Jump to content

Search the Community

Showing results for tags 'Hak5'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

  1. Hello! This firmware marks a massive release for the WiFi Pineapple Mark VII, with a huge set of feature additions, bug fixes and improvements to many aspects of the project and it's user experience. From reliability fixes in PineAP and Recon to the addition of the Package browser and a WPA/2 Evil AP or out of the box support for supported 802.11ac adapters, there is sure to be something in this version for you. As always, you can grab the update OTA by giving your WiFi Pineapple an internet connection and navigating to Settings -> Software Update in the Web UI. A huge thank you to the beta testers for this release who provided great feedback and bug reports, you are invaluable and much appreciated! To further join the discussion, feel free to join the Discord chat. You can catch the full changelog below, and highlights of the new firmware in the second reply to this topic. Changelog 1.1.1: General Update the Pineapple Python library. Setup Fix a UX issue where the Filter description doesn't show until a mode is selected. Recon Fix an issue where some partial handshake captures would not have enough data to be crackable. Settings Remove the Nightly Update channel. Changelog 1.1.0: General Add a setup walkthrough dialog when attaching an AC-capable USB radio to the WiFi Pineapple. Improve the displaying of dates from the future in some UI pages. Move warnings into an "Informational Messages" dialog. This new dialog adds more information about system messages, and provides convenient links directly to the relevant setting. Removed bluelog and other bluetooth related tools from firmware. Note: You can now install these packages and more with ease using the Package Manager. Swap PineAP and Recon location in sidebar. Enable SSH earlier in Setup process. Removed polling for Reset button. Add password reset functionality. Notifications Notifications are now previewed in the title bar. Notifications can now be reported as "success", with a green color. Changed to a better download icon. Decrease clutter in title bar for mobile displays. Fix an issue where some kernel modules would cause the device to reboot. Setup Add Sweden to WiFi Country Code list. Fix typo in Client Filters page. Added GIFs to indicate how to proceed with verification. Added the ability to fine-tune filters during setup. Generally improved layout of various setup elements. Dashboard Improved connection error message for "Get News". Campaigns Fix an issue where some reports will use the first Recon scan, instead of the latest. Fix an issue where reports would not be removable. PineAP Fix a crash. Fix an issue where extended Recon scans would lead to a memory leak. Add Sweden to WiFi Country Code list. Fix a hang introduced in the beta which would cause Recon and Filters to show an incorrect status. Change "WPA & Open" tab to "Access Points". Change "Authenticated AP" card title to "Evil WPA AP". Add "View Handshakes" button to Evil WPA AP card. Evil WPA AP handshakes now only send one notification per client. Fix an issue where empty SSIDs would be added to the SSID Pool. Add a new tab for Management and Open APs. Fix an issue where the "Handshakes Captured" counter wouldn't be accurate. Add Evil Twin WPA Access Point. Recon Add a dialog to clarify what a handshake capture does, when clicking "Start Handshake Capture". Fix an issue where handshakes in custom locations couldn't be downloaded. Scan settings are now loaded from the current scan across devices. Added the ability to specify save location for Recon scans. Added the ability to specify save location for Handshakes. Fix an issue introduced in Beta 1 where handshakes could not be deleted. Fixed an issue where the table would become unsorted during a scan. Added graphs for wireless landscape and channel distribution. Moved Settings into a new card, with search functionality. Added the ability to select which radio is used for Recon scanning. Supported devices are listed at docs.hak5.org Add dual-band scanning support for supported adapters. Add the ability to download handshakes in hashcat format. Improved the user experience for cloning access points. Cloning options can now be fine tuned from inside Recon. Add the ability to clone WPA/2 access points. Fixed an issue where BSSIDs would not be highlightable in some browsers. Fixed an issue where a handshake capture button might show for open APs. Massively improved scanning performance by rewriting result de-duplication logic. Massively improved WPA/2 Handshake capture performance. Changed how partial and full handshakes are written to disk. Fixed a rare crash when scanning in client-heavy landscapes. Handshake MAC addresses are now censored when censorship mode is enabled. Handshake MAC addresses now use colon seperators. Logging Improve default colours for log entries in dark theme. Improve column width for the System Log. Improve parsing of System Log. Added the ability to specify PineAP log save location. Added pagination and search functionality to the PineAP Log. Create a new system module for logging. Add ability to download and search the device system log. Modules Add hot-link support for Available Modules, Package Manager, and Develop tabs. Move search box into table footer. Add a new tab for package management. Add the ability to search and download a wide variety of packages. Improve user experience when the device is offline. Settings General Improve user experience when the device is offline. Added a scrollbar for longer changelogs such as this one. Networking Add a placeholder for when the Pineapple hasn't receieved a Client Mode IP address yet. Add signal strength to discovered Client Mode networks. Rewrote Client Mode handling to improve reliability of connection. Improved reliability of automatic route setting when handling USB Ethernet, ICS, or Client Mode connections. Disconnect button is now disabled after being clicked once. Thanks, foxtrot
