Jump to content

Search the Community

Showing results for tags 'security'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Enter a five letter word.

  1. Are Google URLs truly vulnerable to Open Redirection like explained here https://www.indusface.com/blog/?p=1646 Can it happen to anyone's website?
  2. What are you reading right now? What's on your reading list? Hacking and security related or not, doesn't matter.
  3. I just read the "leaked" draft of the senate encryption bill. It looks awful and contradictory in addition to the adjectives the wired article gave it. My senator's office is across the street from where I work. So I plan on stopping by over lunch on Monday to irritate her staff, by listing off the ways that that bill could break the internet while failing to solve the problems it is aimed at fixing. Wired article here http://www.wired.com/2016/04/senates-draft-encryption-bill-privacy-nightmare/ vice article here http://motherboard.vice.com/read/leaked-burr-feinstein-encryption-bill-is-a-threat-to-american-privacy draft here https://www.scribd.com/doc/307378123/Burr-Encryption-Bill-Discussion-Draft Anyway, I'm a bit annoyed right now that someone thought what they have so far was worth writing down.
  4. Hi all, Just a quick post about certs. Im new to Security so thinking about doing Offensive Security course but need to save up ha ha. I am currently a sys admin/devops and want to move into pen testing as thats where I have wanted to be for a long time. Anyone else here done any similar certs? if so what was your experience, was it useful to do etc?
  5. I've been using Kali for a long time and I'm comfortable with it but I feel it's time to move on. From what I understand, since it is an OS strictly for pentesting it doesn't take into account the user's own security. In the past I've used Kali for brief periods of time without worrying about the security of the system I was on. However, if I am to become better at pentesting then I must upgrade the tools I use. I also want to practice on the same system I would use for actual pentests. Which OS can you recommend that provides the power and tool selection that Kali does but also provides security similar to Tails? I know there won't be a perfect cross-over but I'm looking for the closest one available. I have found a list of pentesting distros including BlackArch (which I've used briefly), BackBox, and ArchAssault. I'll continue researching but would appreciate your opinions and experiences with these various distros.
  6. Hi all, So, this script shouldn't work without a password for a user, but it does. Using PSTools and being on the same network as the target PC. Set the %Time% to be in a couple of minutes . . . XCOPY C:\Foo.bat \\%Hostname%\c$ /E /S /C /Y psexec \\%Hostname% -s -c -f cmd.exe /c "Schtasks /create /RU %UserID% /SC ONCE /TN %NameOfTask% /TR c:\Foo.bat /ST %Time% This actually successfully runs Foo.bat on a user's PC, as the %UserID% set in the script, but doesn't actually prompt for their password. It just runs. I've even managed to use this to send a command to copy files, from a folder that only they have access to, to a location I can then pull them from. If I clean up after me (delete schtask and bat file), it looks to the system like they ran the command and not anyone else. Security flaw?
  7. Hi, i have been watching Hak5 for a couple of months now and filtering through all the great videos. Fantastic education! Now, i have a small home network of 1 main desktop pc, one medium dektop pc, various laptops on wifi, 2 smart phones, 2 printers. I also have many pc's come through my house as i repair them etc. My question is, what is the best way to screw down security for my setup. I also run a off the shelf wireless modem\router for my ADSL2. I am going to set up my own cloud system, my own router, a VPN as shown on the Hak5 episodes and that's about it for now. Can you guys suggest anything else i sould install\set up, be it software and or hardware to make my system tighter than a constipated fishes ring? Naa, not that much, but at least good enough to keep most unwanted peoples and thingies out. I also run virtual box on my main machine with 2 or 3 versions of windows and 3-4 versions of linux mainly for learning purposes. the main machine runs win7 x64. all computers run AVG free\Malwarebytes and i run ccleaner every so often. With all the foreign computers i get through this place in a year i am amazed that i am not cleaning out infections from my computers all the time but rarely have to at all unless i do something i KNOW will compromise my system, but then i just get rid of it anyway. I have very little money, a few computer parts, a couple spare laptops and a netbook. Any suggestions would be greatfully accepted. Thank You. Gary Smith Land Down Under....
