Jump to content
Hak5 Forums


Active Members
  • Content count

  • Joined

  • Last visited

  • Days Won


About digip

  • Rank
    -we're all just neophytes-

Contact Methods

  • Website URL
  • ICQ

Profile Information

  • Gender
  • Location
  • Interests
    Forum Rules - https://web.archive.org/web/20150402012023/https://forums.hak5.org/index.php?/topic/7499-read-me-first/

Recent Profile Visitors

72,525 profile views
  1. Networking issues in kali

    In bridged mode, you're virtual adapter for the VM gets an IP on the network like a real machine would. It shares the main hosts adapter for real connectivity at all times in any mode, but in bridged, it can be treated like it's another machine on the network. host-only adapter, is so that the VM can only talk between the host machine(windows) and the guest machine(VM), and is isolated - not supposed to be able to see the rest of the network, even if on same subnet. In theory you could setup routes to reach elsewhere, but pretty sure the host-only setup will block this until you add in a bridged adapter and add routes. If you want it in both host-only and on the regular network, you use 2 NIC interfaces, with a bridged interface able to see everything, and the host-only, only sees the host. If a tool you use fails to work, some let you assign an interface to it, so if you want to test something outside the host-only network, you need to tell the tool to use the bridged adapter. For example, netdiscover tool can be assigned to an interface before running, by default I believe it takes eth0 or the first adapter, but to find machines on the network, you'd need to assign it to the bridged adapter. If you set any to NAT, it's as if it's behind a router, which means port forwarding issues and reaching it from other machines becomes a problem, similar to host-only connections, but you can use NAT on multiple VM's in VBOX to create a new network subnet where the HOST machine acts as the router/gateway and then the other VM's only see each other and the HOST. Adding in then a bridged adapter on one of those machines, lets you then pivot between the different networks/subnets. Might be a good idea to read up on networking in general, routes, subnets, network masks, etc. Will make more sense when you have a better understanding of network fundamentals.
  2. Kali linux

    What desktop interface and theme are you using? Check the second one down -https://bugzilla.redhat.com/show_bug.cgi?id=1329311 May be a bug with the theme, try a different theme or layout
  3. WPA3

    needs more tinfoil. and bacon.
  4. WPA3

    WPA3, while being announced, still needs adoption and testing and then support for devices and OS's, which is probably still a year away or more. WPA2 is also still getting updates and patches. Hopefully I'll be able to keep my existing routers and just get updates to support WPA3, but I have a feeling vendors aren't going to be so nice.
  5. Kali linux

    Yup. We just put that up yesterday.
  6. Pentest Questions

    Offsec has a sample pentest report on their site - https://www.offensive-security.com/reports/sample-penetration-testing-report.pdf It's not however a template, but something to at least see how one company has theirs formatted. I think SANS may also have something on their site, but you'd have to google for it.
  7. CES Hacked?

    I think they also had a storm, lot of rain? http://appleinsider.com/articles/18/01/10/2018-las-vegas-consumer-electronics-show-stymied-by-blackout-heavy-rain-and-flooding
  8. Linux functions and weird problems..

    The \r is a carriage return, and \n is new line(line feed). Linux generally treats \n as both in scripts, but if you ever download and open in windows, things like regular notepad, will make it all one line, which windows wants both the carriage return and new line. Notepad++ will treat \n like \r\n depending on how you have the settings, but you can also ctrl+h and set it to extended, to change \r\n to \n and then save it. If you click the icon to show all characters, you will see it adds a CR LF at the end of new lines. Also edit > EOL conversions, change to Unix, will remove CR LF and replace with LF ;)
  9. Linux functions and weird problems..

