Jump to content

Dave-ee Jones

Dedicated Members
  • Posts

    1,488
  • Joined

  • Last visited

  • Days Won

    40

Posts posted by Dave-ee Jones

  1. 10 hours ago, haze1434 said:

    Funny, I went to rob a bank a few days ago, but got arrested after security realised I was holding up some sort of router.

    Small world...

    This cell is comfy.

    Holding up a black box to the light is understandable. ;)

    • Upvote 1
  2. 2 hours ago, PixL said:

    ...however 2.4ghz has the longer range for the same power output.

    More or less correct.

    2.4 GHz Range > 5 GHz Range

    2.4 GHz Throughput < 5 GHz Throughput

    2.4 GHz is better in larger, client-spread areas, 5 GHz is better in smaller, condensed areas with lots of clients.

    In regards to the OP, I know the AWUS036CH has incredible range, and it uses both 2.4 GHz and 5 GHz (dual-band). With large 9dB 2.4 GHz Antennas I can increase that range dramatically, although I don't use them at home. Bad idea - I just use the default antennas that came with the AWUS036CH, which are still quite powerful.

    I can't give an accurate test of which has better range though, as I don't own the NH, sorry. And if you're using the adapter for Linux-based machines, go with the NH, because (I would assume) it has better driver compatibility with Linux than the CH, which is notorious for being awful with Linux drivers, sadly.

  3. That's funny, that's the exact same adapter I use at home. :) I recognise the chip.

    And because I recognise the chip, I can also tell you that the drivers for that specific chip are very hard to get running on Linux, so that would be why it doesn't recognise the chip. Unfortunate, I know.

    I tried using this specific adapter with Nethunter, but never got it working in the end - however, Kali might be a bit nicer. I know there are a lot of community-made drivers for it out there, but finding the right one is the hard bit, and sometimes you have to play around with it. But here's a few links that may help:

    https://unix.stackexchange.com/questions/369045/kali-linux-and-rtl8812au

    https://forum.aircrack-ng.org/index.php?topic=1568.0

    https://github.com/embeddednow/rtl8812au

    https://mangolassi.it/topic/15195/realtek-rtl8812au-usb-issues-with-kali

    And this video (not sure how good it is, I haven't seen it):

    Good luck, and I hope this helps.

  4. 11 hours ago, barry99705 said:

    Exactly.  Who has the money, or space to back up all your user's desktops?  Pretty much all the companies I do work at don't.  I can think of one, but that guy is freaking crazy about backups.  He backs up the backup servers.  Not just the backups, but the whole damn server, including the backup drives.  He also backs up the desktops, who's data is redirected to the servers being backed up.

    I mean sure, you could spin up an exchange server locally and mirror 365, but then, why have 365?  Also 365 is a huge waste of money in the first place.

    You only need to tell Outlook to cache users' mail locally, then just backup the PST files.. Temporarily forgot the actual reason you want to backup the users..

    Yeah, I know the kind of guys. Dealt with them before. :P

    It sounds like it would be easier for him just to have a terminal server and give everyone thin clients, then backup the server. Ez-pz.

  5. No pix no fix. :P Joking, although, a screenie would be very helpful (of the network settings of your VM).

    There could be any number of reasons for this, but for now just check your VM's network settings - is it bridged with your physical network? Or is it set to connect to the physical network directly? Or is it set to host-only (connect between host and itself)? Or is it set to use the host's IP (uses the host's network connection - piggybacking off of it, basically)?

    The first two options gives the VM an IP on the physical network's subnet, making it visible to everything on the network.

    The third option gives the VM an IP on a network shared only between the VM and the host (imagine a switch, and only the host and the VM are plugged into it - a virtual switch).

    The fourth option doesn't give the VM an IP (well, it does but only on the virtual side), and the network connection is passed through to it via the host. A bridge without an IP on either end.

    Hope that helps a bit. If you want to read more on it I think these links may help:

    https://blogs.oracle.com/scoter/networking-in-virtualbox-v2

    https://wiki.dave.eu/index.php/VirtualBox_Network_Configuration

  6. DNS spoofing, for me, works one time, then the next time it'll refuse to work and then the next time it'll be fine again. Probably just me though.

    Your spoofhost file should look like this:

    address=/facebook.com/<ip>

    <ip> of course being the IP of your victim (or even localhost).

    address=/facebook.com/127.0.0.1

    Now, the PS needs to be inbetween the network and the victim. Network -> PS -> Victim (that's the way the ethernet cables will go).
    So if you hold your PS so that the switch is pointing down, and the button is up, the left ethernet port needs to go out to the victim, and the right ethernet port needs to go out to the LAN.

                                                   BUTTON

    Victim <--------------> IN PORT    PS    OUT PORT <---------------> Network

                                                   SWITCH

     

    Hope it helps!

  7. Sounds awfully like someone's trying to hack a public library computer (possibly a school one)..

    1 hour ago, uncommon said:

    Lets say we have a win 7 computer with non-admin access.

    Public PC = older, used PC.

    1 hour ago, uncommon said:

    And we dont have permissions to any cool stuff like regedit, gpedit, etc.

    Hierarchy of a Public PC: User < Owner < Admin

    1 hour ago, uncommon said:

    gets reverted on boot/profile load to its original setting.

    Well, duh, do you think people want their logins to certain websites stolen? :P

    1 hour ago, uncommon said:

    Computer is on a domain system.

