Jump to content

Bob123

Active Members
  • Content Count

    177
  • Joined

  • Last visited

  • Days Won

    6

Everything posted by Bob123

  1. Dumb question but did you take that notpad file and convert it into an inject.bin file? https://docs.hak5.org/hc/en-us/articles/360010555093-My-USB-Rubber-Ducky-shows-a-solid-red-LED-now-what-
  2. I know I didn't mean to. This one was more directed towards justLooking but then thought others might not see my general question. Let me know if you want me to remove any or all.
  3. Hello everyone. I have an interesting question that I hope someone can answer. Basically what I'm after is, a standard 64bit Kali or Parrot VM that you can download that comes with all the pentesting tools like metasploit...can you actually hack a Win10 64 bit box with it? I'm asking because I went through the cyber mentor's online class, I follow hackersploit's youtube videos, and there seems to be something wrong and I'm just not so sure it's me anymore. I have two Win10 VMs and now the same but physical, on two networks and all I want to do is pivot. I have usernames / passwords. I've
  4. So I'm going to ask a question here and maybe even make my own topic on it cause this ones a bit interesting... So the issues I'm running into seem to really stem from the architecture. The win10 VMs from cyber mentor and now my physical win10 boxes that I'm practicing on are all 64bit. The vanilla style (if you will) metasploit that comes with both Kali and Parrot can do both 32bit and 64bit...but can it really do 64bit? Or is this really something that is more tailored for metasploit pro which is paid for? I'm about to start testing on win10 32bit just to see if any of these issues go a
  5. I started to mess with GNS3 then like you said, got sidetracked. For cyber mentor it was chapter 19 post exploitation. He talked about pivoting, modified the VMs a bit and showed it working. I did the same but couldn't pivot for some reason. I tried multiple Kali and Parrot VMs with and without armitage all with no luck. I did however try it on some older xp VMs and I could pivot just fine. So either I missed a step or he left a step out. But either way I would like to get it to work. I'm going to start messing with them again now.
  6. Hey justLooking. If your doing the The Cyber Mentor course where he has you create VMs and a domain and all that, when you get to pivoting between the two VMs could you let me know if you get that to work? I couldn't and couldn't figure out why. I'm going to try again today or tomorrow using a different approach but I could pivot between some of my old winxp VMs like nothing...I just can't seem to do it using the VMs I created for his course. Thanks.
  7. Can you give me a few examples and I can try to repeat the process with mine? I've only done a packet capture a few times and it seemed like it was all there...but that was several years ago. Thanks.
  8. Naw I'm not going to smash it. I reformatted it as NTFS for now. Still probably won't trust it. I'll give the sdcard formatter a go. The Bus Pirate v3 looks interesting. Bit pricey but cool. Thanks everyone!
  9. Well never mind. I tried reaching out to both the creator of the vulnhub vm and jackk neither of them are probably around. Anyways I ended up using a different exploit to gain root, then using the python SimpleHTTPServer I was able to rewrite the passwd file like it showed in jackk's video. So I'm happy.
  10. Hey quick question. I know all of this is quite dated but I just thought I'd play around and see what happens. So I have the basic pentesting 1 vm from vulnhub. I'm watching Jackk's ctf walkthough and at the end he wants to modify the passwd file and then send it back through meterpreter to the ctf vm. His works and he becomes root. Mine spits out core_channel_open: Operation failed: 1 which according to what I found on google means I don't have permission. How did he get permission and I didn't when we both did the exact same thing??? Just wondering. Thanks.
  11. Thanks guys. I don't know though...it was already binned. I'm thinking smashing it might be my next order of business.
  12. So check this out. I attached a pic so I'm not crazy. But I have a 16GB thumb drive. It's a POS that I pretty much had given up on. Recently I was going through my jar of pooped out thumb drives and I found it. I inserted it, formatted it, and attempted to give it a new mission in live. I through a bunch of video files on it and also used it to move some work stuff around today. So later today I had it plugged into my laptop, closed the laptop and walked away. I came back to the laptop and saw the drive flashing away. I opened my laptop and found my files all jacked up. The attached