  2. Hello all! This monumental 1.1.0 Beta release gives you some amazing new features for your WiFi Pineapple that would not have been possible had it not been for the great feedback and feature requests from our community. Thank you. We hope you enjoy these new features and as always invite you to join us on Discord and the forums. Changes since Beta 1 and Beta 2 begin with NEW. Beta 3 Change Log: General NEW: Move warnings into an "Informational Messages" dialog. This new dialog adds more information about system messages, and provides convenient links directly to the relevant setting. Removed bluelog and other bluetooth related tools from firmware. Note: You can now install these packages and more with ease using the Package Manager. Swap PineAP and Recon location in sidebar. Enable SSH earlier in Setup process. Removed polling for Reset button. Add password reset functionality. Notifications Notifications are now previewed in the title bar. Notifications can now be reported as "success", with a green color. Changed to a better download icon. Decrease clutter in title bar for mobile displays. Fix an issue where some kernel modules would cause the device to reboot. Setup NEW: Add Sweden to WiFi Country Code list. NEW: Fix typo in Client Filters page. Added GIFs to indicate how to proceed with verification. Added the ability to fine-tune filters during setup. Generally improved layout of various setup elements. Dashboard Improved connection error message for "Get News". Campaigns Fix an issue where some reports will use the first Recon scan, instead of the latest. Fix an issue where reports would not be removable. PineAP NEW: Fix an issue where extended Recon scans would lead to a memory leak. NEW: Add Sweden to WiFi Country Code list. NEW: Fix a crash. NEW: Fix a hang introduced in the beta which would cause Recon and Filters to show an incorrect status. Change "WPA & Open" tab to "Access Points". Change "Authenticated AP" card title to "Evil WPA AP". Add "View Handshakes" button to Evil WPA AP card. Evil WPA AP handshakes now only send one notification per client. Fix an issue where empty SSIDs would be added to the SSID Pool. Add a new tab for Management and Open APs. Fix an issue where the "Handshakes Captured" counter wouldn't be accurate. Add Evil Twin WPA Access Point. Recon NEW: Fix an issue where handshakes in custom locations couldn't be downloaded. NEW: Scan settings are now loaded from the current scan across devices. Added the ability to specify save location for Recon scans. Added the ability to specify save location for Handshakes. Fix an issue introduced in Beta 1 where handshakes could not be deleted. Fixed an issue where the table would become unsorted during a scan. Added graphs for wireless landscape and channel distribution. Moved Settings into a new card, with search functionality. Added the ability to select which radio is used for Recon scanning. Supported devices are listed at docs.hak5.org Add dual-band scanning support for supported adapters. Add the ability to download handshakes in hashcat format. Improved the user experience for cloning access points. Cloning options can now be fine tuned from inside Recon. Add the ability to clone WPA/2 access points. Fixed an issue where BSSIDs would not be highlightable in some browsers. Fixed an issue where a handshake capture button might show for open APs. Massively improved scanning performance by rewriting result de-duplication logic. Massively improved WPA/2 Handshake capture performance. Changed how partial and full handshakes are written to disk. Fixed a rare crash when scanning in client-heavy landscapes. Handshake MAC addresses are now censored when censorship mode is enabled. Handshake MAC addresses now use colon seperators. Logging NEW: Improve column width for the System Log. NEW: Improve parsing of System Log. Added the ability to specify PineAP log save location. Added pagination and search functionality to the PineAP Log. Create a new system module for logging. Add ability to download and search the device system log. Modules NEW: Add hot-link support for Available Modules, Package Manager, and Develop tabs. Move search box into table footer. Add a new tab for package management. Add the ability to search and download a wide variety of packages. Improve user experience when the device is offline. Settings General Improve user experience when the device is offline. Added a scrollbar for longer changelogs such as this one. Networking Rewrote Client Mode handling to improve reliability of connection. Improved reliability of automatic route setting when handling USB Ethernet, ICS, or Client Mode connections. Disconnect button is now disabled after being clicked once. You can catch the beta release OTA, by following the instructions outlined in the Hak5 Docs article for Beta/Nightly updates. Thanks again for the continued feedback. - Foxtrot
  3. hello i wanted to ask which hak5 tool helps me to get information of any kind about the particular pc
  4. Hi, We're happy to announce the 2.2.x release of the Cloud C2, which features a new notifications system and support for the new Hak5 Key Croc! Change Log (2.2.0) Hak5 Key Croc Added support for the Hak5 Key Croc! Hak5's Key Croc is a Keylogger armed with pentest tools, remote access and payloads that trigger multi-vector attacks when chosen keywords are typed. Live keystrokes, typed history and keystroke injection can be performed remotely with ease. Notifications Notifications can now be sent from enrolled devices. Notifications can be managed from the new bell icon in the status bar of the Cloud C2. You can download the latest version over-the-air in your existing Cloud C2 instance on Linux or Mac, or visit the Hak5 Download Center to grab the release for all supported devices and operating systems. As always, thank you for the support and great community feedback!
