Jump to content

Search the Community

Showing results for tags 'hacking'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Hak5 Cloud C²
    • Plunder Bug
    • Bash Bunny
    • Signal Owl
    • USB Rubber Ducky
    • Packet Squirrel
    • LAN Turtle
    • Screen Crab
    • Shark Jack
    • Key Croc
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 17 results

  1. Can someone tell me how can we guess password using python
  2. I sell an Ubertooth One, a Throwing Star LAN Tap Pro and a Rubber Ducky. In perfect conditions, material left from a former pentesting lab and never used (Rubber ducky still brand new, in its original sealed plastic bag). All for 160 euros + shipping. I can also send to most countries in Europe via certified mail or UPS/DHL, etc.
  3. Hi Guys! I hope you guys are safe and fine. I have a query regarding hacking Kakao Talk app. I urgently need someone who can help me with this because I doubt my husband that he is having an affair with another woman and he is not allowing me to check his phone. Every day he chats with some women on Kakao Talk. This extramarital affair is bringing barriers in our relationship and our relationship is getting worse day by day. I just want to know whom he is talking to at my back and what he is planning. Hacking Kakao (카톡 해킹) has become essential for me to keep me and my kids safe if anything my husband is planning against us.
  4. maskgirl

    wifi cracking

    Do we neeed external wireless wifi adapter for performing deauthentication attack?
  5. Hey guys, I am kind of new to the hacking world and was just wondering what would be my best bet in learning how to properly hack? I am pretty good with HTML and know a little PHP, aside from that I do not know anything else. Let me know if any of you would be willing to teach me anymore languages, help me learn more or simply just assist me!
  6. Does anyone have any information about who is behind the Ransomware attack on eHealth Saskatchewan? Really would just like to find out exactly what they want from the government? Background here: https://www.ehealthsask.ca/NewsPage?StoryID=25
  7. Hello! This is my first post ever, I just bought an Arduino Leonardo (this one BAD USB AMAZON), and it's working fine on windows, but when I try to plug it into a mac, the macbook prompts a window saying that I have to set up my keyboard (keyboard set up assistant) so, is there anyway of avoiding this step? And also I would like to know how to access to the arduino leonardo SD from the OS (windows and mac) to copy from the PC to the SD. Is it even possible? By the way all the code that I am writing is being developed on arduino ( C )
  8. I just completed my Masters in COmputer Application. i want to learn ethical hackin all the way as its my passion and my interest. i like to hack things, find vulnerabilites and solve them. but my problem is i dont know where to start, how to pursue and what all to learn. i have good programming skills like java, python,c, mysqla dn javascript. i know basics of networking and operating system. can anyone help me .? it would mean a lot to me.? i want to become a ethical hacker and thats my ultimate goal..!!!
  9. Hi, I’m an author researching material for my next novel about a journalist who exposes an illegal CIA operation and who faces the wrath of the agency as a result. I’m keen to get conformation (or otherwise) on several key points, as follows: Given what we now know as a result of the Vault 7 leaks, is it possible for a top-level CIA hacker to frame a person by… (1) remotely accessing their computer without their knowledge and taking control of it; (2) accessing websites using their browser and planting incriminating material on their hard drive, again without the user’s knowledge; (3) modifying the dates and times when these websites were visited using a tool such as Time Stomper (or similar); (4) finally, having successfully executed the hack, erase it, or hide it, or obfuscate it to the extent that law enforcement forensics are unable to find any evidence that it ever took place? I would be very grateful if anyone could answer these points as I would very much like to get the technical details right in the story. I just need to know what is technically possible and what is fantasy. Many thanks in advance.
  10. So I was thinking about making a "smarter" RFID cloner. Every time you cloned and RFID tag it would store it on a local database that could be accessed by a web interface. You could then select an RFID tag that you have snagged, and it would automatically switch the RFID card to that tag. You could store different tag groups, and select favorite tags, and the coolest part is if you don't know which tag goes to what "lock" you can set the card to cycle, and it would go through and try all the stored tags until it got to the right one. This would be super useful for someone like me who carries around 15 different RFID enabled cards. I could only carry around one and it would be much easier for me to get around. Does anyone have any ideas to add or input? (It needs a cool name, "RFID Narwhal" is the only suggestion I've gotten...