  8. hello everyone, i was wonder about support regard security issues/exploits. so like most of you guys i also carry a "smartphone" (android in this case). what do you guys think the support on a "smartphone" should be? 2 years, 3 year, 5 years? and should it receive security updates even a year after the mentioned years? also i own a HTC One M7 (android) should in this case HTC (and or any other brand) make a security update for a phone regarding the fact that it is 3 years old because of the stagefright exploit? Thank in advance and sorry if the reading is wonky
  9. Hey guys. I was wondering how to go about setting up a JAVA-BASED honeypot in VMware, using the network architecture below as an example. I 'm specific about the honeypot being java-based because I'd like to be able to generate statistical reports in a java console. If this project has been worked on before, I'd appreciate a re-direct or two, and I'd also like to know your recommendations on the types of operating systems suggested for each of the systems in the network (IDS, client/webserver, honeypot, firewall). Thanks.
  10. Hi I am quite new to password generation so forgive me if this is a stupid question:) I am trying to generate all possible combinations of WPA keys for BigPond modems in Australia. i have identified the layout of every single key that they generate. they look like this 1234E5678D: and its always the same layout " the first 4 characters are numbers, then the 5th character is a capital letter. then the next 4 are numbers again and the last is a letter" but for the life of me i cannot seem to work out how to generate keys with such specific parameters? any ideas how i would accomplish this? any help would be much appreciated.
  11. Hi Guys, Firstly, not sure if I'm posting in the correct place, I'm new here as you can probably tell. If it's the wrong thread, or you know where they can be posted in order to get more responses, would be great if you could help me! I'm currently doing a project for University and I'm trying to find Networking professionals who have job backgrounds (which is really becoming really hard right now) and it's due in on the 1st of April, unfortunately! I have a survey which needs filling out in regards to DDoS'ing and Internet Security within a business or organisation. I need to gather primary research and produce a case study based on the information I receive, so kinda determines my grade hugely. If you could spend around 10 minutes (max) filling in this survey: It'd be greatly appreciated! https://petelanceley.typeform.com/to/D654Se Cheers
  12. Never in the time of human existence has each detail of our daily lives been under such constant scrutiny. Many may think that by making these statements I would be protesting over only my own government. Indeed the revelations made by Edward Snowden over the NSA programs are a valid concern. It is not though setting the price of goods and limiting the opportunities of millions like those of corporate interests. The countless corporate entities monitoring practically all of our actions is the real shared problem we face. It seems that the idea of our privacy was somehow lost. If you are under 40 you only know of life with surveillance, it hasn’t always been this way. And really it doesn’t need to be this way either. I’ve written a book, but that’s not why I am posting here. I need help, I have a website that I hope to list every company that is stealing our information and selling it. Trust me it is a big list. I have done part of the work and I invite you to take a look. HTTP://itsmyinfo.org If you like youtube videos check out the videos page on the site, look for Congressional Testimony. It’s the third video down on the left. If you are interested in giving me please let me know. Thanks Trip Tripelix (@) outlook.com
  13. I'm not completely new to pentesting and Im not completely new to Kali Linux, We've been using Kali Linux for Everything at school. I have Kali on a usb I boot up everything works great. Recently I was given a hp Chromebook 14 and decided to install Kali using the crouton method. The distro is bare so you have to install a metapackage after the initial setup. I installed the kali-linux-top10 which is the top 10 security pentesting tools. Today I finally sat down for the first time to really play around with Kali and to Pentest my network which I did and I found a few vulnerable ports on another laptop running in the house so I decided to use metasploit and see what I could get my hands on but i got this *] Starting the Metasploit Framework console.../[-] Failed to connect to the database: could not connect to server: Connection refused Is the server running on host "localhost" (::1) and accepting TCP/IP connections on port 5432? could not connect to server: Connection refused Is the server running on host "localhost" ( and accepting TCP/IP connections on port 5432? So none of the exploits are working..... I know this is a user error and the fix has to be something simple but i could use some help .....any suggestions?
  14. I am looking to find a way to ensure that I do not directly know the IP addresses of any customers. My initial thought for this is to assign addresses through DHCP (as is currently done) taking the IP addresses, salting and hashing them then applying that hash to to the records. Obviously this would not work for statically assigned addresses. I am fully aware that this is no way making my customers anonymous. My main goal is to simply ensure that no customer IP addresses are directly known, thus we cannot be compelled to release a customer's address. Also, we would not have any kind of historical record as to which customer had which address in the past (aside from the salted and hashed address within the records). Is this a feasible option? Are there any programs/protocols currently available to do this?