  5. Hello Everyone, When this guide was first launched I was about mid-way through my studies in Networking and Systems Administration, and since I've learned a lot since then I decided to completely rework this guide (04/05/2020). I want to provide everyone with a guide that will not only get you up and running, but will also provide you with a stable environment as well. Please remember that I am NOT responsible for your actions, and you should never perform nor condone any illegal activities. Notes: This installation guide is written ONLY for Ubuntu 18.04/20.04 LTS. Step 1. Update, upgrade, and clean your machine. sudo apt -y update && sudo apt -y upgrade && sudo apt clean Step 2. Install required packages. sudo apt -y install unzip ufw Step 3. Open ports depending on your needs (20, 2022, 80, 8080, 443). sudo ufw allow 22,2022,80,8080,443/tcp && sudo ufw enable && sudo ufw reload Step 4. Download and unzip the community ZIP files in the tmp directory. sudo wget https://c2.hak5.org/download/community -O /tmp/community && sudo unzip /tmp/community -d /tmp Step 5. Move the c2_community* file to usr/local/bin, and create the require database directory. sudo mv /tmp/c2_community-linux-64 /usr/local/bin && sudo mkdir /var/hak5c2 Step 6. Create a new systemd service to run the Hak5 C2 script. sudo vim /etc/systemd/system/hak5.service Step 7. Utilize a template below, or build your own. Template A (https) [Unit] Description=Hak5 C2 After=hak5.service [Service] Type=idle ExecStart=/usr/local/bin/c2_community-linux-64 -hostname IPAddressORHostname -https -db /var/hak5c2/c2.db [Install] WantedBy=multi-user.target Template B (http) [Unit] Description=Hak5 C2 After=hak5.service [Service] Type=idle ExecStart=/usr/local/bin/c2_community-linux-64 -hostname IPAddressORHostname -db /var/hak5c2/c2.db [Install] WantedBy=multi-user.target Template C (http / port 80) [Unit] Description=Hak5 C2 After=hak5.service [Service] Type=idle ExecStart=/usr/local/bin/c2_community-linux-64 -hostname IPAddressORHostname -listenport 80 -db /var/hak5c2/c2.db [Install] WantedBy=multi-user.target Step 8. Reload the systemd daemon, enable the service, and start. sudo systemctl daemon-reload && sudo systemctl enable hak5.service && sudo systemctl start hak5.service Step 9. View the status of your service in order to view your key. sudo systemctl status hak5.service Step 10. Visit your website and fill in the required information to finalize. Step 11. Sign into your Hak5 C2 website. Step 12. Add devices, export logs, and more! Woot!
  6. Hey guys, I have a packet squirrel setup in Cloud2 and I can successfully start a terminal session. In a terminal session I would like to run a packet capture. If I run the command tcpdump -nni eth1 -f /mnt/loot/tcpdump/test2.pcap I am able to capture some packets. I can Exfil the packet capture with the command: C2EXFIL /mnt/loot/tcpdump/test2.pcap and the file shows up in the C2 dashboard. However, when I download the pcap, Wireshark cannot open it. I get an error message: "The file test2.pcap isn't a capture file in a format that Wireshark understands" Screenshot: https://imgur.com/a/t9MJtoZ I can open the pcap file with Wireshark from the USB stick, if I remove it from the Packet Squirrel and plug it into my PC. Could the C2EXFIL command be modifying the .pcap file when it moves it? I've used the C2EXFIL command to move other files like .txt and .nmap and have not had any issues. Has anyone else experienced this or figured out a way to move pcap's using C2EXFIL?
