Jump to content
Hak5 Forums

haze1434

Dedicated Members
  • Content count

    679
  • Joined

  • Last visited

  • Days Won

    19

3 Followers

About haze1434

  • Rank
    Hak5 Ninja

Profile Information

  • Gender
    Male

Recent Profile Visitors

3,528 profile views
  1. haze1434

    Just tinkering with MAC Addresses

    Agreed, however I said generally. Of course us techies know you can use things like macchanger to spoof your MAC, but I believe the OP was looking at 'normal' users, rather than unscrupulous individuals Apple phones, for example, do iterate through spoofed MACs when out in the wild, to stop access points in monitoring mode from tracing them, however when they actually connect to an access point, their real MAC address shows. I can confirm this via personal testing.
  2. haze1434

    Just tinkering with MAC Addresses

    Also, here's a nice text-only list of which companies own which OUIs: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=blob_plain;f=manuf
  3. haze1434

    Just tinkering with MAC Addresses

    Generally they are only spoofed on most devices when they are not connected to an AP. As soon as they connect, they show their true MAC. Wikipedia actually covers quite a lot on this page; https://en.wikipedia.org/wiki/MAC_address
  4. Thanks all, I've ordered a Float Switch :) Hopefully be with me soon and then I'll start rigging her up.
  5. Hi all, I'm working on a project to track the water levels in a water butt in my garden. I plan on installing a DIY irrigation system, which will consist of a pump sitting in the water butt. As I don't want the pump to switch on when the water level is too low, to save it running dry, I wish to monitor the level of the water inside the water butt. I've researched around for the best method, but it's very difficult to judge which will work best and is most cost effective! So far, I've considered doing one of the following with a Raspberry Pi; A reed switch/sensor, with a magnet floating on the top of the water, inside a tube, in the water butt. When the magnet reaches a low point within the tube, the reed switch picks it up and trips. An ultrasonic sensor on the underside of the lid on the water butt 2 long metal rods, with current, sitting down to near the bottom of the water butt. When the current running between the rods drops, when the water goes lower than the tips of them, then a script will kick in. Any thoughts on these? Has anyone done anything similar or have any ideas? Thank you
  6. haze1434

    Hacking NOT on Lan. Is it possible?

    As Rkiver states, unfortunately you won't get much here. Pentesting over the internet, and not LAN/WAN is pretty much guaranteed to be nefarious. If you were pentesting for a company, with signed consent, you'd either be on their LAN/WAN or already have the details of how to attack from externally. Therefore, it's assumed you're trying to pentest someone you shouldn't. So no chicken dinner, sorry.
  7. haze1434

    GSM hacking

    https://hackaday.com/2016/04/08/build-your-own-gsm-base-station-for-fun-and-profit/
  8. haze1434

    Netman

    We'll need more information. Searching online, there's quite a few things 'netman' could be. Link? Also, please advise what you are looking for; are you getting an issue with it? Are you looking for advice on how to do something in particular? Are you looking for resources to learn how to use it?
  9. haze1434

    Long rang hacking

    Completely forgot GSM. Woods from the trees n' all that. This would be a very good idea also, yes. I guess my above post could work in the wilderness where there was no GSM available.
  10. haze1434

    MAC Address Changing for edge device

    Wi-Fi Camera > RPi set up to forward all traffic, using MACChanger to spoof it's MAC > Your Wi-Fi AP As long as the software thinks the RPi is actually your camera, this should work. You'll have to scan the camera for all the ports that it uses and make sure that all of these are open on the RPi and being forwarded.
  11. haze1434

    Long rang hacking

    I've been toying with this idea for a while, but have yet to buy a Sonnet and so am uncertain if it would work (note the arrow directions)... Attack Box > Wi-Fi connection > Sonnet > > > > > Sonnet < Wi-Fi Connection < RPi > Wi-Fi Connection > Target AP In theory, if the Sonnet allows this correctly, you could connect over a long distance, however the throughput would be pretty slow. OK for terminal though.
  12. haze1434

    Hack The Box

    Just had to mention hackthebox.eu An excellent website for practicing pentesting; real-time, hackable machines of various skill levels and types. You can sign up for a free account, or pay £10 a month for an upgrade. Well worth it. The free account gives you access to almost everything, the upgrade is just to improve server availability and the hardware you are hacking against, speeds up the process a bit, but you don't have to pay if you don't wish. As a side note; to sign up, you have to hack your way in! (hackthebox.eu/invite)
  13. haze1434

    Long rang hacking

    Very circumstantial, based on how large the buildings are and the materials the walls/windows etc. are made from. You're likely to be able to penetrate 2-3 of these building, but certainly not 10. You defiantly need to either; Get higher, so the signal travels over these buildings Use a much lower frequency for the signal than Wi-Fi (LoRa, mobile network etc.) Get closer.
  14. haze1434

    Long rang hacking

    Is it line-of-sight, or through objects? If through buildings/trees etc, could you give us an indication of how much is between you and the Wi-Fi?
  15. haze1434

    Long rang hacking

    The maximum distance I personally have managed with a simple Yagi antenna (like this) was 1 mile (1.3km). Wi-Fi isn't really designed for the distances you are thinking about, unless you are willing to go the DIY route. You could probably get 1-3 miles with this, I doubt any further. And I'm talking line-of-sight here, not through multiple buildings. Through buildings, you'd get a few hundred yards, not miles. This can only be mitigated by sending the signal above the buildings. People who manage further are pretty much guaranteed to be hobbyists that have DIY'd their own Wi-Fi rigs. It's all about frequency; Wi-Fi is too high of a frequency to travel long distances, hence suggesting using around the 800mhz range above and converting the signal on either end with an RPi / Arduino / etc connected to shorter distance Wi-Fi antennas. The ProxyHam is an exact example of this.
×