Jump to content
Hak5 Forums

Search the Community

Showing results for tags 'Mac'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapple University
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Bash Bunny
    • Packet Squirrel
    • LAN Turtle
    • USB Rubber Ducky
  • Hak5 Shows
    • Hak5
    • HakTip
    • Metasploit Minute
    • Threatwire
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Found 25 results

  1. I see lots of unanswered questions about layouts and foreign languages for mac os: And close to zero support nor answers, nor anything in fact, so here's my take on it since I spent quite some time getting it worked ! There is this thread to bypass the keyboard assistant, well this is half the solution in fact. You need to get the PID of the right layout AND have the correct json. So for instance, to have working payloads on a french mac, you'll need that fr-mc.json AND use DUCKY_LANG fr-mc ATTACKMODE HID VID_0X05AC PID_0X0250 { "__comment": "All numbers here are in hex format and 0x is ignored.", "__comment": " ", "__comment": "This list is in ascending order of 3rd byte (HID Usage ID).", "__comment": " See section 10 Keyboard/Keypad Page (0x07)", "__comment": " of document USB HID Usage Tables Version 1.12.", "__comment": " ", "__comment": "Definition of these 3 bytes can be found", "__comment": " in section B.1 Protocol 1 (Keyboard)", "__comment": " of document Device Class Definition for HID Version 1.11", "__comment": " - byte 1: Modifier keys", "__comment": " - byte 2: Reserved", "__comment": " - byte 3: Keycode 1", "__comment": " ", "__comment": "Both documents can be obtained from link here", "__comment": " http://www.usb.org/developers/hidpage/", "__comment": " ", "__comment": "A = LeftShift + a, { = LeftShift + [", "__comment": " ", "CTRL": "01,00,00", "CONTROL": "01,00,00", "SHIFT": "02,00,00", "ALT": "04,00,00", "GUI": "08,00,00", "WINDOWS": "08,00,00", "CTRL-ALT": "05,00,00", "CTRL-SHIFT": "03,00,00", "ALT-SHIFT": "06,00,00", "__comment": "Below 5 key combinations are for Mac OSX", "__comment": "Example: (COMMAND-OPTION SHIFT t) to open terminal", "COMMAND": "08,00,00", "COMMAND-CTRL": "09,00,00", "COMMAND-CTRL-SHIFT": "0B,00,00", "COMMAND-OPTION": "0C,00,00", "COMMAND-OPTION-SHIFT": "0E,00,00", "q": "00,00,04", "Q": "02,00,04", "b": "00,00,05", "B": "02,00,05", "c": "00,00,06", "C": "02,00,06", "d": "00,00,07", "D": "02,00,07", "e": "00,00,08", "E": "02,00,08", "f": "00,00,09", "F": "02,00,09", "g": "00,00,0a", "G": "02,00,0a", "h": "00,00,0b", "H": "02,00,0b", "i": "00,00,0c", "I": "02,00,0c", "j": "00,00,0d", "J": "02,00,0d", "k": "00,00,0e", "K": "02,00,0e", "l": "00,00,0f", "L": "02,00,0f", ",": "00,00,10", "?": "02,00,10", "n": "00,00,11", "N": "02,00,11", "~": "04,00,11", "o": "00,00,12", "O": "02,00,12", "p": "00,00,13", "P": "02,00,13", "a": "00,00,14", "A": "02,00,14", "r": "00,00,15", "R": "02,00,15", "s": "00,00,16", "S": "02,00,16", "t": "00,00,17", "T": "02,00,17", "u": "00,00,18", "U": "02,00,18", "v": "00,00,19", "V": "02,00,19", "z": "00,00,1a", "Z": "02,00,1a", "x": "00,00,1b", "X": "02,00,1b", "y": "00,00,1c", "Y": "02,00,1c", "w": "00,00,1d", "W": "02,00,1d", "&": "00,00,1e", "1": "02,00,1e", "é": "00,00,1f", "2": "02,00,1f", "\"": "00,00,20", "3": "02,00,20", "'": "00,00,21", "4": "02,00,21", "(": "00,00,22", "5": "02,00,22", "§": "00,00,23", "6": "02,00,23", "è": "00,00,24", "7": "02,00,24", "!": "00,00,25", "8": "02,00,25", "ç": "00,00,26", "9": "02,00,26", "à": "00,00,27", "0": "02,00,27", "ENTER": "00,00,28", "ESC": "00,00,29", "ESCAPE": "00,00,29", "BACKSPACE": "00,00,2a", "TAB": "00,00,2b", "ALT-TAB": "04,00,2b", "SPACE": "00,00,2c", " ": "00,00,2c", ")": "00,00,2d", "°": "02,00,2d", "-": "00,00,2e", "_": "02,00,2e", "^": "00,00,2f", "¨": "02,00,2f", "$": "00,00,30", "*": "02,00,30", "`": "00,00,31", "£": "02,00,31", "m": "00,00,33", "M": "02,00,33", "ù": "00,00,34", "%": "02,00,34", "<": "00,00,64", ">": "02,00,64", ";": "00,00,36", ".": "02,00,36", ":": "00,00,37", "/": "02,00,37", "=": "00,00,38", "+": "02,00,38", "CAPSLOCK": "00,00,39", "F1": "00,00,3a", "F2": "00,00,3b", "F3": "00,00,3c", "F4": "00,00,3d", "F5": "00,00,3e", "F6": "00,00,3f", "F7": "00,00,40", "F8": "00,00,41", "F9": "00,00,42", "F10": "00,00,43", "F11": "00,00,44", "F12": "00,00,45", "PRINTSCREEN":"00,00,46", "SCROLLLOCK": "00,00,47", "PAUSE": "00,00,48", "BREAK": "00,00,48", "INSERT": "00,00,49", "HOME": "00,00,4a", "PAGEUP": "00,00,4b", "DELETE": "00,00,4c", "DEL": "00,00,4c", "END": "00,00,4d", "PAGEDOWN": "00,00,4e", "RIGHTARROW": "00,00,4f", "RIGHT": "00,00,4f", "LEFTARROW": "00,00,50", "LEFT": "00,00,50", "DOWNARROW": "00,00,51", "DOWN": "00,00,51", "UPARROW": "00,00,52", "UP": "00,00,52", "NUMLOCK": "00,00,53", "MENU": "00,00,65", "APP": "00,00,65" }
  2. iMessage's Archive to Email OS X