    Copy pasta also causes this in linux too, not just notepad++. When I copy code off web pages, and paste then save, I often get errors related to \r\n vs the \n that linux likes to use. You can open a python or bash script in nano, and it will actually highlight the issues, and python will even tell you about it in the error output of the terminal most of the time, then look in nano to see the highlighted blocks at the end of in middle of lines, to be removed. Sometimes it's also fancy quotes, something wordpress blogs are known for, vs a regular single quote, and can break code when you visually see or think it's a single quote in a text editor, when opened in a hex editor, you'll see it's not the proper character(s). Examples of what I mean. bad characters: e2 80 99 " ’ " should be single quote " ' " 27 e2 80 9d " ” " should be double-quote " 22
  10. Freedom

    I'm curious how you would disable their "tools" on "their" network though? Going around filters is one thing. To be able to control aspects of their systems and "tools" is another. Unless I'm not understanding what you describe above.
  11. Freedom

    Attacking your government and their filters, will probably not end well. Especially, now that you've publicly announced it. https://vlipsy.com/embed/acR1rJOb
  12. Laptops for pentesting?

    You can leave kali in virtual box. I have it in both vbox and vmware, as well as natively installed in several places, but the point is, to pentest and practice, you don't really need expensive new equipment, or any specialized laptop for penetration testing. Any computer can be used to learn with for the most part, and in many cases, when you go into a real pentest, you aren't allowed to bring in laptops or equipment, often have to use their equipment, and use something like a Live DISC to load into one of their machines, or have to leave yoru equipment with them and not be allowed to leave their premises with anything, including thumbdrives, HDD's, etc. The whole point BackTrack was invented, the predecessor to Kali, was because on some engagements, they were required to leave their HDD's or equipment with the companies they did the pentest on, so having a CD or DVD of an OS with tools on it, let them bring just that into the environment, and can be tossed in the trash afterwards when done. Your laptop just needs to have reasonably decent hardware support and stability for the kali distro, and if needed, some external Wifi cards where needed. In some instances, people are using small appliances, like the Intel Nuc or a raspberry pi, as plugin devices to the network, and setup for remote administration, so a company doesn't even have to physically show up on site, only need a bridge to the internal network, to perform their assessment, depending on the scope and scenario in place, or for when you are only allowed a connection from a conference room of a business, but not access to the data center or such, plug and play makes things convenient for the security companies, which is the main purpose of Kali, in putting all the things in a small package for a wide range of uses.
  13. Freedom

    TOR is an option as mentioned, but just an example of a number of types of services such as proxies and VPN services or other tunneling scenarios, such as purchasing a domain from someone like Dreamhost, and then enabling shell access, and SSH tunneling over the domain, to reach other sites. Also changing your DNS to something like OpenDNS, can in some instances, unlock some things that might only be blocked by a simple DNS filter on the ISP's DNS side only, and if not filtered by some other stronger method of blocking mechanisms, although tunneling would probably be the best route around filters and blocklists.
  14. Valid feelings, but still, not like Hak5 does this on purpose to piss people off. It's the merchant billing that is requiring it, as it's been flagged, they don't have a choice really. Until the purchase can be verified, the purchase can't be done. So what do they do? They try to verify the transaction to ensure its not fraudulent. Then by chance your info was stolen, faked, etc, they are in compliance, and not responsible, when they do what is required of them. It's to cover all the bases, and everyone's ass, so that if you do need to go after someone, there is now a trail, whatever little bits there are, to go after the people.
  15. Kali linux

    @amrita Check out http://kali.training/ to learn Kali,and you can download Virtual Machines of Kali at www.offensive-security.com or ISO images from Kali.org if you want to burn and run a live disc on your laptop or desktop. If you're in windows 10, you'd need to disable UEFI to boot Kali on those machines natively, or just use it in a VM when learning, which is my suggestion. I am not a believer that you need to learn Linux first, before getting acquainted with Kali. While Kali is specialized in it's tools and default user of root, you always add users with Sudo like you would on ANY other distro, and Kali is Debian based, and a rolling distro with updates just like any other Debian based distro. I run it on my laptop natively, on one of the family desktop machines as the main OS that my wife and kids use, and in a VM on my desktop. As with anything, best way to learn is by doing, don't be afraid to dive right in with Kali as your first distro. It's Linux like every other distro, at its core, and works just like every other distro.