Jump to content

Search the Community

Showing results for tags 'macos'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 5 results

  1. I had one of the original Wifi Pineapples, and remember using the wp6.sh script for connection sharing. When I attempted to run the wp6.sh script on my Mac, I was greeted with iproute2 is required. What is the preferred method for connecting the WiFi Pineapple to a Mac a forwarding traffic through it? Thank you.
  2. Ding ding, it's payload time This is a two stages payload. First you use the 'injector' that will install a small bash script which is a wrapper for sudo. The script will store the passwords. Second, you use the 'cleaner' to get the passwords back and clean the backdoor. So basically, you get access to a computer running MacOS or Linux (you can config the payload by setting mac=true) and you install the backdoor. A couple of hours/days/weeks later you comme back, grab the passwords and erase traces. Easy Link: https://github.com/oXis/bashbunny-payl
  3. Please check git for the latest README/code https://github.com/stekole/bashbunny-payloads/tree/master/payloads/library/remote_access/untitled_EVILOSX untitled_EVILOSX + ______ _ _ ____ _____ __ __ + | ____| (_)| | / __ \ / ____|\ \ / / + | |__ __ __ _ | || | | || (___ \ V / + | __|\ \ / /| || || | | | \___ \ > < + | |____\ V / | || || |__| | ____) | / . \ + |______|\_/ |_||_| \____/ |_____/ /_/ \_\\ + untitled_ bash bunny edition / stekole ** Disclaimer: This RAT is for research purposes only, and should only be used
  4. Hi, I spent quite some time fiddling around my BB, plugged on a Macbook with a french layout, I now understand setting DUCKY_LANG to "fr" is not enough, and that I probably have to define a specific language file, but I still get strange results. IN CONFIG.TXT: DUCKY_LANG fr IN FR.JSON (there are lots more lines !): "!":"00,00,25", "=":"00,00,38", IN PAYLOAD: # ISO (European) Apple keyboard ATTACKMODE HID VID_0x05ac PID_0x0273 STORAGE LED ATTACK RUN OSX textedit Q ENTER Q DELAY 500 Q TAB Q TAB Q TAB Q TAB Q TAB Q TAB Q SPACE Q ENTER Q STRING exclamat
  5. Hi folks, i have problems to get the bash bunny work on macOS High Sierra ! its possible to ssh into the bunny but i cant run apt update etc... i have followed the bunny wiki and installed squid ..it runs ....but when i want to apt update i get this output: root@bunny:~# apt update Err http://httpredir.debian.org jessie InRelease Err http://httpredir.debian.org jessie Release.gpg Could not resolve 'httpredir.debian.org' Reading package lists... Done Building dependency tree Reading state information... Done All packages are up to date. W: Failed
×
×
  • Create New...