-
Posts
160 -
Joined
-
Last visited
-
Days Won
1
Posts posted by misfitsman805
-
-
Nethunter?
in Hak5
Wish it ran on more hardware though.
-
@barry99705 Don't you mean the l33t h4x0r color??? :P
The internal wifi card will not show up in any virtual machine that I know of(May be a VM hypervisor out there that has the capability??), Unless it is a usb wifi adapter.
-
Well here is my crappy diagram of the overall network/virtual network setup. Reply if you have anymore questions about the setup.
-
Anything man made is crackable\hackable, one way or another.
-
Just wondering what program are you using to view these properties?
-
I want to hack a site at the URL http://bpcmun.com and it's a cPanel, I tried SQL Injection through havij but I didn't work and I tried another way but I don't have a shelled server so could anyone please help me?
Ahaha aaaaaaaaahhahahahahah ahahahhahahhahhahahahhahahahahahahhahahahaha
-
yes you can do that. But they check how many times the dns names gets a lookup. and it thats to low, you get a mail to see if you still want it active. If you don't click the link keep active the dns will be removed the next month it checks.
So its a pretty good system but not if you only use the dns a few times a year.
DynDns was the exact same way for the free accounts. You would recieve an email about 5 days before the end of the month asking if you would like to keep your hostnames active for the next month. So not really any different from No-IP, except No-IP allows 5 hostnames on the free accounts instead of DynDns' 2 hostnames for a free account. :D
-
Kon-Boot should work just fine on these OS's that it supports.
-
Microsoft Windows XP 32Bit/64Bit (all versions since SP2)
-
Microsoft Windows Server 2003 32Bit/64Bit (all versions)
-
Microsoft Windows Server 2008 32Bit/64Bit (all versions)
-
Microsoft Windows Vista 32Bit/64Bit (all versions)
-
Microsoft Windows 7 32Bit/64Bit (all version)
- Microsoft Windows 8 32Bit/64Bit (all versions, only standard BIOS support - no EFI)
I have personally used it just fine on Windows XP SP2 x86,Windows Vista Ultimate x64,Windows 7 Ultimate x64, and Windows 8/Pro x64 non-EFI Bios.
-
Microsoft Windows XP 32Bit/64Bit (all versions since SP2)
-
Windows 8 Does Not have a Basic, Home or Starter edition. There is only Windows 8 (also known as Core edition), Windows 8 Pro, Windows 8 Enterprise (This edition is available to Software Assurance customers, as well as MSDN and Technet Professional subscribers) and Windows RT (Which is pre-installed on ARM-based devices such as tablet PCs).
Windows 8 (Core edition) does not have Group Policies. Only Windows 8 Pro and Enterprise edition.
Also Windows 8 (Core edition) can not join a windows domain either. Only Windows 8 Pro and Enterprise edition.
So to make a long story short, You will have to find some other software to handle blocking programs and access to control panel etc.
-
If I remember right, if you share any folder on Win 7 the Users folder will also be shared too. I always unshare the Users folder when I share any other folder in Windows. idk what the point of Windows sharing the Users folder is... Most likely you were not Hacked or infected with Virus/Malware. Just Windows being Windows I guess. Hope this helps.
-
and also check GND (ground/mass) very important ;)
Yes I also forgot to mention this. :)
-
Are you using the correct baud rate and settings for the serial port?
Also make sure the TX and RX are on the correct pins.
-
How about Y-Chat? It is X-Chat 2 for Windows. http://www.silverex.org/news/
-
LMAO They need more episodes. ----> http://www.thewebsiteisdown.com/
-
This one can do AP mode as well: http://hakshop.myshopify.com/products/black-usb-wifi-adapter-with-5dbi-antenna-realtek-8187l-chipset
How do you setup AP mode on this Wlan nic? Do you need certain Linux drivers for it to work in AP mode?
-
Looks very interesting :D Can't wait!
-
It did sound like sarcasm, but I just wanted to make sure. That's why I answered it.
Yupp it was complete sarcasm :)
-
Besides, anyone who posts on hak5 who says they haven't cracked a WEP network in the wild or got a meterpreter shell from the wild without first getting permission from the owner is lying : P
What is this Meter preter shell you speak of? What kinda of sea creatures do the shells come from?
-
so the cable can be as long as usb cables can be (anyone know how long that is?)
telot
USB 1.1 Low Speed = 3 meters (Roughly 9.84251969 feet)
USB 1.1 High Speed = 5 meters (Roughly 16.4041995 feet)
USB 2.0 High Speed = 5 meters
USB 3.0 = Not really specified.
-
What OS are you using?
If you are using Ubuntu or Backtrack 5 R1 you can try adding the command to the /etc/rc.local file.
-
I recently added Backtrack to my PXE setup at home. Asserting you already have a working PXE setup with NFS, my tftp root is at /store/tftpboot.
0. Create Backtrack PXE directories:
mkdir -p /store/tftpboot/backtrack/5/R1/x{86,64}/{kde,gnome}
1. Mount iso and copy contents to PXE Backtrack directory:
sudo mount -o loop,ro -t iso9660 BT5R1-KDE-32.iso /mnt cp -av /mnt/* /store/tftpboot/backtrack/5/R1/x86/kde/ umount /mnt
Repeat as needed for other permutations.
2. Add exports to NFS:
# /etc/exports /store/tftpboot/backtrack/5/R1/x64/kde 192.168.1.0/24(ro,sync,no_subtree_check) /store/tftpboot/backtrack/5/R1/x86/kde 192.168.1.0/24(ro,sync,no_subtree_check)
Repeat as needed for other permutations.