  7. Hi, I bought recently an wifi pineaple nano and i started using dwall and tcpdump but i could get most of the encrypted stuff so i serched and discovered sslsplit but when i use it my browser says that i´m using a invalid/fake certificate and i dont know where i can get a valid certificate! Does this have to do with the config that comes with sslsplit? My config: ################################################################## # Certain packets are redirected to the local port 8080 and 8443 # ################################################################## ## Plain text HTTP traffic (80) is redirected to port 8080 iptables -t nat -A PREROUTING -p tcp --dport 80 -j REDIRECT --to-ports 8080 ## WhatsApp (5222) is redirected to port 8080 iptables -t nat -A PREROUTING -p tcp --dport 5222 -j REDIRECT --to-ports 8080 ## SSL-based HTTPS traffic (443) is redirected to port 8443 iptables -t nat -A PREROUTING -p tcp --dport 443 -j REDIRECT --to-ports 8443 ## IMAP over SSL (993), SMTP over SSL (465 and 587) is redirected to port 8443 iptables -t nat -A PREROUTING -p tcp --dport 587 -j REDIRECT --to-ports 8443 iptables -t nat -A PREROUTING -p tcp --dport 465 -j REDIRECT --to-ports 8443 iptables -t nat -A PREROUTING -p tcp --dport 993 -j REDIRECT --to-ports 8443
  8. Hello everyone! We're extremely excited to have announced the all-new Key Croc, and this update brings some improvements to the launch firmware as well as introducing support for the Hak5 Cloud C2. Change Log (1.2): General Fix non-ASCII logging Improved automatic VID/PID cloning Improved support for various ATTACKMODES Enable NTP Cloud C2 Add Support for the Hak5 Cloud C2 Misc Remove unneeded packages Improve LED status indication Update DuckyScript 2.0 lang files for US and GB Add fallback Arming Mode Framework now validates payload syntax at startup with LED feedback. Add INSTALL_EXTRAS script Add KEY_DEBUGGER script Add CHECK_PAYLOADS script Add RELOAD_PAYLOADS script You can download the firmware from the Hak5 Download Center. Instructions for updating your Key Croc can be found in the docs.
  9. Forgive me for feeling suspicious but I trust no one, especially companies and governments. I'm new to Hak5 and I've read through a lot of the sight and I see a recurring theme. "Hosted on our server's" like it's a good thing. It may be I guess but the untrusting part of my brian (95%) is saying that seems strange. Why would they still want you tied to there server's year's after you obtained there products. Why can't you use these item's without the umbilical cord attached? Or did i miss something that says you don't need there server's to use your products? How do I know that your server's aren't collecting data from our target's for later use or putting clients at risk if your server's get compromised? Go ahead and call me paranoid but I'll be standing when many fall's.
  10. Hi, The first 10 months of feedback has been incredible, and we are excited to bring you some epic new features and enhancements to the platform with Cloud C2 version 2.0.0! This release adds support for the latest Hak5 devices, including the Screen Crab, Signal Owl and Shark Jack. It also features a protocol enhancement that reduces network overhead and bandwidth for deployed devices. This release includes a LOOT feature, allowing you to easily exfiltrate any arbitrary data from the target network using the C2 protocol. Accessible from the new Loot menu within each device type, the Loot view allows you to sort, view and export collected files. An accompanying C2EXFIL command for all Cloud C2 enabled devices can be used in your modules and payloads to send files up to the server. With this release, all deployed devices will need to be updated to their latest firmware versions, so be mindful when updating if you have devices deployed in the field. As always, thank you for your feedback and we feel free to join the discussion within the Hak5 community.
  11. I have been trying to figure out a problem with this payload and for some reason I just cant get it work i have impacket in my tools file and installed when I plug my Bunny in it goes throw the colors but it gets stuck in the blue color and i cant figure out why? Do anyone have the same problem?
  12. I have a question. Is there any way to join a actual WiFi with a captive portal with my wifi pineapple nano. Also is it possible to join that captive portal and copy it so I could spoof it later? (I'm doing this for a Wifi demonstration)
  13. Hi Guys I need help creating a payload on the Twin Duck rubber ducky that silently runs tree /a/ /f on the victims computer and then saves the output to the ducky. This is the code that I have so far: for /f %d in ('wmic volume get driveletter^, label ^| findstr "DUCKY"') do set myd=%d&echo tree /a /f > echotree.cmd&echotree.cmd > %myd%/results.txt&del echotree.cmd I would like to run it in the Run line. Please help me to optimise it!