  13. Nicely put Struthian! I've tried to help out in other parts of this forums when someone is unhappy with a product and I typically get crickets. So I don't think they are truly looking for help. They're just not happy that it doesn't work out of the box. And if I'm wrong by saying that then let's all work together and make it work the way we want. JeffP, if it's still in the garbage can I have it? Thanks.
  14. You know to a point I do feel your pain. I myself have had some pains with Hak5 over the years. But I guess the question really becomes, what did you expect, and what are you aiming for? A $5 rpi zero can do everything the duck can do. Does it look as good as the duck? No. Is it as easy to program as the duck? Big No. But then again why are you buying a duck if you don't at least know some programming? The idea of the Hak5 tools were never meant to be plug in play. I think they started going in that direction because we as humans have gotten to that point of expecting things to just
  15. Man I'm really not a fan of reliving the past but someones going to have to tell me what they are doing to their Win10 1903 boxes. I have a Win10 1903 with defender on by default. I have a Win10 1903 VM (several) with defender on by default. Granted when I have a payload with mimikatz or anything defender sees it as questionable and instantly deletes it on me which is a huge pain in the... But I have never seen windows defender prevent my inject.bin from running. I'm not even sure how it would see it as it's code execution from within the duck (keyboard)... So I'd like to help but so
  16. Windows has to install drivers to get the duck to work. Are you sure they are being installed during the OOBE? Can you get the duck to do anything during this? Like type your name or anything? If you can get it to do at least something then it's probably a timing issue. Throw a few second delay at the beginning to make sure windows has time to load up the drivers.
  17. The Mark V makes a new TV appearance? It's funny too cause I just dusted mine off yesterday. I'm watching TV today and saw Angie Harmon come on and talk about identity theft. Then Leno appears and talks about something...then they show the bad guys and sure enough they are using a Pineapple Mark V! Thought it was pretty cool. Looonnnggg commercial though. DVR FTW! Guess it was some combo through Norton, Lifelock, and some VPN.
  18. So your kidding me if I type airmon-ng I get command not found. If I type sudo airmon-ng the command runs just fine. Rather than the good old days where you get a small reminder to be root or to use sudo...nowadays we just say command not found? Dumb...
  19. Ok am I missing something? I'm using the latest 2020 VM version of Kali just for testing and helping others. Aircrack-ng is installed but when I type airmon-ng or airodump-ng it says command not found. I've uninstalled aircrack and reinstalled aircrack and still nothing. I built my own VM with kali 2020 and install all tools and airmon-ng and airodump-ng DO work. So what am I missing in the prebuilt VMs? Why is this so hard all of a sudden? Side note but I've noticed over the years the VMs seems to have less and less or less and less work out of the box. Is there a reason f
  20. What version of Kali are you using? I don't know what the heck I'm missing but my 2020 vm has aircrack but not airmon or airodump. So I'm curious what I'm missing.
  21. I don't know that I've ever done an upgrade before. Were you using KDE on 2020.1? And then after the upgrade it defaulted back to XFCE?
  22. So in vmware it seems that I can get the AWUS036NEH to work on Kali 2019.2 and before but NOT Kali 2019.3 and forward. Using uname -r I get: Kali 2019.2 => 4.19.0-kali4-amd64 Kali 2019.3 => 5.2.0-kali2-amd64 So I guess when the kernel went from 4 to 5 we lost support for the AWUS036NEH. I also have an AWUS051NH and so far it works on everything up to 2019.4. I haven't tried the 2020's yet as I have to modify my VMs and I haven't done that yet. I'm also downloading the ISOs as I want to see if the AWUS036NEH's work in those as Mauley stated. I'm curious why it would wo
  23. Upgraded from what? Did you do a fresh install? Looking through their site they said if you want anything besides XFCE download the "installer" iso not the live iso. Then it'll give you an option at install for KDE. Hope this helps. If not let me know and I can dig a bit more.
  24. I did the same tests on my desktop today with USB3 only and everything seemed to work fine. Guessing a driver issue or maybe it is some sort of hardware issue. Let me know if you end up trying anything else.
×
×
  • Create New...