Jump to content

chrizree

Active Members
  • Content Count

    109
  • Joined

  • Last visited

  • Days Won

    6

2 Followers

About chrizree

  • Rank
    Hak5 Fan ++

Profile Information

  • Gender
    Male
  • Location
    localhost
  • Interests
    Anything IT related and... a lot of other stuff

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. What encoder are you using when creating the inject.bin file?
  2. Even though the Rubber Ducky is a useful tool, it wouldn't be my go to solution for this particular scenario. It all depends on the use case, but... even with only a small amount of Chromebooks to enroll, I would most likely select another path to glory than the little duck friend.
  3. Are you using some special character as a part of your password that might not be appreciated by the Cloud C2 instance? (Don't expose your password here though :-) )
  4. I guess you are referring to the Chromebook enrollment script that is available at https://ducktoolkit.com/ I don't have access to my Ducky at the moment, but I think that the version/variant of Ducky Script available to the Rubber Ducky doesn't allow the use of variables like that. The Bash Bunny would work though, but that's out of scope here. The below payload uses variables, but use "Ducky Script 2.0" that is not a part of the Rubber Ducky. https://github.com/hak5/bashbunny-payloads/blob/master/payloads/library/android/open_url/payload.txt
  5. Agree, the Police is the place to go, not an internet forum if truly followed with possible bad intentions behind it all. That scan list is no proof of being followed. The only thing it tells us is that it's either a severely misconfigured router or that a scan is conducted that doesn't show the true internal network of the user. Unless owning the right to use the 24.0.0.0/24 network, it can't be used for private purposes since it's a public routable IP address range on the internet. And, as long as you aren't an official in the Comcast organisation, you can't use that range for your own
  6. You could check /sys/kernel/debug/crashlog I have reset my Pineapple so I haven't got any active VPN configuration/setup to try and I won't spend any more time on that since it's clearly not working. I just issued echo c > /proc/sysrq-trigger to force a kernel panic and that got stuck in the crashlog file so I guess the Pineapple should be set up out of the box to trap the eventual/possible kernel panic that the VPN connection produces.
  7. It is "standard procedure" when upgrading Cloud C2 to version 3.0.0. You have to assign your devices to a site. It's described in the release thread on the forum. https://forums.hak5.org/topic/53473-release-hak5-cloud-c2-30x/
  8. There is at least some degree of built in "security by obscurity" in the use of port 1471, i.e. a user won't accidentally land on the web admin GUI just by loading 172.16.42.1 and some active port scan is needed to get hold of the port in use. You could alter the configuration of nginx to limit the client IP address(es) that can access the web server on the Pineapple. Use a static IP address outside of the DHCP scope and allow only that IP address to access the web admin GUI on port 1471. It's not at all bullet proof though since someone might test each address outside of the DHCP scope a
  9. I forgot a "Q" for the last DELAY in my sample script code, but it should run anyway. Since you are using the "standard" LED modes elsewhere in the script, you could use LED FINISH in the end instead of LED G, but that's just aesthetics really.
  10. First of all I would get rid of the line containing #!/bin/bash Q SET_LANGUAGE dk should be replaced by DUCKY_LANG=dk Each DELAY should have a Q or QUACK in front of them The GUI r could be deleted since it's about to do the same thing as the RUN WIN line The STRING line should also have a Q or QUACK in front of it Something like this: LED SETUP ATTACKMODE HID DUCKY_LANG=dk LED ATTACK RUN WIN "notepad" Q DELAY 450 Q STRING "Hello world" DELAY 100 LED G
  11. I have had the same experience recently, but no solution for it. It's discussed in the following thread https://forums.hak5.org/topic/53253-how-to-configure-vpn-client-to-auto-start-with-the-nano/ I've also "alerted" about the fact in the release thread for the Nano, but I guess it won't be fixed. There has been VPN kernel panics related to the Pineapple that was said to have been solved in the latest firmware release, but it seems as it wasn't 100% successful. https://forums.hak5.org/topic/51575-release-wifi-pineapple-firmware-v27x/
  12. 3.0.0 works like a charm! Update was a total breeze, thx! 🙂
  13. OK, then you are at least able to download the modules you want to get hold of. What OS are you trying to set up network sharing with? I assume that you have already followed the instructions in the official documentation (if you are using Windows or Linux). https://docs.hak5.org/hc/en-us/sections/360002204513-Internet-Connectivity Please be more detailed in describing the steps you have taken and when you get stuck in the process.
  14. Depending on what part of the world you are living in, the chance might not be missed after all. There are at least 3 resellers within the EU that has the Signal Owl in stock at the moment. More expensive, yes, but still a possible way to get hold of a brand new one.
  15. Have you tried to wrap the string with quotes? I.e. "~/Library/LaunchAgents/ >> $lootdir/LaunchAgentsUSER.txt" or... escaping the special character \~/Library/LaunchAgents/ >> $lootdir/LaunchAgentsUSER.txt
×
×
  • Create New...