Jump to content

reubadoob

Active Members
  • Posts

    39
  • Joined

  • Last visited

Posts posted by reubadoob

  1. I see them in Barnes & Noble every now and then. I remember thinking how cool those magazines were. Now I just think anything in print related to hacking is dated. Which isn't necessary the case. 

  2. While we all wait I thought I'd put together the Hak5 Kit To Rule Them All (it's a slow day in school today). 

    • Long Range USB WiFi Adapter $19.99
    • Micro Ethernet Switch $14.99
    • WiFi Pineapple - TETRA $199.99
    • WiFi Pineapple - NANO $99.99
    • Hak5 Field Kit Pocket Guide $19.99
    • WiFi Pineappling Book $12.00
    • LAN Turtle - LAN Turtle 3G $250.00
    • LAN Turtle - LAN Turtle SD $54.99
    • LAN Turtle - LAN Turtle Classic $44.99
    • USB Rubber Ducky - USB Rubber Ducky Deluxe $44.99
    • Bash Bunny $99.99
    • Packet Squirrel $59.99
      • SUBTOTAL:  $921.90

    Adapters & Cables:

    • USB OTG adapter
    • Micro USB Y-Cable 
    • USB A to USB C adapter
    • USB A male to female extension
    • Micro SD USB card reader
    • Micro USB cables
    • USB Ethernet adapter
    • Retractable Ethernet cable
    • Elite Hak5 Gear organizer
    • Pair of Trust Your Technolust key-ring flight tags
    • Anker PowerCore+ 13400 USB Battery
      • SUBTOTAL:  $????

    1yapuu.jpg

  3. I'm currently a student at a cyber security specific school/bootcamp. I just finished my 2nd week of 12. We're in class M-F 40/week at a minimum. Sometimes school work is done on the weekend in class as well. 

    Some of the instructors have a wall of certs some have 0 certs. But the reoccurring message is the same:

    Do you have the grit/drive/chutzpah/huevos/curiosity,  to put one foot innfront of the other and keep learning/discovering/asking questions/researching?

    If you lack effort I would not recommend the cyber security and pen-testing career field. No certificate can make up for genuine passion. 

  4. Currently on MassDrop.com are several Hak5 items including the Bash Bunny, LAN Turtle, USB Rubber Ducky and few others . 

    For those who don't know what MassDrop.com is, it is a community submitted group-buy website. Anyone can submit a product or category of products vote on them and MassDrop will contact the community selected product & company and hopefully be able to work out group-buy/discount. 

    I say all that to point out there has already been voting going on for "Penetration testing research tool". Currently the Hak5 USB Rubber Ducky is in the lead with ~333 votes. Once the poll reaches a total of 500 votes MassDrop.com reaches out. The current polling results can been seen here. The poll is currently @ ~455 votes so it only needs ~45 more. 

    So go vote! 

  5. 26 minutes ago, Dave-ee Jones said:

    Don't get into the mindset that the 3G LAN Turtle = Packet Squirrel - they are 2 different devices.

    The Packet Squirrel was announced a month or so ago, however no one (except Sebkinne) knows what it is, and the 3G LAN Turtle is just a LAN Turtle with 3G support (for an external VPN).

    Yeah it was pretty clear from @Just_a_User post the Packet Squirrel is something new all together. 

     

    But when you say 

    Quote

    the 3G LAN Turtle is just a LAN Turtle with 3G support (for an external VPN).

    Are you saying it was just a one off creation? Because in the context of the other thread, Lan Turtle 3g, it seemed like it was a version 2 of the LAN Turtle with a price tag. 

     

    I know we're getting off track here but if there is another LAN Turtle coming which will solve my original question of how to go about  getting the IP range of a Target/Victim network I may consider holding off  purchasing the current gen Turtle. As oppose to trying to piece together some bash script (I know next to zilch about coding, especially for the LAN Turtle) I get this concept of how the current LAN Turtle would go about doing it just don't have the skillz myself to do it. Yet...

  6. Hello all!

    I was recently watching the video Access Internal Networks with Reverse VPN connections - Hak5 1921 and around 15:15 of the video @Darren Kitchen mentions:
     

    Quote

    ...there are many ways using the turtle to find out what ip range the network you've connected is...

     

    I was wondering what are some of those "ways" the LAN Turtle can discover the IP range of the network it's connected to and then make itself available for connection via VPN?

    Not doubtful just interested in learning the process!

    Thanks!

×
×
  • Create New...