Jump to content

Search the Community

Showing results for tags 'iOS'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 15 results

  1. Hi Everyone, I am beginning to do some reasearch on using the bash bunny on IOS devices and was wondering if anyone might know the anwser to a couple questions: Will the Bash Bunny work reliably on an IOS Device Can you use any lightning to USB adapter or do you have to use apples adapter Thanks in advance.
  2. Hi Im running NTOPNG on my home network. In the last day I’ve noticed flows from my iPad to China (IP:49.234.241.239). I have no apps open on the iPad. Any ideas what/why this is happening? byte size is 546 and is using TLS over TCP and numerous ports.
  3. I am in trouble. Its my second time my phone locked with icloud.need help. Please guide me.a - z I know nothing about hacking
  4. I’m not affiliated in anyway to this guy but I wish he was someone I hung out with; I’msure it would make me a smarter person. I love this guy’s apps. They’re informative, useful and to the point. He’s one of three app developers where I’ve sent extra money to support his work. His Electronic Toolbox Pro and RF-Toolbox Pro are way over my head. His Network Toolbox app is something I keep on my static iphone dock. Man is It’s useful. Check out his stuff I think most of the serious people on this forum would appriciate his work. https://itunes.apple.com/us/developer/marcus-r
  5. First off the iPhone is question is jailbroken on iOS 9.3.3. What i'm trying to do is a project like this(https://braindead-security.blogspot.com/2017/06/building-rogue-captive-portal-for.html) but on my phone's personal hotspot. I think this should be possible, I'm just not entirely sure how to go about this on an iPhone.
  6. Hi, Doing some security testing/learning in my home lab again, this time using an iOS phone. Does anyone know how the Two-Factor-Authentication for iOS devices determines whether the device logging in is indeed a 'Trusted Device'? Does it use the MAC address of the device, the IP address, a file on the device? I'm using a Kali box to see if I can log in to the iCloud without it asking for Two-Factor-Authentication; tricking the login in to thinking that the Kali box is actually the trusted iOS phone. In order to do so, I need to narrow down how the iOS login determines that
  7. NetworkToolbox - Network scanning and analyzing by Marcus Roskosch https://appsto.re/us/9wa2M.i https://networktoolbox.de/ Shits extensive. I don't pay for apps willy-nilly, this one has not failed to impress. Heres a list of it's features: Features of NetworkToolbox Scan your local home- or corporate-network within seconds. Explore all connected devices and get a complete picture of your network. Over 26 individual tools are available to analyze you
  8. Is it possible to create an ios app payload, like we do using metasploit to hack an android phone using reverst tcp method by creating a payload.apk?
  9. Can we bypassing HSTS by using this MITM technique? The attack works on latest versions of iOS including iOS 8.1.1 and On most Android devices. Source: https://blog.zimperium.com/doubledirect-zimperium-discovers-full-duplex-icmp-redirect-attacks-in-the-wild/
  10. Just received my pineapple a couple of days ago, yay (with a defective power supply, unfortunately) What is the best practise to control a pineapple from a smartphone? I'm using a Nexus 6, but my browser can't handle the big tiles properly. When entering a big tile, I can't scroll down within that tile. That makes most of the infusions useless to control from a smartphone. I've tried Chrome and Firefox even in "Desktop mode" but still no joy. How do you guys control your pineapple from a smartphone (android in particular)? //WB
  11. Hi guys, I recently started learning more about ethical hacking and stumbled upon metasploit. It is a great tool but I am having an issue on a pen test, which is the following. I am trying to exploit my IPad Air- IOS 8.1.1 Jailbroken and I am using the exploit "exploit/apple_ios/ssh/cydia_default_ssh". Also the OS I am running is Kali Linux. I am able to setup the RHOST with my IP Address (192.168.1.2) and the default port 22. This data is confirmed and accurate as I did a nmap scan just before that showed me that the port 22 was open on that IP. Everything seems fine until i try to run th
  12. i want to test and demo pwning of mobile devices such as Android and iOS. i googled a lot and found a recent example: https://www.youtube.com/watch?v=TbyQoWyaw2g can i achieve the same thing using Pineapple only? right now i am trying to get Kali machine + beef + metasploit working with that module without success (that specific vulnerability). i found in the forum there's something named JasagerPwn that contains beef: https://forums.hak5.org/index.php?showtopic=30588 but don't know if this is an updated infusion or if it was replaced with other infusion. bottom line - is there an infus
  13. Here's one suggestion for hak5 group or for any app developper out there. This would be ultimate android or ios app for hackers. If you would use smarthphone as rubber ducky via usb cabel. It would be dream if you could just write payloads on your phone and then plug your device to computer using usb cabel
  14. Hey, so I grabbed my Rubber Ducky and iPhone 30 pin to USB adapter, opened notes, plugged in Rubber Ducky. And I see error 'Cannot Use Device - The connected USB device is not supported.' although upon saying OK to do see keys being send to the notes via this Rubber Ducky HID device. So now to play with some payloads on iOS maybe? Also on another note id like to place this Rubber Ducky on a Blackberry... Any ideas? No go at first glance and something about blackberries using Master USB keyboards versus Slave. Anyone? Thanks and Have FUN, HiWEB
  15. Hey I recently saw the topic about the rubber ducky working with iOS and it got me thinking. Is there a way for the rubber ducky to capture a screenshot on an iPad (or other iOS device)? From the research I've done if you turn on VoiceOver and press Ctrl+Alt+H then that hits the home button but I haven't figured out how to simulate a Sleep/Lock button press. Any suggestions?
×
×
  • Create New...