    Hello! Thought some of you might find this useful. It is simply a script that retrieves the iMessages archive and sends it over email. The code is a bit long and can probably be sized down and made "better". I would love some feed back on it as this is my first script. Enjoy -wiredbrother https://pastebin.com/XZrcJu0s
  3. Reverse Shell Mac for Bash Bunny Author: 0dyss3us (KeenanV) Version: 1.0 Description Opens a persistent reverse shell on victim's mac and connects it back to host attacker over TCP. Targets MacOS (OSX may work but has not been tested) Connection can be closed and reconnected at any time Deploys in roughly 30 sec (working on making it faster) Works well with NetCat as the listener Requirements Have a working Bash Bunny :) and a victim with MacOS STATUS LED STATUS Purple Setup Amber (Single Blink) Installing connect.sh script Amber (Double Blink) Creating cron job White (Fast Blink) Cleaning up Green Finished Installation and Execution Plug in Bash Bunny in arming mode Move files from MacPersistentReverseShell to either switch folder Edit the connect.sh file and replace the placeholder IP with attacker's IP and the port with whichever port you like to use (I use 1337 😉) Save the connect.sh file Unplug Bash Bunny and switch it to the position the payload is loaded on Plug the Bash Bunny into your victim's Mac and wait until the final light turns green (about 30 sec) Unplug the Bash Bunny and go to attacker's machine Listen on the port you chose in the connect.sh file on whichever program you'd like (I use NetCat) If using NetCat, run the command nc -nlvp 1337 (replace the port with the port in connect.sh) Wait for connection (Should take no longer than 1 minute as the cron job runs every minute) Once a bash shell prompt appears...YOU'RE DONE!! 😃 and you can disconnect and reconnect at any time as long as the user is logged in Download Click here to download.
  4. Hi There! Im relatively new then Wifi Pineapple NANO and its various modules, as such i've just been playing around with it on my Macbook Pro. Some very awesome tech. Ive wanted to start using it with my Kali Linux VM running through Virtual box and have run into some issues, particularly in regard to the device, once configured, being detected and the correct gateways to use for a MacOS VM. As you are probably well aware, Apple has a different default gateway to the rest of the world (using 192.168.2.1 instead of 172.16.42.42 i believe). I've configured my Kali box to have a bridged adaptor to eth0 which is my laptops internet connection and have done the correct usb configuration to allow the pineapple to be detected. Im using the wp6.sh script to configure the pineapples connection through the VM. After following the Guided setup and setting the appropriate default gateway etc. the pineapple refuses to be detected, i.e. gets stuck when i try to connecting saved setting... Its probably something simple that i'm forgetting, as i said, i'm fairly new and having a mac is difficult for trouble shooting....any help would be greatly appreciated!
  5. Hello Guys, I'm new to Pineapple and I need some help please :)) I got the NANO and it works great on my windows machine but when it gets to my macbook pro I can't get it to run (with Internet connection) :( I tried some step by step tutorials but they didn't work :( Plug the NANO in and get the connection and setup the gui no problems but I can't download the modules or the bulletins :( I'm connected to my home wifi and shared the internet connection with the Pineapple-adapter but it won't work :( anyone got some ideas or tips for me :)) THX :)
  6. MAC Filtering

