Jump to content

Bob123

Active Members
  • Content Count

    181
  • Joined

  • Last visited

  • Days Won

    6

About Bob123

  • Rank
    Hak5 Zombie

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Ok I really hope your take away from my helpful hint wasn't to only do what you did above. There are several payloads that you mentioned didn't work. Several of those use ducky script or have many commands tight together which is why I mentioned adding some delays between the commands. You do understand that what you did above will do absolutely nothing right? Did you see the part where I said verify the code works? USB exfiltrator by itself copies only pdfs and works just fine. Do you have pdfs in your documents folder? Did you try doing an xcopy from your bb to see if you could even c
  2. @Xyvir Sorry I just noticed your post. I don't visit here much anymore as the forums are pretty much dead. 😞 But here's the link that SelfTaughtDude was talking about: https://github.com/hak5darren/USB-Rubber-Ducky/blob/master/Encoder/resources/keyboard.properties
  3. You need to modify the delays and add delays. Take a payload you want to run, make it painfully slow, and verify each step. Then when it works, start to speed it up until it no longer works. 99% of these payloads are too aggressive and never work for me out of the box. I always have to slow them down a bit. If you search around in this section of the forums or even the rubber ducky part, you'll see me say that a bunch of times.
  4. Bob123

    red led

    Have y'all tried a different firmware on the duck? Try twin duck and see if that helps at all. Mine are on that firmware and I've never run into this issue.
  5. Dumb question but did you take that notpad file and convert it into an inject.bin file? https://docs.hak5.org/hc/en-us/articles/360010555093-My-USB-Rubber-Ducky-shows-a-solid-red-LED-now-what-
  6. I know I didn't mean to. This one was more directed towards justLooking but then thought others might not see my general question. Let me know if you want me to remove any or all.
  7. Hello everyone. I have an interesting question that I hope someone can answer. Basically what I'm after is, a standard 64bit Kali or Parrot VM that you can download that comes with all the pentesting tools like metasploit...can you actually hack a Win10 64 bit box with it? I'm asking because I went through the cyber mentor's online class, I follow hackersploit's youtube videos, and there seems to be something wrong and I'm just not so sure it's me anymore. I have two Win10 VMs and now the same but physical, on two networks and all I want to do is pivot. I have usernames / passwords. I've
  8. So I'm going to ask a question here and maybe even make my own topic on it cause this ones a bit interesting... So the issues I'm running into seem to really stem from the architecture. The win10 VMs from cyber mentor and now my physical win10 boxes that I'm practicing on are all 64bit. The vanilla style (if you will) metasploit that comes with both Kali and Parrot can do both 32bit and 64bit...but can it really do 64bit? Or is this really something that is more tailored for metasploit pro which is paid for? I'm about to start testing on win10 32bit just to see if any of these issues go a
  9. I started to mess with GNS3 then like you said, got sidetracked. For cyber mentor it was chapter 19 post exploitation. He talked about pivoting, modified the VMs a bit and showed it working. I did the same but couldn't pivot for some reason. I tried multiple Kali and Parrot VMs with and without armitage all with no luck. I did however try it on some older xp VMs and I could pivot just fine. So either I missed a step or he left a step out. But either way I would like to get it to work. I'm going to start messing with them again now.
  10. Hey justLooking. If your doing the The Cyber Mentor course where he has you create VMs and a domain and all that, when you get to pivoting between the two VMs could you let me know if you get that to work? I couldn't and couldn't figure out why. I'm going to try again today or tomorrow using a different approach but I could pivot between some of my old winxp VMs like nothing...I just can't seem to do it using the VMs I created for his course. Thanks.
  11. Can you give me a few examples and I can try to repeat the process with mine? I've only done a packet capture a few times and it seemed like it was all there...but that was several years ago. Thanks.
  12. Naw I'm not going to smash it. I reformatted it as NTFS for now. Still probably won't trust it. I'll give the sdcard formatter a go. The Bus Pirate v3 looks interesting. Bit pricey but cool. Thanks everyone!
  13. Well never mind. I tried reaching out to both the creator of the vulnhub vm and jackk neither of them are probably around. Anyways I ended up using a different exploit to gain root, then using the python SimpleHTTPServer I was able to rewrite the passwd file like it showed in jackk's video. So I'm happy.
  14. Hey quick question. I know all of this is quite dated but I just thought I'd play around and see what happens. So I have the basic pentesting 1 vm from vulnhub. I'm watching Jackk's ctf walkthough and at the end he wants to modify the passwd file and then send it back through meterpreter to the ctf vm. His works and he becomes root. Mine spits out core_channel_open: Operation failed: 1 which according to what I found on google means I don't have permission. How did he get permission and I didn't when we both did the exact same thing??? Just wondering. Thanks.
  15. Thanks guys. I don't know though...it was already binned. I'm thinking smashing it might be my next order of business.
×
×
  • Create New...