Jump to content


Active Members
  • Posts

  • Joined

  • Last visited

About AgtShadow

  • Birthday 11/26/1990

Contact Methods

  • MSN
  • Website URL

Profile Information

  • Gender
  • Location
    Fresno, CA
  • Interests
    Frontend Web Design & Development. Web Pages & Web Applications. Penetration Testing. Husband, Father and Full-Time Student. Content Creator with 10,000 Subscribers.

Recent Profile Visitors

663 profile views

AgtShadow's Achievements

  1. Hello everyone. My name is Austin, and my name AgtShadow comes from a mix of my YouTube Channel, Shadow Gaming, and my Kali Linux username, agtshadow. I am a husband and father of two children, an 8-year-old boy and a 4-year-old girl, and my wife and I have been together for ten years this September 14th and married for 4 of them. I am a Frontend Web Designer & Developer. Used to be a truck driver and then a local truck driver here in Fresno, CA, but by the time I turned 27 or so, I decided I could no longer be a truck driver. I began truck driving to support my wife and children and afford our property taxes and bills after selling the property I inherited when I was 18 years old to have a home with no mortgage and raise our children safely without too many issues. I managed to support my family through YouTube / Google AdSense Revenue and Financial Aid from my college. At the same time, I attended and received my Certificate in Web Design & Associate Degree in Web Design / Information Systems. I currently work at my college in two departments, IT & Web Design/Marketing. I love it here and really enjoy helping the students and all my coworkers are lovely people, and the college is near our home. Hence, our lives circle around in this good suburb of Fresno, CA, and I have never been happier in my life, minus a few significant issues going on right now. For pentesting, I got into Linux virtual machines shortly after experimenting with Node.js / Vue.js and eventually React.js frameworks and more like Git Bash, etc. I then tried Windows Terminal and loved it, then tried VMware Workstation Pro 15 at the time and absolutely fell in love with Kali Linux in particular as my first attempt at learning the Linux Environment. I know I should have tried Ubuntu or something else). Still, it worked out regardless, as I am about 10 months into learning pentesting. I now have my Bash Bunny Mark II, Panda PAU06 WiFi Adapter for Monitor Mode / Wireless Pentesting. I am just here to keep learning more and more as a passion of mine. I want to contribute to this community and the cybersecurity community to make the online world safer as we become so reliant on online use every day of our lives. Here are some links to possibly understand me a little better or follow me if you are interested. I plan on making some videos on my channel regarding the Bash Bunny and Pentesting once I get better at it and am able to write my own payload. YouTube Channel: https://www.youtube.com/c/ShadowGaming99 Portfolio: https://www.austinspragginsportfolio.xyz/ Main Website: https://www.shadowgaming.network/ Please give me feedback on anything I share or converse with everyone about. I am here to learn and use that knowledge to help people and need constructive criticism and help from time to time. Thank you all for reading this and thank you to @Darren Kitchenand everyone at Hak5 for what you do. Sincerely, Austin / Shadow Gaming / AgtShadow / root@agtshadow
  2. Hey @Darren Kitchen It is wonderful to see you are still highly active in the forums and everywhere within Hak5. I highly respect your character, attitude, personality, and intellect and how much you have accomplished in the pen-testing / cybersecurity world. Plus, your show is fantastic as well. Overall I have become a fanboy of Hak5, haha. So, first off, I should test this at home when I have the time, but hopefully, you can just possibly answer my question before I even get home. I have my BB Mark II plugged into my Kali Linux virtual machine on my work laptop in arming mode, and the interface seems to not detect it. Neither does it if I put it in Switch 1 or 2 with payloads using Ethernet/Mass Storage. Here is a link to an image of me attempting this on my lunch right now: https://imgur.com/gallery/3WifEOM Also, I have been given permission and authorization to test payloads on our machines at work. So, I have been looking out for new payloads, pull requests, and more on these forums, as well as payloads that work or ones that are obsolete since I have full access to Windows 10, Mac, Linux PCs, laptops, and all sorts of hardware and network switches, etc. As long as I do not leave the campus with sensitive data, I am fine. Anyway, I am using my Kali Linux VMware Workstation Pro 16 to arm payloads, write my own, use the BB Manager, and everything else with the Bash Bunny Mark II since I am mainly on Kali Linux anyway. Windows 10 loves to mark everything as a virus, and it is much easier to just use it in Linux for arming mode. I need to learn more about PowerShell and more so I can write some payloads that would be a great asset to the Hak5 community. I believe in everyone here as they all seem to be white hat pentesters and work hard to make this device and the rest so much better. I am a Frontend Web Designer & Developer but looking to get my OSCP certification and learn penetration testing in the meantime over these past 10 months or so but still new to it after nearly a year. Especially the password cracking but eventually figured it out in time to image all the computers in that cybersecurity classroom and move