  11. Hi~ I was wondering it's there any device(USB?) , Which can download all the picture , WhatsApp history in a lightening speed (10-30 second)once plugged into the mobile device. Maybe something like rubber ducky but in mobile version . I'm not very good at it , so thx for the advice and tips ahead .
  12. I have been poking at an IP camera for a while now, and have found a few cool things but I was wondering if anyone knew of some good youtubers or forums for specifically IOT hacking, I can't seem to find one. Also back to my project, looking at the traffic in Wireshark shows me that the traffic is unencrypted, would there be any way to watch the stream from within Wireshark? Or any other way to collect the packets and just watch the unencrypted stream? Also since the camera is motorized I am able to see the commands sent to the camera. How would I go about crafting and sending my own packets to the device to make it function? (just looking to be pointed in the right direction, not step by step) I'm guessing this would be some type of python package. Also if anyone has any other ideas for me I would love to hear them.
  13. So Recently, Maybe a Day Ago, My WifiPineapple Nano Said it Couldn't Fetch Information from WifiPineapple.com. Obviously, This is a Problem Because I Cant Check For Updates, Get new Modules, and MOST Importantly, If a Client Connects To My WifiPineapple They Don't Have Any Wifi… I Can Still Search The Web With It Plugged In, So the Wifi Must Work. As I Said Earlier, This Just happened. I Tried Resetting My Pineapple, And Well That Didn't Work. I Went Back Through The Windows Setups (Windows is my main OS) And Everything Was Set Up Right. Any Help Would Be Greatly Appreciated.
  14. So i bought the wifipineapple TETRA, and ive been experimenting with modules and such. Now i have 2 questions which i couldent really figure out my self, thus im asking here. (Im also not sure into which subforum to post this but hey...) - i thought about creating a "fake ap" which, when you connect to it, asks you to login w/ your gmail or facebook account. If someone could suggest me a module that enables me to do this (with a reasonable tutorial), i would be very greatfull. - 2cnd question is probably simple but yet indid not find this option... How do i protect my fake ap with a password encryption (wpa/wpa2) ? It should really work with modules enabled..... is this possible? huge thanks in advance ;)
  15. is it possible to mount say a ntfs (windows) from your computer through say the serial connection? this is what i get with lsblk through serial console or maybe a way to directly boot into the linux distro at startup without putting another distro on the storage..?
  16. Once I deploy the LAN Turtle, SSH into it using my own VPS, is it possible to run my own custom python scripts using the LAN turtle terminal. For example: I write my own python keylogger script and SCP it onto my LAN Turtle. Is there a way to run this? I'm unsure if this will work as this is connected via ethernet, not necessarily a normal USB stick. Thanks for your time.
  17. While the tubes video below go through scenarios for ethical hacking. Can we start posting different "detailed" steps to do such ethical hacking for various scenarios. I would like to see step by step instructions from starting Tetra to using tools,acquiring etc. Go through each tool setup and use. I know HAK5 team has a online doc but can we start one to address how to"s with detailed steps. The PineAP book is good but want more details If Hak5 will allow ( subject to the forums ethical rules ----- can we start it here and post different scenarios ? If ok--separate each scenario with cut lines like below with Q&A to follow in each scenario If not ok to post please advise , or where to do such --all on the basis of ethical pen testing and educational uses for knowledge acquiring https://www.youtube.com/watch?v=eHnQwTCKe2o https://www.youtube.com/watch?v=ZiPAjruB1n4 ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Scenario One I have been asked to test security for a group of people with cell phones and open router points who have assembled close to my location. What are the steps from starting the Tetra, Recon,Clients mode, Pine AP, etc.. Please list in steps 1,2,3 etc.. ---------------------------------------------------------------------------------------------------------- Scenario Two ------------------------------------------------------------------------------------------------------------ Scenario Three --------------------------------------------------------------------------------------------------------------------
×
×
  • Create New...