Jump to content

jm0202

Active Members
  • Content Count

    11
  • Joined

  • Last visited

About jm0202

  • Rank
    Hackling

Recent Profile Visitors

1,179 profile views
  1. I would buy a a ralink wifi card and link that to your phone if you have unlimited internet or AP ... I had problems looking for 3g/4g modems
  2. jm0202

    O.MG cable

    I see the O.MG cable is coming soon to Hak5.. It seems this cable will charge the battery only for Mac phones/devices? One side ends in a regular USB and the other in an iphone connector. WIll it connect to Android devices as well?
  3. Is the usb module for the pineapple nano in the pic (with an ethernet port) going to be available?
  4. Does anyone have a working example of dns spoof with an android device?
  5. Is this module working? Whenever I try to do a dns spoof using the br-lan interface it never gets redirected to the web server in my nano...
  6. OK thanks @Sebkinne it is possible to manage the pineaple from a iphone device? i see there is a connector app for android... is there a connection app for iphone?
  7. It is possible to tether an internet connection from an iphone to the pineaple nano?
  8. It is possible to have the turtle working without a cloud VM with VPN access server? Instead I want to run my own VPN accesses server from the Internet (from home) and do all the cool things in this video: sorry if this is a dumb question
  9. Hello Guys I need help with the a payload to get a reverse shell using the ruber ducky: I tried to use the powerducky script to get a reverse shell and no luck... I figured it out it was because my victim was an X64 and not a 386 ... So i went ahead and modified my powershell shell script to detect if my victim is X64... now when I run manually my malicious powershell script on my victim and i have a htpps listener in my attacking machine it works perfectly ... now the challenge i have is encoding my powershell script in base 64 so I can ultimately use in my inject.bin.... This is what I us
  10. Hello b00stfr3ak Powerducky is a great tool however the latest version checked in github has some issues... It seems there was some syntax issue in the main menu.. and the payload to add a user to the admin group fails, since the localadmin word is misspelled. For the reverse shell attack I am able to make it work from the rubber ducky, the payload is injected and i got a message in my attacking machine (sending stage to victim xx bytes) but it hangs there.... I tried to use the meterpreter X64 (since my victim machine uses an x64 architecture) but powershell just dies in the victim machine
×
×
  • Create New...