Jump to content

Bob123

Active Members
  • Content Count

    178
  • Joined

  • Last visited

  • Days Won

    6

About Bob123

  • Rank
    Hak5 Zombie

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Bob123

    red led

    Have y'all tried a different firmware on the duck? Try twin duck and see if that helps at all. Mine are on that firmware and I've never run into this issue.
  2. Dumb question but did you take that notpad file and convert it into an inject.bin file? https://docs.hak5.org/hc/en-us/articles/360010555093-My-USB-Rubber-Ducky-shows-a-solid-red-LED-now-what-
  3. I know I didn't mean to. This one was more directed towards justLooking but then thought others might not see my general question. Let me know if you want me to remove any or all.
  4. Hello everyone. I have an interesting question that I hope someone can answer. Basically what I'm after is, a standard 64bit Kali or Parrot VM that you can download that comes with all the pentesting tools like metasploit...can you actually hack a Win10 64 bit box with it? I'm asking because I went through the cyber mentor's online class, I follow hackersploit's youtube videos, and there seems to be something wrong and I'm just not so sure it's me anymore. I have two Win10 VMs and now the same but physical, on two networks and all I want to do is pivot. I have usernames / passwords. I've
  5. So I'm going to ask a question here and maybe even make my own topic on it cause this ones a bit interesting... So the issues I'm running into seem to really stem from the architecture. The win10 VMs from cyber mentor and now my physical win10 boxes that I'm practicing on are all 64bit. The vanilla style (if you will) metasploit that comes with both Kali and Parrot can do both 32bit and 64bit...but can it really do 64bit? Or is this really something that is more tailored for metasploit pro which is paid for? I'm about to start testing on win10 32bit just to see if any of these issues go a
  6. I started to mess with GNS3 then like you said, got sidetracked. For cyber mentor it was chapter 19 post exploitation. He talked about pivoting, modified the VMs a bit and showed it working. I did the same but couldn't pivot for some reason. I tried multiple Kali and Parrot VMs with and without armitage all with no luck. I did however try it on some older xp VMs and I could pivot just fine. So either I missed a step or he left a step out. But either way I would like to get it to work. I'm going to start messing with them again now.
  7. Hey justLooking. If your doing the The Cyber Mentor course where he has you create VMs and a domain and all that, when you get to pivoting between the two VMs could you let me know if you get that to work? I couldn't and couldn't figure out why. I'm going to try again today or tomorrow using a different approach but I could pivot between some of my old winxp VMs like nothing...I just can't seem to do it using the VMs I created for his course. Thanks.
  8. Can you give me a few examples and I can try to repeat the process with mine? I've only done a packet capture a few times and it seemed like it was all there...but that was several years ago. Thanks.
  9. Naw I'm not going to smash it. I reformatted it as NTFS for now. Still probably won't trust it. I'll give the sdcard formatter a go. The Bus Pirate v3 looks interesting. Bit pricey but cool. Thanks everyone!
  10. Well never mind. I tried reaching out to both the creator of the vulnhub vm and jackk neither of them are probably around. Anyways I ended up using a different exploit to gain root, then using the python SimpleHTTPServer I was able to rewrite the passwd file like it showed in jackk's video. So I'm happy.
  11. Hey quick question. I know all of this is quite dated but I just thought I'd play around and see what happens. So I have the basic pentesting 1 vm from vulnhub. I'm watching Jackk's ctf walkthough and at the end he wants to modify the passwd file and then send it back through meterpreter to the ctf vm. His works and he becomes root. Mine spits out core_channel_open: Operation failed: 1 which according to what I found on google means I don't have permission. How did he get permission and I didn't when we both did the exact same thing??? Just wondering. Thanks.
  12. Thanks guys. I don't know though...it was already binned. I'm thinking smashing it might be my next order of business.
  13. So check this out. I attached a pic so I'm not crazy. But I have a 16GB thumb drive. It's a POS that I pretty much had given up on. Recently I was going through my jar of pooped out thumb drives and I found it. I inserted it, formatted it, and attempted to give it a new mission in live. I through a bunch of video files on it and also used it to move some work stuff around today. So later today I had it plugged into my laptop, closed the laptop and walked away. I came back to the laptop and saw the drive flashing away. I opened my laptop and found my files all jacked up. The attached
  14. Nicely put Struthian! I've tried to help out in other parts of this forums when someone is unhappy with a product and I typically get crickets. So I don't think they are truly looking for help. They're just not happy that it doesn't work out of the box. And if I'm wrong by saying that then let's all work together and make it work the way we want. JeffP, if it's still in the garbage can I have it? Thanks.
  15. You know to a point I do feel your pain. I myself have had some pains with Hak5 over the years. But I guess the question really becomes, what did you expect, and what are you aiming for? A $5 rpi zero can do everything the duck can do. Does it look as good as the duck? No. Is it as easy to program as the duck? Big No. But then again why are you buying a duck if you don't at least know some programming? The idea of the Hak5 tools were never meant to be plug in play. I think they started going in that direction because we as humans have gotten to that point of expecting things to just
×
×
  • Create New...