on OS X 10.10.3