  15. I work in IT as a combination network administrator and computer consultant. I often get the question of "how do I keep my computer secure", however, despite the normal "best practices" that I typically return to the average people that I help regularly, I always think to myself "you know, I can think of a few ways these normal techniques can be circumvented" or "normal computer security techniques would probably be a joke to circumvent for the $name_of_3_letter_intelligence_organization". So I started thinking... How do government intelligence agencies handle security? If I did want to commit some kind of massive information crime (not that I would ever want to), how could I ensure that nobody could figure out my physical location, and if they do, how could I secure the information on my equipment in such a way that if seized and analysed by the best computer forensics and cryptoanalysts in the world, that they would find none of the incriminating information for prosecution. It occurs to me that most publicly available crypto software is likely either not strong enough to resist the repeated attempts at circumvention by a government agency with as many resources as the NSA. Is there better software available than bitlocker / filevault2 / truecrypt / luks/dmcrypt? How does one mitigate cold boot attacks? What about mitigating against simple coercion? I know that for most standard United States trials, the fifth amendment gives some protection to people against giving up information in their head as they don't make you testify against yourself, but what about those people in non-public situations or outside of the united states on a waterboard? - a system with authentication expiration would probably be a good idea. somehow integrating a dead-man's-switch into the mix. But in all seriousness, in these days of lowered trust in governments and law enforcement officials, with anti-piracy crackdowns and governments like the Koreans and Chinese who have no free speech policies, or simple private communications, how does one create a secure system? can we really trust the common operating systems we use? windows? mac os x? - even linux and it's associated programs that make up standard distributions that are completely open source, do they have the code scrutiny to say "yes, this is completely secure!"? I really don't think so. and then worse, once you get the base system set up (even if you assume it's 100% secure), once you start adding software that you use on a daily basis, things like word processors, video players, graphical window managers, etc. how do we trust that the programs or the interactions between those programs will be secure as well? tl;dr: If you were Batman, Nick Fury, or the CIA or NSA's CIO, what kind of computer systems would you use and how would you make sure that they were totally and completely secure? How would you secure their networking? and if someone were to raid and seize these machines, how would you make it so the expert government agency with virtually unlimited resources can't access any incriminating data?
  16. I don't know if this is a stupid easy question but I was wondering, is it possable to add a non-root user on the Pineapple Mark V. The reason why I want to be able to do this is to add another secure messure for when I have my SSH Tunnel set up to my server. For example, someone discovers my wifi pineapple and if they get my password from my Pineapple and SSH into it and then they would be able to SSH into my server without a password, that's what I am worried about since when they do, they have root privileges. Unless I am setting it up wrong... Any ideas?
  17. Hello everyone. I am building an xbee wireless sensor network and naturally the first thing that comes to mind is "How can I hack into it" I want to test the security of this sensor network as it will be integrated into a security system. has anyone heard of anyone pentesting 802.15.4 or had any experience in this? and now starts the googling!!!
  18. Hello , i am currently working on MITM attacks and i am trying to redirect websites to my computer through dnsspoof and the problem is that ,although it is picking up traffic and i can see it registers all sites the victim is visiting , it is still letting the victim connect to the website instead of redirecting it to me. Here is a my procedure: -firstly i created a mon0 interface form wlan0 wireless card -i started up my access point [ airbase-ng --essid mitm -c 11 mon0 ] -then i created a bridge between at0 and eth0 : brctl addbr mitm-bridge brctl addif mitm-bridge eth0 brctl addif mitm-bridge at0 ifconfig eth0 up ifconfig at0 up -then i went into [ ifconfig ] to see my ip ( lets say it is ) and did : ifconfig mitm-bridge up -so now my machine and the bridge have the same ip -then i did ip forwarding: echo 1 > /proc/sys/net/ipv4/ip_forward -i connected the victim to the airbase-ng and everything was fine .The traffic was going through and there was no problem. -then i did: dnsspoof -i mitm-bridge -it started and when i went to google.com on the victim machine it didnt reroute it.It just went to google.com -when it connected to google.com it showed : .<some random 5 digit number> > A? google.com -from where i was getting my information about dnsspoof it showed that instead of the ( the ip of the victim device ) should be ( attacking device ) and it was stated that the connection would be refused but it wasnt! Please help me! I am trying to figure this out for a week now... Good day!