  14. https://www.picz.in.th/image/fFGI3Q https://www.picz.in.th/image/fFGMbS Sorry,How to solve? I try configure ip static IP 172.16.42.42 mask 255.255.255.0 gateway 172.16.42. dns 172.16.42.1 it doesn’t work Please help me !!!!!!!!
  15. Good afternoon, Can't believe it has been 2 mos. since I last picked up this project. To bring you all up to speed, I have successfully gotten back into the packet squirrel, & installed Ovpn on my server(s) I believe I am at the last step, cannot....scp root@myserveraddress:client.ovpn . This is the order of steps per the hak5 video on the Packet Squirrel. This is the output from the command: connect to host 172.245.118.134 port 22: Network is unreachable. The command fails no matter which server/IP I use. Any suggestions? Maybe I skipped a step. Thanks again everyone.
  16. First off I have searched forums. I could have more carfully, but nothing seems to have matched exactly. Now out of the box; I connected the squirrel.i immediately lost internet. I checked to insure I had it correctly, and I did. The hookup looks like ISP modem--->> squirrel -->> wireless router I also tried it over again from pc. NO issues on pc. no wire issues. has to be squirrel I tried the sqitch and ran it with windows restore. This thing just doesn't work. Help me, help me said the k
  17. Hello Hackers !!! I am new into infosec practically i was learning before but now into industry work so i am fed up of searching different methodology, tools, frameworks. I am stucked with something real life scenarios, there is wifi router which have 10 users. Me as admin of that router, how can i access these 10 users (PC, Andriod, etc) ? I tried wireshark, and many other stuff didnt get anything suitable? can i do this via adding a default welcome page to my router if some one connect will have to download something or something like this? a Newbie need help ;D
  18. Hey Buddies a Newbie here, i watched https://www.youtube.com/watch?v=0UmJLLTr2gg i i have seen in video beside normal ducky there were micro ducky by having SD card. I didnt got any link to buy those any where? can anyone help here getting it ?
  19. Why is Hak5 leaving the warehouse and where will you be going???
  20. biob

    Hak5 artwork

    https://instagram.com/p/BatFZAIA8Pk/ Anyone know where I can find the Packet Squirrel and Ducky version?
  21. I've been trying all day to fix my bash bunny, but nothing seems to work. I've been trying all kinds of payloads on the GitHub repo and even making one my self. The issue I'm having is that the bash bunny won't do anything when I plug it in, but it's still recognized though. Keep in mind that I got my bash bunny yesterday so I'm not good at managing it. So if you think I'm making a beginner mistake Just go ahead and tell me. Hope you can help me, thanks!
  22. hi guys i've a big proble, in the last weeks i won a usb rubber ducky during an hackathon but the replay buttons seems broken. When i press it the rubber ducky doesn't replay the script, what could be the problem?
  23. I have purchased about 80% of your equipment, Pineapple Mark V, Nano tactical, bash bunny, pocket squirrel, lan turtle, usb rubber ducky, router, wifi dongles, etc. Unfortunately I purchased them separately as they came out. Therefore I don't have a custom Hak5 case to keep them in. I wish you would consider selling the cases separately. I would be your first customer to buy one. Love your products, and the show.
  24. I would like to thank the Hak5 team for developing such a great little product that is the Packet Squirrel. I see posts with people complaining that it doesn’t do gigabit, POE etc.. An people are missing the point, you get get a lot for your $60. The packet capture facility alone is worth the price tag. I would imagine that, to add gigabit and POE would probably triple the price, double the size and triple the power requirements. I for one, am very impressed with the devices that Hak5 have developed. I recently managed to buy a pineapple nano(second hand) , USB ducky and a Packet squirrel. My only regret is that I can’t afford the other devices at the moment. So come on gals and guys, let Hak5 team know the positives instead of the, why doesn’t it do this!
  25. Dear Hak5, don't mean to anger anyone with this post... but im finding myself missing the good old Hak5 podcasts. The days when we had tutorials based around hacking tools , readily available . It seems the show is now based purely on Hak5's amazing products. An as great as they maybe, they aren't very affordable outside of the US e.g. Wifi Pineapple nano, being £125 , from European supplier. i appreciate, that Hak5 is a business and they have to eat. But would it not be possible to setup another channel to provide the tutorials for the products you sell and get back to the old format? I mean, how's the Hak5 van? Has it been turned into a hacking mobile command centre? Have you guys built any custom gear of late e.g. Password cracking rigs, photo framed pc and all that goodness. I've even noticed a decline in the discussions and help that is available on the forums. please, please, please bring back the show we all loved and admired.
×
×
  • Create New...