onto the next assignment for our IT Department, and the instructor is still unreachable. I managed to dump the credentials of our AC1-145 classroom at CCC, where I work in the Web Design/Marketing and IT Departments at my College. As much as I love designing web pages, web applications in Vue, React, and the triad of standards, I am just too passionate about pentesting and the Linux environment to ever give up on learning it. I hope to be a great asset to cybersecurity and the Hak5 forums and GitHub Repositories, etc. We needed to get the Onboard NIC password and eventually the instructor's station since he is on vacation until the campus is back open. We have been unsuccessful in contacting him still. Still, because I had the Bash Bunny Mark II, over 60 computers and students will have their computers ready to use next week for their cybersecurity courses. So, thank you for everything you have done in the cybersecurity community and world. I was able to get the password from the student's computers (Dell OptiPlex) which I never had attempted before but got it. Then, I was able to get the hash string and use Hashcat to get the instructor's password. Not only was it a wonderful learning experience and exciting, but I also was paid to do it since I was on the clock working that day. I hope to be helpful to Hak5, our community, and the cybersecurity community, in general, to make the online world safer as I learn more, but I need to get past some of these beginner hurdles first. My main questions are more than likely quite simple ones, but I am still learning the Bash Bunny Mark II, Ducky Language, Bash/Shell Payloads, Python (still find Vue/React easier somehow), and overall the Linux pentesting tools. I still struggle to find the correct listening port for Metasploit payloads and exploits and other simple pentesting tools, but overall I am here to learn and help eventually. I am going to finish my lunch and get back to work. Hopefully, I can figure out how to make the Internet connection sharing with the BB on Windows and Linux, keep testing older payloads and newer ones, write new ones, and help others that are contributing to the more recent payloads. I have found many of the payloads to not work that I want to get working again. Especially Browser Data and the credential ones. I noticed simple Sophos pre-installed antivirus software from our college to protect our machines from the BB, but I am trying to find ways around it, especially after finals are over this week. I also have a YouTube Channel I used to do gaming on but I might do some videos on the Bash Bunny Mark II once I learn it more but maybe a setup video? Thinking about it all and learning it all still though. https://www.youtube.com/c/ShadowGaming99
  3. It actually worked out to where one of my coworkers remembered the password but now I am working on cracking the string I found just for experience/practice. But, I will close this thread now.
  4. Hey Everyone. So I work for my college and also am finishing my Associates Degree in Web Design and Development here as well but I work in both departments. Web Design / Marketing and IT. I need to reimage all of the Dell Optiplex PCs in AC1-145-146 and I am authorized to use Kali Linux or Bash Bunny to get the Admin password to initiate Onboard NIC since it asks for a password for OB NIC on all 50 computers in those classrooms. No one on-site or remotely working or even the system administrators know the password. Literally, no one here knows the password but the instructor I assume. So, can anyone help us in dumping the password in plaintext possibly? I could use Hashcat to crack it with a Hash string which I think I got with QuickCreds but am unsure. Can anyone help out? Or point me in the right direction.
  5. Ah, that is true. I am starting to rewrite some of them and I need mimikatz for one. We should be able to install: 1. Mimikatz 2. setoolkit 3. airmon-ng I am unsure what else but aren't we able to fire up a Kali Linux VM and launch a Bash Bunny interface or better yet, sudo apt install <package> ? I am going to have to mess with this A LOT more this weekend otherwise most of these payloads are obsolete or work very poorly and I work in the IT and Web Development departments. So, I was able to test this Bash Bunny Mark II on about a dozen laptops today and several PC's and other hardware devices. Whether logged in or not, most of the payloads did not work except DumpCreds 2.1, where I do not see any information of mine that is worth anything to anyone. When I turn the switch on 1 or 2 and plug it in, it goes. We just need more tools and updated payloads that bypass newer issues or more creative ways to do things and my name is AgtShadow and I am here to help and have PLENTY of hardware to test this on (yes, my supervisor knows). So does the network admin haha.
  6. What Payload is this? I haven't been able to get any payload to really work since I got it yesterday. and I work around hundreds of laptops and PC's. It drops in the loot folder, just no loot. What is the nmap payload though? Maybe reset the device?
  7. I am unsure why Hak5 never lets me login until the 7th or 8th time but... What other tools should we be looking to install into the /tools dir? what can we do to make the Mark II better? I just got it yesterday and I am still learning it and work in Web design and IT at my college and this thing is magical, I just cannot get the right payloads to work correctly. I have used 6 of those credential payloads and none of them dumped any correct password or much.
  • Create New...