    Hi, i'm trying to block all connection from a specified mac address but it doesn't work. The payload that i'm using is this: #!/bin/bash # LOCK MAC ADDRESS function setup() { # Show SETUP LED LED SETUP # Set the network mode to NAT NETMODE BRIDGE sleep 7 } function run() { # Show ATTACK LED LED ATTACK # Block all traffic for/from specified mac address iptables -A INPUT -m mac --mac-source 00:12:34:56:78:90 -j DROP sleep 3 } setup run What i'm doing wrong? Thanks
  7. USB-C Ports

    How will Hak5 deal with USB-C ports if they spread to Microsoft, Dell, and more? Also, is Hak5 just going to stay with adapters or make new devices with USB-C capability? I would stick with adapters, but I want to see others opinion.
  8. darkCharlie (stealing SSH creds)

    I decided to put together a payload to get myself familiar with the bunny. This was inspired by SudoBackdoor and borrows heavily from it, but uses python because I'm more fluent in that than bash. I'm hoping to have this thing completed by the end of this week or possibly the weekend. The code under development is on my github at https://github.com/michael-weinstein/bashbunny-payloads/tree/darkCharlie/payloads/library/credentials/darkCharlie
  9. Hi everybody, I'm chatting on an IRC Website (That not allows simple users to connect by an IRC Client, but only Browsers ...). When spamming or flooding, I've been being banned with 3 Types of bans : 1. Banning the IP address (I simply Bypass this ban by rebooting my Wi-Fi Router because I have a dynamic IP address); 2. Banning the MAC address (I'm again capable of bypassing this by changing my MAC address with the freeware '' TMAC Changer '' ); 3. Banning the Browser connection (Here comes my problem, in other terms, even if I do a clean uninstall / install of my browser '' After changing IP + MAC addresses '' and keep changing my browsers Mozilla, Chrome, Chromium, Safari, Opera; I keep getting banned every-time ... So when I have no browser left to install, I MUST WIPE + FORMAT my PC to connect again to this site). My question is as so : what is the specific parameter in the browser that allow Operators and Admins in this IRC Website to catch me every-time, and how can I bypass this ?! Thank you in advance, and I hope you can help me !
  10. [PAYLOAD] macWallpaper

    Hey all, I spent last night coming up with a fun prank that Runs a script in background that will download pictures of my little pony (or whatever else you'd like, just change the urls to the pictures) and randomly sets that as their desktop background every 45 minutes - 5 hours. You can change number in for loop to decide how many times it will change their background. Hope y'all have fun with it! EDIT: Link to PR: https://github.com/hak5/bashbunny-payloads/pull/236
  11. ° sign instead of >

