Jump to content

Decoy

Active Members
  • Posts

    248
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by Decoy

  1. Decoy

    Locked Screen

    While you might not be able to run Duckyscript on a locked machine, if all you're looking to do is modify the background or screensaver - you can do this remotely via regedit on Windows Machines. All you need is the host name or IP of the Computer on the network (assuming you're on the same network). Once connected to their registry remotely, you can modify all sorts of things, including (but not limited to) their background, screensaver, you can even swap their mouse buttons or keyboard keys. You could write a simple payload which you could execute on your own machine to automate the process if you were so inclined.
  2. This is an excellent site. Lots of great (free) information from trusted sources. There are also free VMs with real life scenarios in them for you to test your skills and knowledge throughout the process: https://pentesterlab.com/bootcamp Also - Offensive Security has put together a nice page as well that will walk you through Metasploit - and includes a vulnerable VM, "Metasploitable": https://www.offensive-security.com/metasploit-unleashed/requirements/ Once you've learned all you can - VulnHub is one of my personal favorites for some could old fashioned CTF Fun: https://www.vulnhub.com/ Good Luck!
  3. Whenever there are attempts made on multiple websites, it probably means you were involved in a breach. Attackers are hoping you use the same password everywhere, so they write scripts to automatically try the same login credentials harvested from the breach on other sites. Have you checked Troy Hunt's "haveibeenpwned"?
  4. I believe the 33GB Word List is the "Final Word List" as the description implies. I would go with the 33GB file personally. Good luck!
  5. While there ARE pre-computed hash tables, there are also links there to the word lists they used. Check out the link, and notice the tables for download, and the word lists separately.
  6. Does the problem occur only when in the USB casing? What about plugging in the duck naked, and try pushing the actual button on the board? Mine works beautifully. You can put the board into the casing both ways. So you have to be mindful of which side the actual button is on.
  7. There is also an episode on Hak.5 that shows how it's done. Maybe even 2 episodes.
  8. I used to love playing Duck Hunt when i was kid. Classic.
  9. I'll give it a shot and let you know what I find. Thanks for the info.
  10. Did he piggyback on Mubix's findings I wonder? I was reading about this yesterday.
  11. Yes, they added flags. I'm super excited for this. Have you used VulnHub at all? These are a lot of fun: https://www.vulnhub.com/
  12. What are you using for hardware? I'm on the fence, but I'm leaning towards the HackRF.
  13. Decoy

    Hacknet

    A little corny, but I'm partial to the point/click style. Brings me back to the good old LucasArts and Sierra days of my childhood, lol.
  14. Yeah, I've had a lot of problems with that. The keyboards haven't been updated on there for some time. You are better off cloning the GitHub repository and running the duck encoder from the command line, passing in your keyboard resource that way. I had similar character conversion problems while using the DuckToolKit. Let me know if you run into issues.
  15. Wow, I have to say I am impressed with Xfinity on their default passwords in this case. Looks like I will have to settle for WPS pins on those instead. I'll update with my lockout findings. Thanks for the info.
  16. How are you including your script? Are you doing it from the command line, or using the duck toolkit?
  17. What about Gemtek routers? Do you know how those are setup? I can't seem to find any info out there. Trying to build a word list. Same for Xfinity routers, I think they might be the same as Netgear, but I'm not 100% positive. The SSIDs are usually HOME-C582-2.4 where C582 are last 2 octets. Any encounter these before? Thanks, D
  18. I don't think this will work with WPA/WPA2 APs. Connected devices are expecting a 4 way handshake. Have you tried it on public wifi?
  19. So I can do: DELAY 10000 REPLAY 29 And that would give me 5 minutes. Awesome, I will give that a shot. Thanks, D
  20. Try defining your keyboard resource in the command line: java -jar duckencode.jar -i script.txt -o inject.bin -l resources/us.properties
  21. Decoy

    CUJO for IOT

    I still see the Nessus module on GitHub too. Now you've got me curious. I'll get back to you once I find out more. PacketFence is still good in my opinion though, just to follow up on my original point. I'm not totally familiar with Cujo.
  22. Decoy

    CUJO for IOT

    Damn, that's hefty. I suppose you'd have to use OpenVAS then. I still get updates to my Nessus vulnerability database I think. The PacketFence website doesn't indicate any additional licensing either. Either way that's too bad as Nessus is pretty good. I've used OpenVAS in the past as well when I do network audits, and as far as I know that's still free.
  23. Decoy

    CUJO for IOT

    It's not the full suite of tools, it's just a scanner object that works with PacketFence. You don't need to pay for a license. Alternatively you can use OpenVAS with it if you're so inclined.
  24. Decoy

    CUJO for IOT

    Packet Fence is decent. It's open source, and uses Nessus frequently to monitor devices connected to your network. I set up mine on a Raspberry Pi.
×
×
  • Create New...