Jump to content


Active Members
  • Posts

  • Joined

  • Last visited

  • Days Won


Recent Profile Visitors

2,454 profile views

Exmix's Achievements

  1. Exmix

    Multiboot USB?

    So, what software do you guys use for making a Bootable USBwith multiple distros on it? I've been using Yumi but I can't tell if it's the USB I'm using or what but I load it up with some Distros but not all of them show most the time. So I'm curious what alternatives there are.
  2. So I am trying to get my phone to be able to tether to my Pineapple and I found an old video on the Hak5 Youtube that they explain it and they mention an app 'EasyTether Pro'. I would like to give it a shot but $10 just to see if something works isn't something that sits ok with me. So does anyone know if the apps works with the carrier 'Sprint'?
  3. I do have the BashBunny as well, my only 'complaint' with it is not a whole lot of storage. I would LOVE it if they made BashBunny with a MicroSD card slot.
  4. So I'm in a cyber security class and I want to demo how to not just plug in any flash drive you find and not to leave your machine open/unattended. I want to see if it's possible with a big enough SD card, to check what OS the system is on/running, and exfil user data to the micro SD Card, such as a users Documents on Windows, Mac, and/or Linux. Since they do have different paths, I'd like to have it know which OS it's on so the path is correct. After talking with a friend we decided this could be a lot easier in Python which got me curious if this is possible. tl:dr So long story short, I'm curious if it's possible to run a python script from my Ducky, without python being installed on the host machine, since most normal users won't have python installed.
  5. Exmix


    So me and a colleague of mine were talking earlier about various tools in the CyberSec/IT world we've found and used/tried/and other we have yet to try. So that made me wonder what some of you guys might use/recommend as tools that are lesser known/less popular. For example we were talking some Vulnerabilty Scanners(OpenVAS, Nessus, Qualys), Network Tools for monitoring traffic(Asside from the obvious NMap, Wireshark, TShark, TCPDump, etc), I had mentioned the PacketSquirrel and that was one he had heard of but never got around to gettting to try. Etc. So what do you guys recommend as some for us to add to our bag of tricks/tools?
  6. So most everyone I know uses and likes Signal for encrypted texts and such. I have no issues with Signal personally and I like it as well, but I was curious about others just because I like to have options. I found one called 'Wickr'. I'm curious as to know if anyone else has tried this one and if it has any advantages/disadvantages over Signal. It claims to have device to device encryption, it does have message expirstion and burn on read timers which seems pretty cool. Also wondering if you guys may have any other suggestions on potential options for alternatives.
  7. So I wanna see how long it takes me to crack a hash of my WiFi using PMKID and such. My desktop works fine but that's because I have an NVidia GPU and such and it see's that and runs fine. I wanna give it a shot with my laptop. Since that doesn't have a GPU i'm running into a minor snag. It DOES work if I do foce it, as it suggests below in the output. So i'm curious if anyone knows a potential solution to the error(s) below. I looked around and found some OLD posts from 2012, this post here, which I did download the intel-opencl from this link here, that was provided from the other link. Everything installed, So maybe im missing an or so, i'm just trying to get it to use CPU only since there's not really a GPU in this machine. I have tried running with '-I -D 1' and '-I -d 1' argument as well. $ hashcat -b hashcat (v4.2.1-39-ga134ea52) starting in benchmark mode... Benchmarking uses hand-optimized kernel code by default. You can use it in your cracking session by setting the -O option. Note: Using optimized kernel code limits the maximum supported password length. To disable the optimized kernel code in benchmark mode, use the -w option. clGetDeviceIDs(): CL_DEVICE_NOT_FOUND * Device #1: Intel's OpenCL runtime (GPU only) is currently broken. We are waiting for updated OpenCL drivers from Intel. You can use --force to override, but do not report related errors. clGetDeviceIDs(): CL_DEVICE_NOT_FOUND No devices found/left.
  8. I found this the other day and thought if some of oyu haven't seen it, you might find it interesting. I have yet to test it myself but plan to soon. Hachcat PMKID
  9. Exmix

    Kali-Linux KDE

    I had this happen, I had to use alt+ctrl+FN+F2 with the keyboard I was currently using the F keys were defaulted to Media Keys. So maybe the 'media' keys or 'Function' keys are taking priority, you can try holding down the 'Command' Key and pressing F2(Alt+ctrl+Command+F2).
  10. Exmix

    Wpa2 crack

    I have a question about that. As i've use aircrack mostly but as we all know it takes FOREVER. I was working with hashcat for a bit. It was hit and miss, like I used a dictionary that I know for 100% sure had the password of the handshake in it. Sometimes it would show it, sometimes it wouldn't. Is there any reason behind that? Also, how do you 'clean' the handshake? What exactly does that do? I'm not COMPLETELY into WiFi hacking, but would like know some basics of it.
  11. Not sure, wasn't my idea, it was posted on reddit and I thought it might be a nice project or something for some of you. I'm not that good to be able to help, or I gladly would.
  12. I'll drop this here in case anyone can help out. This isn't my Reddit post but still seems semi interesting of possible. https://www.reddit.com/r/HowToHack/comments/8spsf2/wifi_pineapple_wifiphisher_port_update/?utm_source=reddit-android Also, sorry if this is in the wrong place. Wasn't sure if it would go here or under the Nano category.
  13. This was the thread it was in but haven't checked in on it a loooong time.(Doing it now but providing you a link as well ? ) https://forums.hak5.org/topic/41353-ssh-web-terminal-client-module/
  14. I remember seeing something about that and looked into it but it was still being developed. Been a while since I checked on that.
  15. So far I haven't had issues with the UEFI and Yumi but I've only tried it with Ubuntu and Kali. I did see somewhere about adding persistent storage but don't remember where sadly. The suggestion about enable the Intel virtualization is a good idea too. Forgot about that.
  • Create New...