Jump to content

Search the Community

Showing results for tags 'key'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Hak5 Cloud C²
    • Plunder Bug
    • Bash Bunny
    • Signal Owl
    • USB Rubber Ducky
    • Packet Squirrel
    • LAN Turtle
    • Screen Crab
    • Shark Jack
    • Key Croc
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 5 results

  1. Hello everyone! We're extremely excited to have announced the all-new Key Croc, and this update brings some improvements to the launch firmware as well as introducing support for the Hak5 Cloud C2. Change Log (1.2): General Fix non-ASCII logging Improved automatic VID/PID cloning Improved support for various ATTACKMODES Enable NTP Cloud C2 Add Support for the Hak5 Cloud C2 Misc Remove unneeded packages Improve LED status indication Update DuckyScript 2.0 lang files for US and GB Add fallback Arming Mode Framework now validates payload syntax at startup with LED feedback. Add INSTALL_EXTRAS script Add KEY_DEBUGGER script Add CHECK_PAYLOADS script Add RELOAD_PAYLOADS script You can download the firmware from the Hak5 Download Center. Instructions for updating your Key Croc can be found in the docs.
  2. Hi, We're happy to announce the 2.2.x release of the Cloud C2, which features a new notifications system and support for the new Hak5 Key Croc! Change Log (2.2.0) Hak5 Key Croc Added support for the Hak5 Key Croc! Hak5's Key Croc is a Keylogger armed with pentest tools, remote access and payloads that trigger multi-vector attacks when chosen keywords are typed. Live keystrokes, typed history and keystroke injection can be performed remotely with ease. Notifications Notifications can now be sent from enrolled devices. Notifications can be managed from the new bell icon in the status bar of the Cloud C2. You can download the latest version over-the-air in your existing Cloud C2 instance on Linux or Mac, or visit the Hak5 Download Center to grab the release for all supported devices and operating systems. As always, thank you for the support and great community feedback!
  3. I just received my bash bunny In the mail today! And to put it mildly, I am Enthused! Right away I was very interested in "alternative" ways to use the bash bunny's power. I am new to the Ethical Hacking / IT community (I'm currently enrolled in college as a Cyber sec. and Info. Assurance major) and therefore am not extremely acquainted with scripting. Now. Onto my Idea! I use KeePass on a day to day basis. It is my most trusted application. And I thought I could combine it with the power of the bash bunny! Imagine, If you will, plugging in the bash bunny, it opens KeePass Portable (probably housed in its filesystem), It auto types an insanely long and complex password, (optionally) It searches for your 2FA Key (for security since we are bypassing a password) (presumably on a separate flash drive) and enters it in. What the result would be, you plug in your 2FA drive, You plug in your bash bunny, Boom... passwords all in one place without the hassle! Optional additions: OS Detection that opens a compatible version of KeePass portable Synchronization of old KeePass files of the same name as the database Anywho! Glad to be a part of these forums! Please leave me suggestions and tips! they are greatly appreciated! Many Thanks 9ShadesLeft
  4. Maybe someone can share where to find the storage for WiFi Client Mode ssids and associated preshared keys *** no luck here grep -rnw '/' -e "psk" ...but found in plain text: /dev/mtdblock5:6947024:*mixed-psk▒1+tki)L▒.[PINEAPPLE ROOT WEB INTERFACE ACCESS PASS]' *** no luck here Found from the /etc/pineapple/ path then ran sqlite> .open ssid_list.db tried to select * from ssid_list; which yields nothing for me cause I haven't been been adding any to the filter lists I suppose. *** some success here Found from the /etc/config/wireless file held config wifi-iface option device 'radio1' option ifname 'wlan1' option mode 'sta' option key '[THE CURRENT KEY]' option network 'wwan' option ssid '[TO MY CURRENT GATEWAY SSID]' option encryption 'psk2+ccmp+tkip' BUT, I seem to remember these devices keeping the credentials for multiple gateway APs for WiFi Client Mode without having to retype them although the I believe you would need to be either out of range of a previously connected AP for it to connect automatically to the another previous AP that is in range....at worst you would need to restart the pineapple and it would remember the the other AP. My question is: Where does the pineapple store the rest of these ssid's and keys that are not in use? This way when I upgrade I don't have to revisit APs find/remember and fill out credentials every time but instead just copy and paste them to the correct file(s) over ssh or whatever.
  5. Hey guys, i was checking the System Log as I saw the following entries: auth.err sshd[2499]: error: Could not load host key: /etc/ssh/ssh_host_ecdsa_key auth.err sshd[2499]: error: Could not load host key: /etc/ssh/ssh_host_ed25519_key I recently made a fresh factory reset and update to 1.0.6. SSH into the pineapple is possible, but I wonder why the keys were not generated. Anyone else with this error message?
×
×
  • Create New...