    Yeh, well, that's because it's part of a domain that someone else owns.

    1 hour ago, uncommon said:

    And lets pretend creating a new windows admin user might be a little too invasive for a vigilant System admin ignore.

    Almost laughed at that one.

    I don't mean to be rude, but you're asking us to assist you into hacking a public PC that you don't own. Messing with stuff that isn't yours. We might be under the banner of "Hak5" but that doesn't mean we (we meaning the majority of us) actually go around hacking everyone for the fun of it (or for the profit of it).

  8. 20 hours ago, httpsghost said:

    It is believed by many circles that the design of the Tetra recently changed to be super covert, but also now is just a BB gun pistol. 

    I think, and I believe many would agree, that a BB gun pistol is slightly more noticeable than a small, black box.

    Slightly.

    20 hours ago, httpsghost said:

    Is it just as useful at cracking networks? Surely it must be, but what would They know. 

    Ehh, if you have enough bullets you could eventually put some holes in the router or some other devices.

    Someone else somewhere in the world just got a black box with antennas sticking out of it.

    Wonder what they'll do with it, thinking it should have been a BB gun pistol.

    "But they said it can do injection.."

    "No, Charlie, it does a different kind of injection"

    "But, look here see-"

    *prods hard with antenna*

    "OUCH Charlie!"

    • Like 1
  9. After a super quick Google ("AWUS036H packet injection") there are some that say they have issues with it and others that say it works straight out of the box.

    It is a very old card, but still considered one of the most reliable out there. If you have one lying around, try it - if you're planning on buying one, don't. Probably get something a bit newer that at least supports N. I've got an AWUS036CH but it's drivers are quite finicky with Linux (Windows is plug and play), but it supports AC which means faster WiFi, and I don't need to use it for Linux much (could just get some cheap WiFi adapter that does packet injection).

    A 10 second Google search is all it takes :)
    Not saying we don't like questions, of course :)

  10. 18 hours ago, Spoonish said:

    Which phone do think is most excellent for this extremely gnarly know how?

    Bill and Ted was on tonight. I can’t get this voice out of my head.

    Rooted Razer phone would be quite juicy, especially with that 120 Hz display..IPs would still race across your screen - but smoothly. :P

  11. 5 hours ago, barry99705 said:

    We found out the hard way, ms can't restore individual email accounts in 365.  Client clicked on somethig that installed a virus that blew away his contact list.

    Weeeeeeell, you can actually - there are 2 ways to do it (both using the same method, it's just 2 ways of doing that method). The 365 Admin console has a restore user area, but you can do it via a PS session to the mail server as well, it's just less straight-forward.

    Unless you mean something different when you say "individual email accounts"? I don't know - I would assume you're talking about restoring user mailboxes.

    https://technet.microsoft.com/en-us/library/dn186233(v=exchg.150).aspx

    https://support.office.com/en-us/article/restore-a-user-in-office-365-2c261e42-5dd1-48b0-845f-2a016d29cfc1

  12. We had a discussion similar to this about a year ago, see what you can get from it but it may not be overly helpful, sorry about that.

    I'm not aware of anyone building an IMSI catcher from a WiFi network on the forums, but maybe you can find answers in the below link or do your own research around Google. 

    Good luck! :)

     

  13. On 4/8/2018 at 4:06 AM, Altar314 said:

    Just to make sure I have this correctly, you intentionally infected your phone to be able to do that? 

    It's basically acts as an "open" inside device, allowing himself to remote into his phone which is on the network and from there he can perform diagnostics. Simple trick, but effective. I just wasn't used to the terminology you guys are using.

  14. Still would take more time to build a Clonezilla server than to go around 5 PCs and manually put in everything you wanted.

    Unless, of course, you only had 1 monitor and a keyboard. The pain.

    That said, you could use a WDS server, and I know a few who do use it for their clients because of how large they are.

    2 minutes ago, barry99705 said:

    Their biggest complaint was that they couldn't connect their couple administration surface pro's to the exchange server.  "Because you can't connect office 2013 to exchange 03..." 

    Exchange servers and Office are always a fun combo.

    "What's that? You want to use Office 2016 with Exchange 2007? Good joke!"

    or..

    "What's that? Autodiscover doesn't work on Office 2016? Yeh. I know."

  15. 1 hour ago, barry99705 said:

    We took over a school district for a year like that.  Looked like someone read a book on group policy, then enabled it all...  Down to the point of setting individual computers with individual printers.  It was a freaking nightmare to clean it all out.  We dropped them as a client because they wouldn't purchase new windows licenses.  Whoever ran the place before us made due with 4 licenses across the whole system.  :ohmy:

    I bet they were real happy when you said "okay, first things first, you need to buy some 200 Windows licenses to get everything legal and up-and-running without any problems" :lol:

  16. 8 hours ago, ae3erdion said:

    I tried the subsystem and its annoying. Do you recommend a dedicated pc/laptop with kali install or run kali as a live distro? 

    Subsystem as in USB live boot? Yeah, well it's running off of a USB..

    You could dual boot, you could have a dedicated machine, you could have a VM..

    VMs are harder to quickly spin up and use if you're opening a laptop in the field - it's not as convenient as a dedicated laptop. Dual boot has a similar problem there, but at least you can have Windows or something on the side for general use. Dedicated laptop is probably the best option you have for convenience, but if you're looking to just have a play with Kali then use a VM or live boot USB with persistence.

     

×
×
  • Create New...