Jump to content

NoExecute

Active Members
  • Content Count

    48
  • Joined

  • Last visited

  • Days Won

    2

About NoExecute

  • Rank
    Hak5 Fan +

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Hi there... So, you want to control you home workstation, from another machine, because your workstation at home is connected to a work network ? If you asked, and got a no, respect that no.. Or, if the workstation is a laptop, take it with you, and ask for VPN access / Direct Access hookup in a roadwarrior setup. Everything else, forget it. Being undetectable is not easy. All they have to do is check who connected remotely and they got you. Turn on the cam, if present, and they got you once again. Monitor keyboard strokes, watch network traffic.. etc etc...do I have to continue ?
  2. Well, it depends... Recently I switched to a Google Pixel 4A-5G, and so far it's been amazing. But, one of the reasons I got it, we're because I needed a phone that could run Graphene OS, and it's only built for Pixel line of phones. https://grapheneos.org/ https://www.blackdragon.se/index.php/articles/87-google-pixel-4a-5g-and-grapheneos So far it works as expected, no issues what so ever, so for something not locked into Google, without Google apps, and security hardened, I would say, try it :) /NX
  3. It's not the open port alone, that's not enough :) It requires something that listens / answers on that port, and that service have to be misconfigured, or exploitable for it to be used as an attack vector. But, of course it also needs to be open, for something to go through to the service, and the firewall have to allow outbound connections back :)
  4. arpspoof 🙂 if you're on Kali apt install arpspoof man arpspoof
  5. Hmm, good question. I really depends on what you can afford, and how you'll be using it I think. For longer sessions (8+ hours), I run a Thinkpad T, 14 inch, 12 GB ram, 200 GB Sata, and it's enough. Pop Linux on it, and keep a spare disk with Win 10 for windows related stuff, and you're good to go. For shorter sessions / everyday stuff, I run a Thinkpad X240, 13 inch, 110 GB disk, 8 GB RAM. It's good enough, but for 8+ hours, it get a bit small, so eyestrain may be an issue on longer sessions, but it might not be a problem for you. I would say, go for good hardware, with a good build q
  6. If you haven't, try an nmap -A <target-IP> against it, and see what it comes up with. Port 9100 could be print services, and port 4000 is used for a lot of stuff, diablo 2 among other things 🙂 Can you do an arp poisoning, and redirect traffic, and fire up Wireshark ?, maybe that could provide a clue, or try to see what device manufacturer is owning that mac range (The first 4)
  7. Hmm.. First, what you're asking is not simple, not if it has to be multiple platforms. Next, evading AV is a topic on it's own, and takes a lot of work. So, what you're really asking is, if someone is going to feed you a 0-day backdoor used for spying on other people, capturing keystrokes and doing pretty bad sh*t ? As others have pointed out, this is a legal forum, we can't assist you with this, as we have no way of knowing you're gonna use this legally. If something like this is what you really want, get working on it in a lab, what you're asking is possible, but a lot of work
  8. Well, if you're going after a whole network, i would think about something like Packet Squirrel, placed right around the router. But, another option is to build a small implant box, based on Odroid C2, with a USB ethernet adapter for using two eth interfaces. It have a lot more power and usecases than a packet squirrel. So, if you're looking for options according to price, the Odroid or something like it, is your best bet. Shark Jack could be an option, but i don't see it as an option to attack a whole network. Maybe for running a quick NMap scan for recon work, and port scans, but f
  9. NoExecute

    HackRF

    As pointed out, the HackRF doesn't come with software, it's basically a radio reciever / transmitter in a box, so you'll need software to control it, and what software depends on what you want to do with it. Are you just out to listen to FM radio, tracking airplanes, or hacking alarmsystems, or making your own pirate radio station ? The HackRF can be used for it all :) So, what operating system are you using ?, Windows, Linux or Mac ? If linux, a good place to start is https://github.com/mossmann/hackrf/wiki/Getting-Started-with-HackRF-and-GNU-Radio If it's for hacking / protoco
  10. Well, I'm thinking that it would be hard to implement in something as small as a charger. But, built into a powerstrip, sure. Something like gumstix embedded boards can do that, or raspberry PI Zero W. There's even a Kali image for Zero W, to make it easy to build. The microphone bug, is something else. You "could" find schematics for small RF bugs, or buy them, they are pretty cheap to make. For recieving and recording, use a phone, or use private out-of-band frequencies on a HackRF. The trouble is, that this is illegal to do. Most countries outlaw transmitting on out-of-band f
  11. Hey there :) Well, first off. There's no need to lower the firewall, or turn on everything :) You see, DHCP, provides your machines on the inside with an address, BUT the modem / router have an external address. You cant access the internal addresses directly. So for connecting from the outside, you need to figure out what the external address is (whatismyip.com) can do that for you. When you have the external address, you need a server or two / or remote desktop / SSH enabled. When it comes to exploits, it's another matter. standard exploits / shells connect attacker --> target,
  12. Hmm.. Since you're working on a fresh Windows 10, sure you're not just getting caught by Antivirus ? It's pretty normal that it will stop you, unless you do something to avoid it. A lot on what used to work in Metasploit are getting caught these days, so you're up for some interesting research work, to get it to work :)
  13. As Digininja allready said, run along kid, we can't help you 🙂 Seriously though. You say it's a remote system, not in your possession ?, do you have written consent to attack it, can we see it ? If not, you're comiting a crime, stop it, right now, and go do something else, something more constructive for society. Try helping out at the local homeless shelter for a while, donate to the homeless ?
  14. Okish, let's try this. If you run a whois against 85.17.135.243, you should get this inetnum: 85.17.135.192 - 85.17.135.255 netname: LEASEWEB descr: LeaseWeb Netherlands B.V. Note inetnum so Leaseweb own's all IP's in the range 85.17.135.192 - 85.17.135.255 SO, they can, and did assign an IP of 85.17.135.243 to webservice.be. (That's a webservice. SO, they can use namebased Apache virtual hosting, to host multiple sites on that single IP) since you find 110,995 ports open, it's maybe a primary mail server used for namebased virtual hosting, and 14
  15. There would be a mail server running on the primary server. Confirm that with a portscan against the primary server. Like in your listings, there "could" be a mailserver on altgroupltd.com. In the case of mdmconsultancy, it's called mail, and a separate domain name called mail, so the FQDN is, have the mail.domain.com. Remember domains are read from right to left, with the country as place / value one (toplevel), place two (primary domain), and three (subdomain/ hostname), and four --> x being subdomains / hostname. And for which company provides the services ?, who owns the IP a
×
×
  • Create New...