Jump to content
Hak5 Forums

digip

Active Members
  • Content count

    8,854
  • Joined

  • Last visited

  • Days Won

    136

About digip

  • Rank
    -we're all just neophytes-

Contact Methods

  • Website URL
    http://www.ticktockcomputers.com/
  • ICQ
    0

Profile Information

  • Gender
    Male
  • Location
    RnVjayBPZmYh 192.168.100.1
  • Interests
    Forum Rules - https://web.archive.org/web/20150402012023/https://forums.hak5.org/index.php?/topic/7499-read-me-first/

Recent Profile Visitors

72,174 profile views
  1. Unknown Computer appeared on RAT?

    #1 - don't link to cracked/pirated software #2 - More than likely, you just got yourself hacked from the sounds of it, if any of it is true.
  2. Try putting them in a code section as plain text(not html) see what happens?
  3. identify physical intruders SSID

    there was another wifi project I can't remember the name of that worked on triangulation of people, without them even needing to give off a wifi signal. It was some kind of motion detection using multiple wifi devices and measuring the changes when someone walked between them, and it could sort of "image" the proximity and size of things and where they were. It might have even been a forum post here somewhere. Something along the lines of http://www.businessinsider.com/wifi-camera-sees-through-walls-2017-5 but not so much for taking imagery from it but used for "sensing" physical objects and movement in real time, could trip an alert similar to a proximity sensor for alarms, using just wifi alone. i think the invisible fence idea is a better solution though, in the even these kids don't have phones on them when they do something, detecting and documenting it with video and photos is best if you need to file charges against people. Matching a mac address to a device is only one point of correlation, but hard evidence like video or photos would certainly make things easier.
  4. identify physical intruders SSID

    Get yourself a wifi-cactus with the latest Kistmet, and sniff all the things...if they have cells with wifi turned on and actively probing for networks, you'll see them, but you'll need to work out the whole distance/proximity side of things to correlate how close they are and at what point it should set off an alert. People driving by 100ft away could set this off if you're just monitoring for different probes alone. Key is testing with your own phone or such, and measure the signal at different distances from your AP, or if using multiple devices or capturing like a raspberry pi in each room to the outer walls of the house perimeter, then measure feet to signal strength as you're walking further from the house. You'd kind of have to measure in all directions from the perimeter and have a way to see in real time, ok I'm at X feet and signal is XX, and so on, sort of work that out. I don't know of the links above will help(most seem like unfinished questions), but the tracking script looks like it has potential. I don't own a pineapple, so not sure if that code works. Things that might help point you in the direction you want to go or to get started, since we don't know how versed you are in any of this yet, understanding scanning and probes basics: and for the cactus, which is like the above but to the 9000+ power, D4rkm4tter's cactus talk - All of the above might be overkill, if all you want is a proximity sensor on your property, you could have one setup as an invisible fence, then have it set off an alarm that triggers when people cross that threshold and then alert you either by email or text to your phone. That to me seems like a better way. Combine it with motion detection cameras(I actually did this when we lived in an apartment) that email you snapshots when triggered and will record video when triggered, and give you physical evidence in the event someone messed with your home. IP cameras are fairly simple to setup too, just not the cheapest thing for a good camera(s) and then the right software that has the recording features you want. D-link was the one I used that had all the capabilities I needed, including night vision.
  5. I'll have to try that. I only ever piped from one command into the next, didn't know you could use them together like that, figured it couldn't touch a file already in another handle for ownership reasons, but I guess that wasn't the case. I should have realized sort-object had a unique switch like linux sort has.
  6. I might be missing the point, but this should not be a difficult thing to the point that you would want to do this with a C program(other than maybe for the mental floss exercise and trying to reinvent the wheel with some complex routines). Depending on how much you need to modify things, just do it from the command line with utilities already designed for this, where the heavy lifting of programming has been done for you. Tools like cat and sort, handle this kind of thing and what they were designed for. If you just need to merge and sort, then a one liner command would be easiest under Linux. On linux: cat file1 file2 file3 file4 | sort -u > list.txt On windows, put your files in same directory then run the following 2 commands (windows will need a few more steps, but still easy-peasy): :: Open a cmd prompt, then open powershell: C:\ > powershell [hit enter] :: Run each of the following commands dir C:\path\to\files\* -include *.txt -rec | gc | out-file C:\unique\path\to\results\result.txt gc C:\unique\path\to\results\result.txt | Sort-Object | Get-Unique | out-file C:\path\to\sorted\wordlist.txt On windows, you can't chain the entire command up above to pipe the first into the second; while you won't get an error, it's a sharing violation of the file in use, so the second command needs to be input by itself after the first command completes or the wordlist at the end will be empty. (see https://forums.hak5.org/topic/42274-c-best-method-to-organize-massive-word-lists/?do=findComment&comment=300340 for how to chain the above in a single command) If you need anything more complicated than this, then I'd say do the database thing as suggested above so you can tag words in different groups and sort dynamically into different list categories, but to merge a sorted, unique list, keep it simple with the command line.
  7. Everyone already knows the password, we're just not telling @manolo12 because we're leet like that.
  8. Raspberry Pi 3