    Hi guys, I'm new here and need a bit of help regarding special characters along with the de.properties language file. My Ducky code requires the > sign (greater than), however by using the -l de.properties parameter my Rubber Ducky always writes a degree sign ° instead of >. In the properties file there is the following entry which should be fine: ASCII_3E = KEY_NON_US_100, MODIFIERKEY_SHIFT // 62 > On Windows this is working well, and that's why I'm thinking the properties file is correct. However, I need to get this work on my Mac as well. Do you have any tips? Thanks, David
  12. Why so many Apples

    I am traveling so to pass the time i have been watching alot of talks given at some of the most recent Cons and i noticed that there are a lot of Security Professionals that i see using MACs, anyone have any idea why? is it a convenience thing? or just preference? I have used a Mac in the past and the only thing that i liked about it was Parallels had a very smooth transition between OSs but that was it.
  13. Here is my new payload to attack a Mac without using terminal. I got this idea after seeing how using good management software, an administrator can remove an app from a Mac (one such application being terminal). This eliminated a lot of the attacks I have previously made to work against a Mac. So I got to thinking and poking around inside of applications, and it turns out you can replace the contents of certain files in a Mac application and you can run scripts. You simply open the right file and replace it with your code, and then run the application. The app no longer functions normally, but by making a duplicate app in another folder and editing that one you can run your attack code without completely losing the original files and all without terminal. I used Grab.app for this but almost any app could be used, I wanted to find one that was not likely to have anything similarly named around it because of the way I selected the application to copy it. Here is the code, its outcome is to simply "say hello" (so if you test it have the volume up a bit). I have not really played with the delays yet, they are all over the place and some are to high but it makes it a bit easier to see what is going on. This is not a final project but rather a starting point to spark some new ideas. Have Fun, but please use this responsibly. DELAY 2000 COMMAND SPACE DELAY 300 STRING /Applications/Utilities/ DELAY 200 ENTER DELAY 400 STRING g DELAY 500 COMMAND c DELAY 300 COMMAND SPACE DELAY 300 STRING /Users/Shared/ DELAY 400 ENTER DELAY 400 COMMAND v DELAY 2000 COMMAND SPACE DELAY 300 STRING /Users/Shared/Grab.app/Contents/MacOS/ DELAY 600 ENTER DELAY 500 TAB DELAY 500 COMMAND o DELAY 500 COMMAND a DELAY 500 STRING #!/bin/bash DELAY 400 ENTER DELAY 300 STRING say DELAY 300 ESCAPE DELAY 300 SPACE DELAY 300 STRING hello DELAY 300 COMMAND s DELAY 400 COMMAND q DELAY 500 COMMAND SPACE DELAY 300 STRING /Users/Shared/Grab.app DELAY 400 ENTER COMMAND w COMMAND w COMMAND w
  14. Hey, everybody, I'm kinda new to rubber ducky (only know the very basic of script writing and stuff) Soo? I got my script with works as it should, no problem when I run it in terminal (on MacOSX) and that's both when I type it in manually but also if I run it from a TextEdit I then used a program called Platypus to make the script to a .app, still no problem. Now if I wanted to run that .app on inject of the ducky, how should I do that? Like I got the .app on the SD card, which I think is called NO NAME, so I wrote the inject.bin script to open terminal and locate the USB (NO NAME) and run the .app from there DELAY 3000 GUI SPACE DELAY 200 STRING Terminal DELAY 200 ENTER DELAY 200 STRING open /Volumes/NO\ NAME/*theappname*.app/ ENTER But it don't seem to be able to find the USB? is that because the USB doesn't show when plugged in, as an USB, but instead as a keyboard or what??... Am I doing something wrong, or is it basic that I can't access it like that? Read something about Twinduck firmware? can that help me, and would anybody recommend it anyways? Ideas, support and info are much appreciated. Thx and sorry if bad English (second language)
  15. Mac serial connection script

