Jump to content

Search the Community

Showing results for tags 'Google'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 12 results

  1. I am trying to use NMap with Google Safe Browsing API to check if a host is malicious or not. I used VirusTotal API for the same purpose and it returned appropriate results but the Google API did not. I am using Kali Linux on VM Ware Player. The commands I have typed are:- 1)nmap -p80 --script http-google-malware <target> 2)nmap $nmap -p80 --script http-google-malware --script-args http-google-malware.api=<API> <target> To use VirusTotal API, I used the command - nmap -sV --script=http-malware-host <target> and it worked. I am expecting an outp
  2. I was pointed to this by an LE contact: http://insider.foxnews.com/2018/02/07/google-tracking-you-tucker-carlsons-report-silicon-valley-surveillance-capitalism The kit used by the reporter - anyone know what it is? I can tell that these are being used: The device in the middle is a Throwing Star Lan Tap: https://greatscottgadgets.com/throwingstar/ The device on the right is an Intel CPU stick: https://www.amazon.com/Intel-Compute-Computer-processor-BOXSTK2m3W64CC/dp/B01AZC4IKK The rest of it looks like probably standard WiFi, maybe a large battery to power the whole se
  3. Does any of you got a script dor the rubber ducky to steal a google/youtube password and or username?
  4. Are Google URLs truly vulnerable to Open Redirection like explained here https://www.indusface.com/blog/?p=1646 Can it happen to anyone's website?
  5. Yeah that Right, Google's New Toy can't even work with Security key.. You can only have one running at one time not both. This is really freaking odd!
  6. I had a question that I wanted to see if anyone has encountered or heard of. At my work 2 devices had all search results in Google Chrome redirect. On the desktop all image search results would come up with large people. On a Chromebook any search result came back with porn. Unfortunately someone wiped out the desktop so I was unable to get my hands on it to look it over. The systems are generally locked down (the desktop by GPO) and the Chromebook by Google admin. Anyone run into this before? Thanks
  7. Basically if you append /%%30%30 to the end of any url you manually enter it will crash chrome (desktop) and a mouse over of a link containing it can crash chrome, or just the page you were on with the link. On mobile Chrome only mouse over works at least from testing it on my tablet and phone.
  8. For instance, all I know is this person's username on youtube. He's one of those trose whom are of course annoying. 4Chan people are able to find information quickly by doxing but I don't understand how? There was this one Dox for an obvious troll who screams out troll on Youtube - whom was identified as Griffon not Dillion. Most of the youtube trolls don't even read their messages - so to get their ip address isn't any help. Also, getting someone's IP will not reveal their name just close approx of street address. Also he called himself Dillion Prescott Henderson but that name isn't real. T
  9. Hello, I just received my wifi pineapple mark v, I put sslstrip running, but I only worked on hotmail.com, if I try to go to facebook or youtube the security HTTPS still on, can someone help me on this?. thank you
  10. Big Up Date The Project is now at Halt due to fact that my Rubber Ducky Has Red Light And i cant fix it so i will be buying a new one after i saved up for WiFi Pineapple i will be still coding it but cant really test any thing that needs a rubber ducky SORRY Read Me First This project was pick up From Hak5 User SEE CREDITS FOR NAME'S But seem project was drop so i takeing on my self to carry this on due to amount of people Requesting this am not coder i only really know batch (KILL me i know) i fort why not make something of use and not other webpage reader like android store is full
  11. Ok, so there's a lot of cool Ducky scripts out there, my personal favourite is the script that steals Windows passwords - AWSOME!!! But do any scripts aim to get more than just a Windows password? Do any of them "Backup" Google Chrome Login Data, WiFi keys, Windows Product Keys or Replace the Administrator password or even hide the account so you can have "stealthy" remote access via Windows Shares (Known as SMB)? I THINK PAYLOADS SHOULD DO MORE! So... I introduce the ULTIMATE DATA THEIF!!! Payload: Unfortunately, the forum only allows a maximum of 500kb of upload space and the extra dat
  12. Garda

    Fun with Shodan

    I have been having a bit of fun with the search engine [url"http://www.shodanhq.com]Shodan[/url]. It was mentioned in this episode of Hak5 and in a few old discussions in these forums. Unlike other search engines it indexes technical information about services that run on the Internet. For example, it lets you search by web server type, or by strings in the headers sent when sessions are initiated. For example, I was kind of interested to know if there are a lot of people with Internet facing instances of the http://www.rejetto.com/hfs/'>HFS web server. If you access a web server via telne
×
×
  • Create New...