Jump to content

ale

Active Members
  • Posts

    87
  • Joined

  • Last visited

  • Days Won

    3

Everything posted by ale

  1. You can't buy the Mark V anymore (No more RTL8186). And sslstrip is actually available on the tetra and the nano.
  2. I've never dealt with this type of issue before. but by the look of it, it seems like the wireless adapter is not supported on kali. I would suggest you try and find a driver for it somewhere.
  3. Are you having trouble with the nano not recognizing your wifi usb adapter? if so it may be not compatible. what type of a wireless adapter is it?
  4. Great job dude! Downloading and testing now...
  5. So you're getting no improvements at all? and btw it's a plug and play kit, nothing to configure.
  6. This isn't facebook. Speaking of facebook. Fuck facebook.

  7. Remember, if you don't have permission from the "people" you can get in a lot of trouble. Start here: http://ducktoolkit-411.rhcloud.com/Home.jsp
  8. SSLStrip no longer works due to implementation of HSTS. (HTTP Strict Transport Security). So unless you're using sslstrip for HTTP, don't even bother dude... You can however bypass HSTS...but not with sslstrip.
  9. A pretty bad-ass dropbox if you ask me. you still need a 4G modem to reverse ssh to it though.
  10. Okay, leave the radios alone. (don't use client mode). If you're on linux use the wps6.sh script to tether the pineapple. If you're using android use the wifi pineapple connector app, if you're on windows use this: (I know it says mark v but it should work just fine) Leave the radios for PineAP and Deauth.
  11. ale

    USB Phishing

    You killed me there
  12. Don't mention it buddy. P.S the wifi booster works great!
  13. I believe this is what you're looking for http://hakshop.myshopify.com/collections/accessory/products/sma-female-to-rp-sma-male-adapter
  14. I was going ahead with the CEH certification...Not anymore.. This is ridiculous
  15. That's really really REALLY!! good to hear Darren.
  16. I assume that touchwiz doesn't allow copying and pasting while the device is locked?
  17. Sorry man, I forgot to add it. here you go: https://github.com/aluech/Android-USB-Rubber-Duck
  18. Hi everybody Have you heard of (CVE-2015-3860)? I tested it against my Nexus 5, and it worked like a charm Have a look: I also created a ducky payload based on the same vulnerability Check it out here: https://forums.hak5.org/index.php?/topic/36684-android-5x-lockscreen-bypass-using-a-ducky-payload/
×
×
  • Create New...