Jump to content

Search the Community

Showing results for tags 'hack'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

  1. Hi. I have some trouble I would like some help on. I have an app called "TV OFF" and its an app that uses your ir blaster to send tv-b-gone codes. However this app also has projectors and the tv-b-gone doesn't so I was wondering if somebody could help me extract the ir codes from the app. I then plan to put them in the tv-b-gone v1.2 firmware and reprogram my chip. The zip file is the app. Extract it and you will get all the source files. Thanks guys TV OFF v1.2.7.zip
  2. so i was wondering if anyone here could tell me, link me or make a video on how to perform the man in the middle attack with the pineapple mark V. thank you - Stanly
  3. I have an idea for a tv-b-gone type device but I know nothing on circuits so I could use some help. I want to make a infrared repeater (Code name: The Black Mime). What I want the device to do is have a infrared sensor and save the infrared code onto a attiny85. If the switch for the sensor is off and a button is pressed then I want the infrared transmitter to send the last saved code. If the sensor is turned on after another code is saved then the attiny will reset itself and have no data on it then save the code received. That's basically what I want for this project. If this one gets built and posted then I will keep thinking of projects. Thanks, hypersonic5000
  4. Hello, so I am working on my bachelors in network security and I have started messing around with electronics as a hobby. I was looking online for anyone that has added a usb port to the Pineapple Juice 1800, and could not find anything so I decided to give it a try myself. The little board with the usb port is from one of those car usb adapters that plugs into the cig lighter. I bought it for 99 cents with free shipping off ebay a while back. It takes 12v from the vehicle and converts it into 5v for usb, so I figured it would work just fine with this battery pack. The first thing I did was take off the led that was on the board since there is already one on the PJ1800. I then soldered (very poorly) the positive and ground wires to the appropriate connectors on the board. I used a multi-meter to figure out which terminals to solder the wires from the usb board to. I crammed everything in the box. There is not a lot of room so the usb port sticks out from the case. It’s not very pretty, but it works.
  5. Hi, Is there any way I can insert a message between two old messages on WhatsApp, to make it appear as though that message was sent at the time, rather than now? I want the other person in the conversation to see the message as well, not just me. If it helps, I'm using a Samsung galaxy s4 mini with android. Thanks
  6. Hi !! I have a question ! Now that SimCity is playable offline, isn't it possible to hack it ? Especially for Mac ;) Thx
  7. I have been tasked with helping develop a packet crafter for a project. Long story short, I have create a packet crafter, explain how it works, and present it to a few professors. From my understanding packet crafting is like MAC spoofing and IP spoofing combined. The basic idea is to take in packets, modify them, send them back out. But appearing that the packets are coming from a different location. I've just started my research but if anyone has any useful links and tips, I'd appreciate your help. My first question is how would I start creating one? 2) What would be the best language to use? 3) Any suggestions for software? Thanks! (If my understanding of the topic is incorrect or off somewhat please correct me but like I mentioned I'm in the early stages of research.) As I progress with this project I will upload my results.
  8. Hi, I'm trying the site cloner from se-toolkit but got a problem for using it external.. On LAN it works fine but I want to use it for external networks. I port forwarded port 80 to my external IP and set up the site cloner with my external IP but I can't connect to it. Why is this?
  9. Roku recently introduced vulnerability within the Roku OS which allows a user to execute commands as a root user. Hilariously enough, this vulnerability came to light through a "security improvement" in the OS. This allows all Roku devices which are using update #### to obtain root. blog.gtvhacker.com/2013/breaking-secure-boot-on-the-roku/ follow us on twitter @GTVHacker
  10. Hi I'd like to have info concerning the frequency generator of the pineapple (is it a simple "multiplied" local oscillator like WRT54Gxx, is it a more sophisticated DDS, where could I download the schematic of the router). In other words, how is frequency driven the pineapple and how could it be hacked Thus for a simple reason : The output power of the Pineapple is perfect for what I intend to do, but I need to change it's working frequency far lower than the first channel. To avoid answers "out of the subject" (concerning FCC regulation and other things like that), I should precise that this hack is totally legual in my country (France, Region 1) and with my radio licence class. the purpose of this hack is to use the pineapple in a ham radio Hamnet mesh network. Most of the hackable routers we can buy in Europe have a far lower output power Tnks Marc
  11. Basically, my school has a deep-freeze program that resets everything on their computers over the night. I want to disable that program. I have access to an admin account. How do I do this (ELI5 pls)? Thanks, neophyte PS Please, no "OH LAWD YOU DESTRORYIN SCHOOL PROPERTY" answers. I understand the risks.
  12. I want to learn more about hacking. I have heard about free hacker spaces. But whenever I look those up on Google I find a nice long list of broken links. Are there still any legal hacker spaces open?
  13. So I recently ordered a micro-micro usb cable to try out kos's code for p2p-adb. When I was ordering I noticed a "Special Requests" box. So I asked for a picture of a dinosaur to be included. Upon opening my package I saw a folded piece of paper. http://imgur.com/tJr7IOF (sorry, dont know/want to take the time to figure out how to put directly into post) Darren (as far as I can tell from the signature, sorry if not Darren!) included a signed picture of an ascii dinosaur! I just wanted to come here to say thank you very much! Also expect an order for a WiFi Pineapple pretty soon. ;)
  14. Have you guys read the recent news? http://thehackernews.com/2013/09/hacking-facebook-to-delete-any-account.html The researcher literally shares the single .php line to put into the URL that is needed to delete ANY facebook account, and even the ID data needed is publicly available too. It's an even more shame because the researcher turned this into Facebook (for those who know, Facebook pays those who find bugs in their system) and they won't even look at his submission. It's a shame
