Jump to content

Thweety

Active Members
  • Posts

    16
  • Joined

  • Last visited

Recent Profile Visitors

1,084 profile views

Thweety's Achievements

Newbie

Newbie (1/14)

  1. Thanks for getting back with me bored369. You are absolutely right that trust is the issue. I didn't want to give up the vm to begin with and I never gave up the second vm that was asked for. So that made me feel a bit better. I just wish I had a way to either screw up or delete the vm in place before giving out the first one. I would love nothing more than to see the individual's face after a hard day's work and having the files get deleted or completely screwing up the vm. There's no better way to loose faith in a vm then to have it constantly screwing up on you when you least expect it. I may still toy with the idea of putting something in place as a POC but the damage is already done and the individual no longer works for the company. I would guess some sort of C&C machine on my end waiting for a connection to come up. And put some sort of reverse connection on the vm so that it phones home each time it's started up. Then a simple command to either delete newly created files or just a complete "delete all system files" command. I've been hearing more and more about malware in vm's being able to jump out of the vm and infect the host but maybe even some way to force a vmx file to have certain settings regardless of how it's customized. That way even if the new owner of the vm would shut off networking it could somehow get turned back on to allow the vm to phone home. Just ideas. If anyone has any experience with any of this I'd be very interested. If not I'll just play around with it and see what I can come up with.
  2. Greetings. Got a few items I could use some advice on. If a file gets deleted on a computer, with a few pieces of software it can easily be recovered. So my question is let's say I delete a file then virtualize the hard drive. From that virtual machine can I recover that same file? I believe a physical to virtual is supposed to grab everything but if you have 10G used on a 40G HD the VM will only be around 10G not 40G even if the hard drive had 20G used on it at one time. So how can I be sure the virtual machine has the deleted files that I'm after other than just trying the recovery software? Another question would be browser cookies. If I can capture a machine and virtualize it, will any cookies on that physical machine copy over to the VM? In which I can sort through them as if I were on the machine itself? One more question, how easy is it to put a backdoor in a VM? What I'd like to know is if I have several employees running independent VMs is there a way to keep track of them and have control over them? I have a concern that the VMs might be being cloned without my knowledge. Obviously I cannot catch the ones already out there but any new ones used I'd like to install some sort of backdoor or software that will allow me to shut them down and even possibly delete unauthorized clones. Any help would be great.
  3. Thanks! I'll look into those. I found this on youtube: He's got a few videos of $3 and $1 premade boards. Ebay seemed to have the two boards he mentioned at a reasonable price. I like my rubber ducks but these arduinos are pretty cool.
  4. In the words of Jim Carry from Dumb and Dumber...So you're telling me there's a chance! :)
  5. So googling 4 way handshake and seeing a really nice diagram basically states exactly what you said which is I wouldn't get the PSK. But, and it's probably just my odd ball thinking, if I could capture the printers side of it that it's sending to my fake AP. And then replay that to the real AP when I'm pretending to be the printer...You don't think there's any chance of that working? I may be wrong but I thought Darren did something like this with rogue AP doing a MITM. I know I'm talking apples to oranges here but I still think I'd have a fighting chance getting this to work. And for testing I could just use my laptop connecting to a test AP. I create a fake AP and record my laptop trying to connect to me. Then I turn around and fake my real AP pretending to be the laptop. Don't know. It's probably not possible. But it sure sounds possible. Should I get something like that to work I'll let everyone know. I was just hoping there was something like this already around that I just needed to try out. Just thinking of all of the IOT devices out there that could have our private data on them. And we just toss them out and not care.
  6. Thanks for the reply digininja. Would cracking even be necessary? If you got the handshake could you keep it in that form then give it to the actual WIFI router when it asks for it? Again terminology might be off but could it be along the same lines of hacking into someone's machine? If I have your password hash...and can get the machine to accept that then I really don't need to know your plain text password. My thinking may be off but I think it's doable. Now I just need to borrow a few un-needed printers to test it.
