Jump to content

misfitsman805

Active Members
  • Posts

    160
  • Joined

  • Last visited

  • Days Won

    1

Posts posted by misfitsman805

  1. It seems there was a problem with the first batch of SD card adapters. We're working on obtaining a new set and will be contacting pre-orderers shortly. As for the format, FAT. If you haven't checked out the wiki you really should, it's at http://usbrubberducky.com/wiki/ and should be integrated into the new Hak5 wiki sometime after Derbycon. There's also a 30 minute getting started segment that was shot the other day as part of the Derbycon DVD that will be posted online soon.

    Hey Darren, Will you be able to do all the same things on the Teensy 2.0 that you can do with the new "rubber ducky"?

  2. I almost feel that the whole "Unlocking cell carriers" thing would apply to jailbreaking. Or just let us do it and void our warranty if we want to..

    Yeah seriously! We paid for the device! Let us do what we want with it! LOL Voided my warranty within an hour or so of receiving the iPod. mmmmm free hardware XD

  3. Interesting, there has to be a way around that...

    Not right now... at least not yet. Apple patched the pdf exploit that allowed for untethered jailbreaks. :(

    I guess we will find out what will happen when IOS 5 comes out.

  4. Why is that?

    Above 4.3.3 you are unable to do an untethered jailbreak. You are however able to go above 4.3.3 using a tethered jailbreak. Kinda useless using a tethered jailbreak unless you carry a PC with you in case you need to reboot your iPod.

  5. My rule of thumb is to always disconnect all other drives I'm not installing an OS to.

    Doesn't matter if I'm installing Windows or Linux or another OS, I still disconnect all other drives.

    May seem like a pain to do, but it's less of a pain to do that then to try and recover TB's worth of data.

  6. misfitsman805@Server-02:/pentest/exploits/framework3$ sudo ./msfconsole 
    [sudo] password for misfitsman805: 
    
                    |                    |      _) |
     __ `__ \   _ \ __|  _` |  __| __ \  |  _ \  | __|
     |   |   |  __/ |   (   |\__ \ |   | | (   | | |
    _|  _|  _|\___|\__|\__,_|____/ .__/ _|\___/ _|\__|
                                  _|
    
    
           =[ metasploit v3.7.0-dev [core:3.7 api:1.0]
    + -- --=[ 670 exploits - 351 auxiliary
    + -- --=[ 217 payloads - 27 encoders - 8 nops
           =[ svn r12201 updated today (2011.04.01)
    
    [*] Calculating new Comodo SSL CA key...
    Factoring..........
    
    -----BEGIN RSA PRIVATE KEY-----
    zFBBetA9KgxVcBQB6VhJEHoLk4KL4R7tOoAQgs6WijTwzNfTubRQh1VUCbidQihV
    AOWMNVS/3SWRRrcN5V2DqOWL+4TkPK522sRDK1t0C/i+XWjxeFu1zn3xXZlA2sru
    OIFQvpihbLgkrfOvjA/XESgshBhMfbXZjzC1GwIDAQABAoIBAQCJoijaEXWLmvFA
    thiZL7jEATCNd4PK4AyFacG8E9w8+uzR15qLcFgBTqF95R49cNSiQtP/VkGikkkc
    ao25aprcu2PnNA+lpnHKajnM9G3WOHuOXHXIps08es3MmBKTxvjNph6cUlqQULrz
    Zry+29DpmIN/snpY/EzLNIMptn4o6xnsjAIgJDpQfFKQztxdmZU6S6eVVn0mJ5cx
    q+8TTjStaMbh+Yy73s+rcaCXzL7yqWDb1l5oQJ/DMYNfufY6lcLgZUMwFxYKjCFN
    ScAPCiXFUKTzY3Hy1Z4tLndFxipyEPywDep1TB2nMb+F3OOXUs3z+kKVjGFaGnLZ
    591n3x3hAoGBAOOgsb4QybjHh9+CxhUkfsqcztGGdaiI3U5R1qefXL7R47qCWfGc
    FKdoJh3JwJzLOLX68ZmHz9dPhSXw6YrlLblCi6U/3g7BOMme5KRZKBTjHFo7O9II
    B0laE5ISRH4OccsOC3XUf9XBkm8szzEBj95DgzB0QydPL4jp7NY0h0QrAoGBAMEv
    jEFkr/JCRe2RWUAPR1LWT/DHnVLMnDb/FryN2M1fAerpMYNUc2rnndjp2cYbsGLs
    cSF6Xecm3mUGqn8Y5r8QqFo0lzp5OunCFCXEJvkiU3NSs8oskCsB8QJ6vk3qmauU
    -----END RSA PRIVATE KEY-----
    
    [*] Scanning RSA tokens for usable seed.....4d416f70-5f16-0410-b530-b9f4589650da!
    
    [*] Logging into vault.rsa.com as 'rivest'......Successful
    
    [+] Compromised 'vault.rsa.com' via ACE backdoor...
    
    [*] Launching SQL injection attack against MySQL.com....Done
    
    [*] Extracting passwords hashes....Done
    [+] 54,024 passwords obtained
    
    [*] Replaying SHA1 hashes against Sun.com.......Done
    
    [*] Attaching to Stuxnet through Oracle Command Center....!#$#$@#$$puTTY!@$@vault.rsa.com # #@puTTY#$@#..@#$@34 m
    
    
    sf
    >.. uid=0(root)
    
     gid=0(root) g
    
    
    roups=0(r
    
    
    oot) @#$@#42 3msf>bash-4.
    
    1# 
    ERROR
    NOCARRIER
    [*] Welcome to SkyNet v5.23.0-BETA
    [*] Launching autonomous agent...
    [*] Scanning 72.235.136.154.0/22...
    [*] Injecting agent code into memory...
    [*]         15 Nodes Online
    [*]      3,156 Nodes Online
    [*]     17,024 Nodes Online
    [*]  1,423,813 Nodes Online
    [*]  SkyNet has been loaded
    [*]  Entering command shell
    msf sky-net> 
    

    Muahahaha!

    April fools?

×
×
  • Create New...