  15. First, let me just say I am completely new to pen testing and such but I am a veteran tech and I want to learn more. I recently got something in the mail that was a promotion for a new TV series. Attached to the side of a fake old 5 1/4 in floppy I noticed a USB edge connector. Printed on the side it read "Insert this into your computer to watch the first full episode now!". I thought for sure that they wouldn't give out a video on a thumb drive so I checked it out. When I plugged it in, it acted a lot like the Rubber Ducky I've seen on Hak5 (a clever bit of marketing I must say). I'm sure that it was coded as a HID because I saw it rapidly open the "Run" box then type a URL to go to it's website and then I assume hit OK or enter to execute it. My question is, can I modify this device to make it more like a Ducky? What tools would I use to explore/modify it's contents? Thanks in advance, I love this forum.
  16. I need someone to write a payload for me that will hack the root of a windows, mac, and linux computer. The payload will be used for a my science project for school. I will include credit to you in my science research paper, i need this soon, if you can help it would be awesome. thanks, msg me if you have any questions.
  17. all the tenants are given a password to access the internet via the landlords router. We are all on the same network. The landlord controls the router and all passwords associated with it. Right now I am hardwired into the router. How do I stop any intrusion via this network. If I can't stop it how do I convince them to stop it. gotta make them stop
  18. Adam from Orbotix shows you how to make a smartphone controlled blender using a sphero board, relay, and some good old fashioned technical legitimacy. http://youtu.be/bh69aY-uZUc
  19. Hello everybody I am completely new to this whole hacking thing. I recently just purchased the pineapple mark IV and just wanted a few simple tasks that I could be able to perform using the device. Phishing, scanning networks, etc. I tried phishing yesterday on windows 7 but when I tried dumping the php files in winscp there was "no enough memory on the device". I plan on installing Linux Ubuntu very shortly so if you guys could point me to some easy "hacks" I could perform that would seriously be great. I'm an intern and my boss asked me to do this so I'm just trying to impress him with some basic tasks. Thank you guys so much for your help.
  20. this may not come as news to most ppl on this forum but the Windows XP (and reportedly Win7) login password is easy to hack using a plain old boot disc. According to researchers the Offline NT Password & Registry Editor utility can be used to reset the password and Ophcrack can crack the pswd hash using large rainbow tables. Although I personally haven't seen similar utilities for Linux, I bet there's a slew of'em out there. Anyone know of any boot disc type tools for lost Linux pswds?
  21. I have WPA handshake which i am having difficulty cracking since i don't have a Wordlist/Dictionary and I can't download a wordlist/dictionary since my current internet is limited to 2 GB per month and i need atleast 10GB to download a good wordlist :( . So the is anyone willing to crack my WPA for something in return? I cannot offer money though but i can offer something else. (Such as a month's free webhosting / Unlimited traffic and unlimited space ) And by the way , The Wifi from the which the WPA handshake was extracted from is Indian. Which means that the password will possibly be a indian name such as Sri vishnu or Jayashree or something like that. The first one to crack my WPA handshake will be rewarded with a smile. ^_^ <content removed due to OP admitting that this is illegal>
  22. Hey! Im new here! i was searching for a website where i can ask questions about backtrack , i found this !!!! Im also new to backtrack .. I saw some tutorials avout HOW TO HACK FB WITH BACKTRACK! i done the same as shown but when i tested the ip generated on other pc , i get to know that WEBPAGE IS NOT AVAILABLE!!! Please Help!! & im getting 127.0.0.1 as inet-ip When I open this in same pc it works! but not in other !!! !!!!!!!
  23. Hey I am building a solution which would track how people move around in a supermarket by capturing their mobile signal that is continuously exchanged with cell phone towers. I am not interested in reading actual data being transferred. I should be able to detect presence of a GSM cell phone and uniquely identify one signal from the other. I want plot this signal on the map of the supermarket. So i should be able to know the distance and direction of the signal with respect to the detector. What do you suggest is the best way to do this?
  24. NEW Version 2.0 of my USB SwissKnife (Faster, Smaller and concealed, With new USB Ruber Ducky 2.0) Since HAK5 recently lowered its price on the USB Ruber Ducky, I decided it was time to update my old USB SwissKnife! So this one is quite simple; A HAK5 USB Ruber Ducky with the TwinDuck (Composite HID + Mass Storage) firmware with a 8Gb SD card + a 32Gb Bootable USB drive. The Bootable USB Drive is exactly like the old one except that I increased from 16Gb to 32Gb… So the old one still correctly describe that portion. However, the new version of the Ruber Ducky is quite different; - It run on custom hardware instead of using a Teensy. - It has its own scripting language. - It is officially supported by some Penetration Testing software. - Require no programming skill to operate and update payload. - Support Mass Storage from the payload SD card. - Faster and slimmer hardware… So it effectively supersede the older versions, including mine… Now, the question is; can I make it better? Well, the only down side is the speed of the USB Mass Storage which is way too slow to use it as a Bootable USB key, It is still good enough for small Application, Script and Payload so I’ll reserve that storage space for that purpose only, which is still very useful since you can access the payload without removing the SD card. In order to add a Bootable USB Key to the mix, I would need to do the same thing I did on the old version, which is adding a HUB… But this time I realized that I have never used both the HID attack vector and the Bootable USB key at the same time, which kind of make sense since one Inject a payload in a foreign OS, the other Boot an OS on a foreign machine, they are 2 different thing so why not use 2 different key? Well, simply because I want to carry only 1 key! All that to say that this hack simply consist of putting the 2 USB devices in the same plastic package, the real hack is what you put on and do with them! Check OLD Version 1.0 for details about the bootable USB tools...
  25. everyone keep posting about there new modules but from where can i download them ? i really want to use them with my pineapple but seems hard to download them
×
×
  • Create New...