Jump to content

F0x3nB0x3n

Active Members
  • Content Count

    25
  • Joined

  • Last visited

About F0x3nB0x3n

  • Rank
    Hak5 Fan

Profile Information

  • Gender
    Not Telling
  • Location
    New Zealand
  • Interests
    Your mum

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Can even get a pretty web UI for it: https://www.kismetwireless.net/development/kismet_webui_tour/ That and the Pi Zero only has one USB data port, the other is power only.
  2. Depends on the password. If it's a website, most sites use SSL these days - so the data is encrypted even if you managed to get hold of the packet(s) that contains credentials. If you're on an wired network, it's unlikely you'll be able to sniff packets of other machines unless you're both connected to an ancient hub of some sort - not a switch. If it's WPA/WPA2 wireless network - best you'll get is the 4 way handshake, which you'd then have to bruteforce - again, because it's encrypted.
  3. afraid you've checked pretty much everything I would have checked too...different PSU, different CPU, test the caps. Is the power cord plugged directly into the wall, or through a multiboard / adapter? If so, could try bypassing that too. Guess you could try posting the same question somewhere like Tom's Hardware: https://forums.tomshardware.com/forums/motherboards.5/
  4. Works well, apart from having to keep 3 operating systems up to date 😂 Installed it in the following order: Windows 10, Ubuntu 19.04, Kali 2019.2 Even the UEFI side of things appears to be working well (though I've disabled SecureBoot). Made sure I had at least 512MB for the EFI partition when I did the first bit of partitioning of the drive for Windows.
  5. Pretty sure the WPS push button systems have a timeout, so may be a bit inefficient. To be honest, if I were pentesting in an area where the router was physically accessible, the first thing I'd do is plug in ethernet and try some default router credentials. Failing that I guess you could feed the pin into reaver. Or perform a manual connection using the pin if you're running linux....sometimes stores the PSK in /etc/network/interfaces in plain text.
  6. I triple boot....Windows 10 for Windows only software, Ubuntu (Budgie) for my desktop & Kali for security. I prefer to use Kali for what it was intended for rather than try to use it as a daily driver.
  7. You mean....like Google Assistant, Alexa and Siri? 😂
  8. Having completed my Gentoo phase about 15 years ago (even going as far as performing a phase 1 install)....I think I'll pass 😂 I'm more inclined to stick with Kali from a support / maturity point of view. However, Parrot is looking a lot better these days, check out this Nullbyte video from a few months ago:
  9. I use Proxmox VE, works great - supports SPICE and USB passthrough. https://www.proxmox.com/en/proxmox-ve
  10. how much did the downloaded file size come to in the end if you don't mind me asking?
  11. F0x3nB0x3n

    WPA2 Hacking

    Assuming it isn't an incorrect capture file....could it be something super simple like not clicking a save button, or needing to reboot the router after the password change is made?
  12. Used to like my dirty old hardware KVM switches, even got to use an IP based one a few times....so it was physically cabled to the keyboard, mouse and VGA - with an ethernet port to connect it to the network. Only downer was that it needed Java 🙃
  13. Great idea! I'd be keen to see a build log! 🙂
  14. F0x3nB0x3n

    Vaskis

    Short answer is, it'll do it provided you can get your delays right. However, how much time will it really save? Some vendors also provide BIOS tools, depending on the make of the device.
  15. You're right. The pain comes when it's time to find something that plugs into the end of that cable to power the device - a lot are lacking in the amps department.
×
×
  • Create New...