    Hello all, With MAC's (and Linux) you have to know the device of course to serial into it. To make it quicker for me I wrote the below script to search the MAC for the bash bunny (If you have multiple modems this may not work for you) and prompt you to connect to it. Feel free to use and modify as desired. #!/bin/bash # # Title: Mac Serial Connect # Author: NightStalker # Version: 1.0 # # Finds the Bash Bunny in the /dev/cu.* location and # prompt you to connect to it. clear bunnyloc=`ls /dev/cu.* | grep usbmodem` echo "Bash bunny is located at: $bunnyloc" read -r -p "Would you like to connect to it? (Y/N): " connanswer echo $connanswer if [ "$connanswer" == "N" -o "$connanswer" == "n" ] then exit 0 elif [ "$connanswer" == "Y" -o "$connanswer" == "y" ] then screen $bunnyloc 115200 fi
  16. I have been unable to get my bashbunny to show up as a usb network interface for linux/mac. i have set my ATTACKMODE ECM_ETHERNET. other modes are working. anyone else seen this? ideas?
  17. OS X Malware Writing

    I am not sure if this is the right bored to be talking about this I am willing to code Trojans,Viruses,Bots and any other type of malware in exchange for bitcoins. It could do just about anything you want example: Backdoor a system, Destroy the entire computer, Delete files, Record video and audio, etc pm me if your interested
  18. Nano setup on mac

    Hi all, I know this topic has been covered in the past but I did not find anything specific to mac. I am having problem with network connectivity. When I run the script, on step 3 it prompts me to connect pineapple, however even after I connect pineapple to my mac, the script the keeps running with nothing happening. I cannot load bulletins from wifipineapple.com. I have shared the internet to ethernet on my mac. I tried almost everything I could think of, resetting, changed default gateway to 172.16.42.1. My routing table looks like: Destination Gateway Genmask Flags Metric Ref Use Iface default Pineapple.lan 0.0.0.0 UG 0 0 0 br-lan 172.16.42.0 * 255.255.255.0 U 0 0 0 br-lan Any help is much appreciated.
  19. Can't access Nano

    I can't even seem to connect to my new Nano there is no response on http://172.16.42.1:1471 I plug it in - it boots - blue light blinks - then goes solid ... My read of Ifconfig shows Nano is connected to en5 - but seems en5 has no IP address ??? Ifconfig output is below - and screen show is attached ... I'm stuck !!! Any ideas ? Is there a way to Hard Reset ?? ------------------------------------- en5: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500 options=4<VLAN_MTU> ether 00:c0:ca:8f:b6:11 inet6 fe80::2c0:caff:fe8f:b611%en5 prefixlen 64 scopeid 0xa nd6 options=1<PERFORMNUD> media: autoselect (100baseTX <full-duplex,flow-control>) status: active bridge100: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=3<RXCSUM,TXCSUM> ether 9a:e0:d9:79:10:64 inet 192.168.2.1 netmask 0xffffff00 broadcast 192.168.2.255 inet6 fe80::98e0:d9ff:fe79:1064%bridge100 prefixlen 64 scopeid 0xb Configuration: id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0 maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200 root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0 ipfilter disabled flags 0x2 member: en5 flags=3<LEARNING,DISCOVER> ifmaxaddr 0 port 10 priority 0 path cost 0 nd6 options=1<PERFORMNUD> media: autoselect status: active pineapple-setup-stuck.pdf
  20. My Setup Experience