  7. Ok so help me out here. I just thought of this last night and I wonder how simple this truly is in real life. Darren has covered MITM before and even though this isn't necessarily the same, I think it follows closely with my thought process. So an example first. I have a laptop. I take it to the a hotel and connect to it's WIFI. The next day I go back to that hotel and my laptop sends out a beacon asking if the hotel WIFI is still there correct? Now on topic. So does a wireless printer do the same thing? Let's say I get someone's hand me down wireless printer. I turn it on, connect it to my WIFI and I'm good to go. But this printer used to be connected to the previous person's WIFI. So does that mean when I had initially turned it on it sent out beacons asking if the previous WIFI is still there? And if I used some awesome HAK5 tools could I say I am that WIFI router and thus gain the old WIFI's password? I may be using the words incorrectly here but wouldn't I be able to basically record and keep the encrypted password or hash and then when I'm actually in front of that person's WIFI could I do some sort of pass the hash technique to gain access? I mean if that's the case since people are throwing out printers all the time does that mean they are giving out their secret WIFI creds as well??? I just got and then ditched a bunch of WIFI printers and now I'm really wishing I didn't because I'd like to attempt this and see if this is really something to be concerned about. Let me know your thoughts and if there is any info on this out there I'd be interested. Simple google search only brought up a webserver flaw in HP printers.
  8. b0N3z where are you buying your zero from? Every place I've seen has about $9 shipping and a limit of 1 per customer. Hopefully that's just per purchase but we'll see. Not being cheap but it'd be nice to get a $5 board for...$5. :)
  9. Sure I don't see why not. What are the specific specs of the one your looking at? Asus's website seemed to just give "up to" specs. Heck worst case just do what I do and run it as a VM. I'm actually rocking Parrot Security Linux on my laptop. The tools are about the same, it looks sweet, and runs amazing on my laptop. And for every day work I can RDP into my windows machines quite painlessly. I'm sure you can do all that with Kali as well.
  10. Well I did cheat a little. My first go around was by hand using every command in your script. The install went flawless. The only thing I had to add was systemctl enable dhcpcd that way my wired network connection would start every time I reset the machine. Even though I cheated and didn't use the ducky I'll say I have never gotten as far as I have right now with arch. By now I would have seriously screwed up something and would have had to start over. So at the very least thanks for the most excellent walkthrough on a working base install of arch! I can see the need for a few tweaks in the timing of running this through the ducky. pacstrap -i /mnt base seemed to take forever on my system (using a VM) so I might lengthen them a bit and just try them on a bare machine. I did find a tutorial that had some useful info on post install. I got a bare gui at the moment but it's definitely a step in the right direction. :) Thanks!
  11. Hey. Nice ducky script! I'm hoping sometime early this week to test it out. I hope you make a post install script as well. I tried installing Arch in the past but always seemed to mess up the networking and then after multiple band aides on the install I could never get the GUI to work. But I'm definitely looking forward to giving your script a shot. I may manually do it first but then see how much quicker the ducky could do it for me. Thanks.
  12. Are you loading a new inject.bin file directly onto the sd-card from the rubber ducky? I believe you have to pull the duck out, pull the sd-card out of the duck, put it in a micro-sd adapter, plug it into the computer, then update your inject.bin file. I was writing a few ducky scripts a few days ago and had my duck set up as a twin duck. I thought to myself, great I can test a script, edit it, and repeat by pressing the button. At least in my case it appeared that the inject.bin ran from the ducky the first time it's in there and then gets put into some sort of memory on the duck. No matter what edits, mods, whatever I did to my script it just kept replaying the old script. It wasn't until I went back to the old way of doing it (removing the card and using an adapter) that everything worked fine. I do wish though that with the twin duck, pressing the button to do a replay would actually reload the inject.bin file. That would greatly reduce the amount of tugging on that micro sd card. And if I'm wrong and the button does reload the inject.bin please someone let me know. Hope that helps.
  13. All gone. Thanks for everyone's interest.
  14. Sorry been away for a bit but yes all my items are still for sale at the moment. PM me with offers as I really don't have a set price. I'll do my best to get specifics on any additional items for the pineapple or duckies. Thanks.
×
×
  • Create New...