Jump to content

Bob123

Active Members
  • Posts

    184
  • Joined

  • Last visited

  • Days Won

    6

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

Bob123's Achievements

  1. Bob123

    file location

    Thanks guys that's exactly what I needed. I got the install script to work since pip was upset. And my python script works too! Thanks for the help!
  2. I'm sure this has been asked and explained in the past but I just can't find it. When I plug the bunny in in arming mode, the files I see, where are they located when I SSH in through serial or ethernet? I cannot find the switch positions through a terminal. I'm trying to install some python files and pip isn't happy so I want to just drag and drop them somewhere and then see them in the terminal window. I just don't know how to get to say the loot folder or a switch folder. I'm not sure where they are hiding. Any help would be great. Thanks.
  3. It would be nice to sell this all together for $400 plus shipping. All items in perfect condition. Will try to include whatever stickers and documentation I have as well. US only please. Unless you can guarantee the money and take responsibility for the shipping and customs charges. 1x wifi pineapple mark v 2x rubber ducky 1x lan turtle 1x bash bunny 1x packet squirrel All are in perfect condition and only used a few times to answer questions on here and test a few of my own scripts.
  4. Ok I really hope your take away from my helpful hint wasn't to only do what you did above. There are several payloads that you mentioned didn't work. Several of those use ducky script or have many commands tight together which is why I mentioned adding some delays between the commands. You do understand that what you did above will do absolutely nothing right? Did you see the part where I said verify the code works? USB exfiltrator by itself copies only pdfs and works just fine. Do you have pdfs in your documents folder? Did you try doing an xcopy from your bb to see if you could even copy those pdfs to your bb? Comment out or delete the hidden commands in the files and watch what powershell does. Are you getting errors? You could also remove the whole caps lock blinking. I usually do. Makes it a bit more stealthy.
  5. @Xyvir Sorry I just noticed your post. I don't visit here much anymore as the forums are pretty much dead. 😞 But here's the link that SelfTaughtDude was talking about: https://github.com/hak5darren/USB-Rubber-Ducky/blob/master/Encoder/resources/keyboard.properties
  6. You need to modify the delays and add delays. Take a payload you want to run, make it painfully slow, and verify each step. Then when it works, start to speed it up until it no longer works. 99% of these payloads are too aggressive and never work for me out of the box. I always have to slow them down a bit. If you search around in this section of the forums or even the rubber ducky part, you'll see me say that a bunch of times.
  7. Bob123

    red led

    Have y'all tried a different firmware on the duck? Try twin duck and see if that helps at all. Mine are on that firmware and I've never run into this issue.
  8. Dumb question but did you take that notpad file and convert it into an inject.bin file? https://docs.hak5.org/hc/en-us/articles/360010555093-My-USB-Rubber-Ducky-shows-a-solid-red-LED-now-what-
  9. I know I didn't mean to. This one was more directed towards justLooking but then thought others might not see my general question. Let me know if you want me to remove any or all.
  10. Hello everyone. I have an interesting question that I hope someone can answer. Basically what I'm after is, a standard 64bit Kali or Parrot VM that you can download that comes with all the pentesting tools like metasploit...can you actually hack a Win10 64 bit box with it? I'm asking because I went through the cyber mentor's online class, I follow hackersploit's youtube videos, and there seems to be something wrong and I'm just not so sure it's me anymore. I have two Win10 VMs and now the same but physical, on two networks and all I want to do is pivot. I have usernames / passwords. I've dumbed them down to accept msfvenom payloads...They just don't want to work. My findings so far have been: a 64bit payload and listener work, but then meterpreter, getsystem, and other commands don't seem to work. A 64bit payload and 32bit listener don't work. A 32bit payload and listener work, commands work, but I don't get anywhere. The commands don't error out or stall...but they just don't give me proper info and I think they are trying to tell me that I need 64bit payloads and listeners. I'm assuming Armatige is only 32bit since I can't get anything 64bit to work. Psexec doesn't want to work even though the usernames / passwords are mine since I created them. I'm just stuck. And what makes it very interesting is I never had this issue with WinXP back in the day. So I get that Win10 could be a road block because it's different...but are Kali and Parrot with their version of metasploit also a potential road block? Am I missing something? Will this only work with the paid version of metasploit pro??? It just bugs me cause the cyber mentor never had an issue. Hackersploit did a video on pivoting. He didn't show what was behind the scenes but I followed his commands to the T and it still wouldn't work. I've followed several Medium posts and it hasn't helped... Any help would be great. Thanks.
  11. So I'm going to ask a question here and maybe even make my own topic on it cause this ones a bit interesting... So the issues I'm running into seem to really stem from the architecture. The win10 VMs from cyber mentor and now my physical win10 boxes that I'm practicing on are all 64bit. The vanilla style (if you will) metasploit that comes with both Kali and Parrot can do both 32bit and 64bit...but can it really do 64bit? Or is this really something that is more tailored for metasploit pro which is paid for? I'm about to start testing on win10 32bit just to see if any of these issues go away. Cause with my kali and parrot VMs, I'm to the point where I can't even get psexec to work. Which makes no sense since I know the username/password...since I created them for the box. Anytime I'd create a 64bit payload through msfvenom my listener would crash very quickly. And that was due to using a 32bit listener. A 64bit listener would work but then none of the commands or options seem to work. A 32bit payload and listener work best...but then it seems like "getsystem" and trying to get the hash don't seem to work. And I had zero problems back in the day when I had a winxp setup...
  12. I started to mess with GNS3 then like you said, got sidetracked. For cyber mentor it was chapter 19 post exploitation. He talked about pivoting, modified the VMs a bit and showed it working. I did the same but couldn't pivot for some reason. I tried multiple Kali and Parrot VMs with and without armitage all with no luck. I did however try it on some older xp VMs and I could pivot just fine. So either I missed a step or he left a step out. But either way I would like to get it to work. I'm going to start messing with them again now.
  13. Hey justLooking. If your doing the The Cyber Mentor course where he has you create VMs and a domain and all that, when you get to pivoting between the two VMs could you let me know if you get that to work? I couldn't and couldn't figure out why. I'm going to try again today or tomorrow using a different approach but I could pivot between some of my old winxp VMs like nothing...I just can't seem to do it using the VMs I created for his course. Thanks.
  14. Can you give me a few examples and I can try to repeat the process with mine? I've only done a packet capture a few times and it seemed like it was all there...but that was several years ago. Thanks.
  15. Naw I'm not going to smash it. I reformatted it as NTFS for now. Still probably won't trust it. I'll give the sdcard formatter a go. The Bus Pirate v3 looks interesting. Bit pricey but cool. Thanks everyone!
×
×
  • Create New...