    Apologies for the length of this, but it may help other people So yesterday I received my shiny new Tetra and thought "great, lets plug it in and have a play" :) The instructions are nice and simple: Download the latest WiFi Pineapple TETRA firmware - complete Plug the TETRA into your computer using the included USB Y cables - yep, done, pair of USB3 ports on my main Windows 10 PC. Also plugged in the mains adapter. Solid blue LED showing Browse to http://172.16.42.1:1471 (Only Chrome and Firefox are officially supported) - yeah. Nope. Not happening. Nada. Zip Follow the onscreen instructions to complete setup So, opened a command prompt and ran IPconfig APIA address on the USB-Ethernet port - not a good start. So its not picking up DHCP from the Tetra. OK thats probably the PC. Swap to laptop number 1. Windows 10 Plug in the Tetra to the two USB ports on the side. Still got a solid blue light on the Tetra. Still got APIA address on the USB Ethernet port Re-install the drivers for the USB-Ethernet port - still nada. The interface in windows is showing as connected, unidentified. Cannot connect to the management page Check the Wifi networks showing - 2x Pineapple_xxxx networks (presuming one 2.4 and one 5Ghz) - lets try connecting to them, and yep can "connect" but again, no DHCP address. Now mildly frustrated. Swap to laptop number 2. Windows 10 Plug in the Tetra to the two USB ports on the side. Still got a solid blue light on the Tetra. Still got APIA address on the USB Ethernet port Re-install the drivers for the USB-Ethernet port - still nada. The interface in windows is showing as connected, unidentified. Cannot connect to the management page Now getting more frustrated Swap to laptop number 3. Kali Linux 2 Plug in the Tetra to the two USB ports on the side. Still got a solid blue light on the Tetra. Still got APIA address on the USB Ethernet port Re-install the drivers for the USB-Ethernet port - still nada. The interface is showing in ifconfig but with not IP Cannot connect to the management page Now beginning to think hardware failure Swap to laptop number 4. Mac Install the Realtek driver for Mac, new USB 10/100 adapter appears Plug in the Tetra to the two USB ports on the side. Still got a solid blue light on the Tetra. Still got APIA address on the USB Ethernet port Re-install the drivers for the USB-Ethernet port - still nada. The interface in windows is showing as connected, unidentified. Cannot connect to the management page Now VERY frustrated and thinking about DoA's, RMA's back to the states.... OK, lets try something radical At this point the only thing I've got left is to rebuild my Kali box as a Windows 7 box. Which completes and then takes another couple of hours to patch. By this time I've gone down the pub for the evening. Laptop number "5". Kali Box rebuilt as Windows 7 Install the Realtek driver for Mac, new USB 10/100 adapter appears Plug in the Tetra to the two USB ports on the side. Still got a solid blue light on the Tetra. Still got APIA address on the USB Ethernet port Re-install the drivers for the USB-Ethernet port - still nada. The interface in windows is showing as connected, unidentified. Cannot connect to the management page Now convinced there is something wrong with the hardware. 5 different platforms, 4 different OS' and not one DHCP address. Nothing on the forums that seems to apply. Last thing to do - reapply the factory firmware Follow the instructions on the FAQ page and bang, once the firmware is "refreshed" back to factory, all of a sudden everything is working on my W7 laptop, and I could login, complete the setup etc. So its finally all working. TL;DR - if you really really can't connect to a new tetra and you've tried drivers, connectors, everything you can - try reapplying the factory firmware.
  21. I just recently got my tetra. It works great on linux systems, but I have a macbook that I would like to use the tetra on doesn't connect with the default IP address and does not show up in ifconfig. What am I doing wrong? Am I missing a step?
  22. Mac Setup

    So you put how to setup internet sharing on both the windows installation and linux, I was wondering if you can help me do the internet sharing on my mac because i cannot find anywhere where it says ethernet on network settings ..
  23. Got my nano last night, super pumped! When I got to Networking I only see the option to select wlan1 as my interface, but it looks like this interferes with PineAP. Is there a way I can select eth0 as the interface and have it use my wifi on my mac to connect to the internet? Or is there an option to free up the second radio that I'm missing so I can use PineAP and be connected to the internet at the same time? I tried selecting Disable Management AP under the Access Points menu and I'm still only given the option to choose wlan1 as my interface in client mode. On a side note, when I plug in an additional alfa usb adapter to the nano, it recognizes wlan2 automagically. Are there any other options for client mode?
  24. Hell-Low H5 FolkZ @SF, Just got a new Turtle and waz playin around with it. Seems to be quite k3wL, but there are problems with the mac changer of the wan interface. 1st issue - it does not work - the interface goes down and does not come back (eth1). after manually /etc/init.d/network restart all worx fine (with static IP settings and faked mac 2 deploy device in an secured environment with mac binding). 2nd issue - how can i make the mac change persist a power cycle. I want to deply that tiny device in a secured environment with static ip settings and mac binding. So i will loose contact to the turtle after a power cycle. The scenario ist to drop the device @ a network with static IP settings and i must fake the mac of an registered device to be able to autossh out of the network. The fake mac and the static ip settings must persist a power cycle or the device is "lost". Any suggestions ? Maybe a tiny shell script ? but where to put (for persistance) ?
×