3. Create a backtrack.menu file for PXE:
LABEL 21 MENU LABEL Backtrack 5 R1 x86 KDE KERNEL /backtrack/5/R1/x86/kde/casper/vmlinuz APPEND initrd=/backtrack/5/R1/x86/kde/casper/initrd.gz boot=casper text vga=789 netboot=nfs nfsroot=your.LAN.IP.addr:/store/tftpboot/backtrack/5/R1/x86/kde TEXT HELP Boot the Backtrack 5 R1 x86 KDE Live CD ENDTEXT LABEL 22 MENU LABEL Backtrack 5 R1 x64 KDE KERNEL /backtrack/5/R1/x64/kde/casper/vmlinuz APPEND initrd=/backtrack/5/R1/x64/kde/casper/initrd.gz boot=casper text vga=789 netboot=nfs nfsroot=your.LAN.IP.addr:/store/tftpboot/backtrack/5/R1/x64/kde TEXT HELP Boot the Backtrack 5 R1 x64 KDE Live CD ENDTEXT
Repeat as needed for other permutations.
4. Add the Backtrack menu into your pxelinux.cfg/default:
MENU BEGIN Backtrack MENU TITLE Backtrack LABEL Previous MENU LABEL Previous Menu TEXT HELP Return to previous menu ENDTEXT MENU EXIT MENU SEPARATOR MENU INCLUDE backtrack/backtrack.menu MENU END
Restart your nfs and tftp daemons and you should be good to go. SJ every day.
I don't remember Hak5 doing a PXE server setup. So sounds like it would be an excellent segment to do int0x80. :D
You could go into detail on what programs are needed and how to add a few Distros to the PXE with maybe a nice boot screen to it? :P
-
Gpxe
in Hacks & Mods
Hey, Just to let you know gPXE development ceased in summer 2010.
You should probably look at updating to the iPXE project which was formerly gPXE, which was formerly Etherboot lol :P
-
Was bored today so decided to rewrite Darrens Wallpaper Prank for the Teensy 2.0.
Not the greatest looking code, but it works.
/* Rewrite of Darren Kitchen's Wallpaper Prank. Coded by Misfitsman805 for Teensy 2.0 Feel free to edit */ void setup() { delay(5000); Keyboard.set_modifier(MODIFIERKEY_GUI); Keyboard.set_key1(KEY_D); Keyboard.send_now(); clear_keyboard(); delay(700); Keyboard.set_key1(KEY_PRINTSCREEN); Keyboard.send_now(); clear_keyboard(); delay(200); Keyboard.set_modifier(MODIFIERKEY_SHIFT); Keyboard.set_key1(KEY_F10); Keyboard.send_now(); clear_keyboard(); delay(400); Keyboard.print("v"); delay(40); Keyboard.print("d"); delay(300); Keyboard.set_modifier(MODIFIERKEY_GUI); Keyboard.set_key1(KEY_R); Keyboard.send_now(); clear_keyboard(); delay(700); Keyboard.print("mspaint.exe"); enter_key(); delay(1000); Keyboard.set_modifier(MODIFIERKEY_CTRL); Keyboard.set_key1(KEY_V); Keyboard.send_now(); clear_keyboard(); delay(500); Keyboard.set_modifier(MODIFIERKEY_CTRL); Keyboard.set_key1(KEY_S); Keyboard.send_now(); clear_keyboard(); delay(1000); Keyboard.print("%userprofile%\\a.bmp"); enter_key(); delay(500); Keyboard.set_modifier(MODIFIERKEY_ALT); Keyboard.set_key1(KEY_F); Keyboard.send_now(); clear_keyboard(); delay(400); Keyboard.print("k"); delay(100); Keyboard.print("f"); delay(1000); Keyboard.set_modifier(MODIFIERKEY_ALT); Keyboard.set_key1(KEY_F4); Keyboard.send_now(); clear_keyboard(); delay(300); Keyboard.set_modifier(MODIFIERKEY_GUI); Keyboard.set_key1(KEY_D); Keyboard.send_now(); clear_keyboard(); } void loop() { // No need for loop } void clear_keyboard() { Keyboard.set_modifier(0); Keyboard.set_key1(0); Keyboard.send_now(); } void enter_key() { Keyboard.set_key1(KEY_ENTER); Keyboard.send_now(); clear_keyboard(); }
-
Not all of the things, but some if you're a talented programmer. This is why we've developed the ducky the way we did.
The Teensy is able to act as a USB HID keyboard and perform the keystrokes as with the payloads demonstrated on the show, however this requires programming with C in Teensyduino, compiling with GCC and flashing with the teensyloader.
The USB Rubber Ducky is scripted with our simple language in any text editor, compiled with the cross-platform duckencoder and loaded onto the SD card -- just drag and drop the inject.bin
So yes, in theory the Teensy 2.0 is capable of performing one aspect of the attack but not without a higher investment of time and skill.
Also bear in mind that the teensy and rubber ducky hardware are significantly different -- 8bit/16mhz w/ 1 uart vs 32bit/60mhz w/ 3 uart -- which will become apparent shortly.
I see, Thanks for the reply! :)
Just wish I had the $80 for the Rubber Ducky. Hook it up with a free sample Darren! :P
iPhone location Services reporting
in Questions
Posted
How do you do this trick? It sounds interesting. :D