  19. So I have been having this problem for like a week now and I can't figure out why. The problem is that when ever I try to start up a session of Metasploit or Armitage it gives me a error message saying that it couldn't connect to the database! Armitage's Error Message Could not connect to database. Click Help button for troubleshooting help. Connection refused Check that the hostname and port are correct and that the postmaster is accepting TCP/IP connections. Metasploit Error Message Failed to connect to database: Could not connect to server: Connection Refused If anyone could give me some suggestions on how to fix it I would be very grateful! If any more information is needed please tell me!
  20. Morning all, I've been lucky enough to get myself a spot in a top-notch SOC. While I'm a smart kid, I'm still a long way from being an expert, and one of the steps on the road to becoming a security zen master is a way to learn all the stuff I won't learn on the job. Hence, personal lab is required. I've had some ideas, and some advice from a good friend who knows what he's talking about, and some of his advice was to ask you guys for thoughts. My main goals for a lab are: - Proxy server - Firewall - VPN - Some sort of basic NIDS/NIPS Additional goals, but these are stretch goals: - DHCP - Start learning about AD - Pen testing - Malware analysis My budget isn't huge but I can probably stretch to close to €1,000 at the minute. I'm still working on the details, which is where I hope you can come in with some thoughts. Firstly, hardware. I'm thinking that I can get a shuttle/HTPC box and max out the RAM (16GB or even 32), then virtualize most of the functions with ESXi. Should I plan for more than one physical box or is one enough for now? For OS, I want to do as much with Linux as possible because although I've used it, I'm still pretty green. Are there distros you would recommend for this? Bonus points for the less dependency headaches I have with installing the various software packages. I've only done a very small amount of exploration on applications, enough to suggest that squid might be a good place to start for a proxy but no more than that really. Walkthroughs, guidance, instructions - I know what it's like to be constantly pestered by newbies on really basic questions so if you can point me at resources that will help to save me from asking them, that would be great. I have a couple of books that I'm sure will have some relevant stuff in, but they're not exactly tailored to this specific task - if you know of more that will be a good idea for me to read for this purpose, please say so. Finally, if I also plan on setting up a media server, could this be done on the same machine or should I avoid that? Thanks for your time, fearnothing
  21. pg94


    If there is anyone out there who can help me? My goal is to gain as much experience as possible while in college to make my self very marketable before I graduate. I've applied for numerous internships all over the country. I just need help with a few things. 1) Where are some open source projects I could work on, or how could I start my own? 2) Any conferences or gatherings I could go to that would enable me to network with others? 3) What are some other things that I haven't mentioned that would make me more marketable? (Aside from GPA and being active in a club on campus) (I'm a Computer Science Major but my focus is mainly security)
  22. Hey guys, Thought I'd share my latest blog about hacking the router provided to me by my new ISP. To say the security is shocking would be a bit of an understatement. Feedback greatly welcome! https://scotthelme.co.uk/ee-brightbox-router-hacked/ Regards, Scott.
  23. I am a freshmen in college and I want to enter the cyber security field. I want to apply for internships my junior year. My question to all the pro's out there, what is the best advice you could give me? To define the question I mean what open source projects, certifications, skills, and ect should I master to put on my applications? I want to stand out, I want to have the edge. Thanks for taking your time to read my post. ~ PG
  24. Ok, Most of you people probably came a cross this before. Trying to configure a new linux and getting nowhere just because SELinux is enabled. So i taught lets ask some questions to the hak5 community and see what they think of SELinux. ( Not going in to the topic if its more secure :p ) What is the standpoint of you guys on SELinux ( Good, Bad, Only made to annoy people, ... )? Do you make use of it? Did you ever wrote rules for this? Do you use it in combination of self compiled software? In witch scenario do you use it? If you got some questions yourself, Feel free to add em.
  25. I want to learn more about hacking. I have heard about free hacker spaces. But whenever I look those up on Google I find a nice long list of broken links. Are there still any legal hacker spaces open?
  • Create New...