    Kali is what you want for the Pi, not Back|Track. Also, if you want more wifi card support and tweaks, update to the Re4son kernel, which is a highly tweaked version of Kali for the Pi. See his site for all the info on Pi support: https://whitedome.com.au/re4son/re4son-kernel/
  9. [PowerShell]

    Just an FYI, powershell, has a built in feature, that works, much like wget, if not better, since it's built in and no need for third party tools. you can download files and push files with powershell. It also won't get picked up by malware scanners, as wget sometimes gets flagged. Google is your friend.
  10. Learn more in our new book "How not to pick up Women"
  11. WPA2 - Broken

    OpenWRT is an alternative to most linksys devices. What is the device it goes on, the manufacturer? Either that, or go to the OpenWRT site, get official 3rd party firmware, which I'm sure at some point, the OpenWRT community will patch. Unless the git repo is one of the developers for OpenWRT(I don't know them), then I would probably avoid randomly found patches. I mean, it could be legit patched, but I'm a bit more cautious when it comes to some things. Especially when I don't see the code used in them, although you could unzip all the way down to the IPK and unzip them as well, I wouldn't know where to look specifically for changes that fix this issue. They apparently have their own GIT repo as well - http://git.openwrt.org/?p=15.05/openwrt.git;a=commit;h=acfb6c2181b1589e5b2d0d121180bcc7d62d37d4
  12. WPA2 - Broken

    I'd suggest getting patches from official sources, but that's just me.
  13. Bootable Kali Linux Usb stick

    This has been brought up. Currently our docs.kali.org only show how to do it to an extent, but is a bit out dated and not much help for windows users. For me, I just disabled UEFI, installed, updated, then rebooted and reenabled UEFI. Then i just choose which partition to boot from, and I'm good to go, with Windows still being the default OS it boots to if you don't choose the partition with F9 or F10(I forget but whatever your BIOS hotkey is for selecting drives, but that is for my Laptop and how I installed mine with just the ISO)
  14. Bootable Kali Linux Usb stick

    Your Windows 10 devices, is using UEFI, so you need to either disable in the bios to use Legacy settings for the install(which will work with EFI after fully installed and updated), or use something like Rufus to make a UEFI bootable USB drive for the install on a UEFI enabled computer. Kali supports UEFI 100% too, just the ISO files don't have the UEFI boot enabled, which is where tools like Rufus help. Basically use https://rufus.akeo.ie/ with your ISO to create the UEFI bootable thumbdrive, and you will be good to go.
  15. WPA2 - Broken

    How do you issue certs to each device, and what devices will inherently be able to support it in this manner. This being the age of TV's, game consoles and DVD players all being WPA2 compliant now, I think you would ultimately kill a huge trunk of the user base, if you suddenly go to a new standard, vs patching the existing model to keep legacy devices working.
×