Jump to content

Search the Community

Showing results for tags 'advice'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud CĀ²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 8 results

  1. ok, so I'm new to this, but if I want to combine a couple of the payloads that's available at hak5 GitHub, can I for example make one payload that has wifi connect payload and the open ap Nmap my thought was to copy the payloads into a single payload and make the individual payload a function! Any tips or tricks would be nice! My goal is that if it connects to a specific network when it boots up, it will dump the loot to C2, but if it doesn't connect, it will automatically start the Open AP Nmap Scan this is what I have so far: ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- #!/bin/bash # This is a test to see if my network is in range, it will connect home and export the loot to C2 # if my network is out of range or can't connect to it, it will do the Open AP Attack! # Title: Simple WiFi Connection Example # Author: Hak5Darren # Version: 1.0 function Home() { # WiFi Client Setup WIFI_SSID="SSID" WIFI_PASS="Password" LED SETUP WIFI_CONNECT # optionally start SSH server # /etc/init.d/sshd start LED ATTACK C2CONNECT && C2EXFIL } function OpenAP() { # Title: Open AP Nmap Scanner # Author: Hak5Darren # Version: 1.0 # # Description: Scans for open access points, then connects to each and runs an Nmap scan saving logs to the loot folder # # LED SETUP: Scanning # LED ATTACK: Connected, running nmap scan # # See nmap --help for options. Default "-sP" ping scans the address space for fast host discovery. NMAP_OPTIONS="-sP" LOOT_DIR=/root/loot/open_ap_nmap_scan MAX_CIDR=20 DEBUG=1 function scan_wifi() { [[ $DEBUG == 1 ]] && echo Scanning for open access points | tee -a /tmp/payload.log iwlist wlan0 scan > /tmp/wifi_scan cat /tmp/wifi_scan | grep "Encryption key:off" -A1 | grep ESSID | sort | uniq | cut -c 28- | sed "s/.$//g" > /tmp/open total_aps=$(cat /tmp/open | wc -l) [[ $DEBUG == 1 ]] && echo Found "$total_aps" open access points | tee -a /tmp/payload.log } function check_ap() { current_ap=$(sed -n "$on"p /tmp/open) [[ $DEBUG == 1 ]] && echo "-------------------------------" | tee -a /tmp/payload.log current_ap_mac=$(cat /tmp/wifi_scan | grep "$current_ap" -B5 | grep Address | awk {'print $5'} | head -1) [[ $DEBUG == 1 ]] && echo Selected AP MAC: "$current_ap_mac" | tee -a /tmp/payload.log if grep -i -q "$current_ap_mac" /tmp/nmap_scanned; then [[ $DEBUG == 1 ]] && echo Skipping - Already scanned AP: "$current_ap" with MAC: "$current_ap_mac" | tee -a /tmp/payload.log else connect_wifi scan_network fi } function connect_wifi() { LED STAGE1 [[ $DEBUG == 1 ]] && echo Connecting to Open WiFi AP: "$current_ap" | tee -a /tmp/payload.log ifconfig wlan0 down iwconfig wlan0 mode Managed essid "$current_ap" ifconfig wlan0 up while(iwconfig wlan0 | grep Not-Associated); do sleep 1; done [[ $DEBUG == 1 ]] && echo "Connected to AP number $on with SSID $current_ap" | tee -a /tmp/payload.log udhcpc -i wlan0 while [ -z "$SUBNET" ]; do sleep 1 && find_subnet done APMAC=$(iw wlan0 link | grep Connected | awk {print'$3'}) [[ $DEBUG == 1 ]] && echo "AP MAC Address/BSSID: $APMAC" | tee -a /tmp/payload.log [[ $DEBUG == 1 ]] && iwconfig wlan0 | grep ESSID | tee -a /tmp/payload.log [[ $DEBUG == 1 ]] && ifconfig wlan0 | grep inet | tee -a /tmp/payload.log } function scan_network() { LED STAGE2 find_subnet [[ $DEBUG == 1 ]] && echo "Found Subnet: $SUBNET" | tee -a /tmp/payload.log CIDR=$(echo $SUBNET | cut -d '/' -f 2) [[ $DEBUG == 1 ]] && echo "CIDR: $CIDR" | tee -a /tmp/payload.log if [ "$CIDR" -ge "$MAX_CIDR" ] then [[ $DEBUG == 1 ]] && echo "Starting network scan" | tee -a /tmp/payload.log nmap $NMAP_OPTIONS $SUBNET -oN "$LOOT_DIR/$current_ap-$APMAC.txt" &>/dev/null else [[ $DEBUG == 1 ]] && echo "Network too large - skipping scan" | tee -a /tmp/payload.log fi echo $APMAC >> /tmp/nmap_scanned } function find_subnet() { SUBNET=$(ip addr | grep -i wlan0 | grep -i inet | grep -E -o "([0-9]{1,3}[\.]){3}[0-9]{1,3}[\/]{1}[0-9]{1,2}" | sed 's/\.[0-9]*\//\.0\//') [[ $DEBUG == 1 ]] && echo "Found subet for network $current_ap as $SUBNET" | tee -a /tmp/payload.log } function run() { while true; do setup scan_wifi while [ "$on" -le "$total_aps" ] do if [ "$on" -ge 1 ]; then check_ap; fi let on=on+1 done sleep 5 [[ $DEBUG == 1 ]] && echo Completed recon. Restarting... | tee -a /tmp/payload.log done } function setup() { LED SETUP mkdir -p $LOOT_DIR touch /tmp/nmap_scanned on=0 killall wpa_supplicant } # Run payload run } Home && poweroff || OpenAP
  2. Just a short guide šŸ™‚ I did this in windows 10. INSTALLATION: step 1 ) first update firmware! Format an usb to be either FAT32(win) or EXT4(linux) and download the latest firmware. Put it onto the usb, as the only file there. step 2 ) put the usb in the second usb port and wait 5-10 minutes step 3 ) if the LED has begun to slowly blink, you are done. Press the button on the back to go into "Arming mode" PAYLOADS: step 4 ) in "Arming Mode" we can connect to the Signal owl, check your wifi and owl_xxxx(last 4 mac address, should be in the network) step 5 ) download PuTTY and PuTTy psftp.exe step 6 ) after installation of PuTTY psftp, open the exe file. In command line write: open 172.16.56.1, login in as root, password is hak5owl step 7 ) go to /payload/. TO add files there you need to write in command line: put and the drag and drop the textfile you want to upload to the signal owl syntax example = COMMANDLINE >>put "C:\users\user\desktop\payload.txt" hit enter and you have uploadet the file! step 8 ) as far as i know, there can only be one text file named "payload.txt". So if you want more payload, you have to rename the inactive ones. fx. like:"payload_bitcoinhacking.txt" then rename it to payload.txt when you want to use it. But signal owl can only have one active file. step 9 ) good luck! and have fun. You can use normal putty to SSH access the signal owl and run program like aircrack-ng or nmap from there šŸ™‚ I hope this can give some answers.:)
  3. I run Kali Linux on my laptop and I'm pretty new to all this, trying to learn. I am having some issues connecting my WiFi PineApple Nano to the internet. I have gone through the the guided connect 20 plus times trying different things and I've tried to tinker with the manual setup as well. I read some other threads as well with what sounds like similar issues and I think it has something to do with a default gateway issue. I have searched and searched for some tips on fixing this and havnt seen anything helpful. I'm asking for a nudge in the right direction on how to fix this and if I figure this out I'll post a walkthrough on youtube on how to fix this . I've given up for tonight and will try again tomorrow :) anyone know how to fix this ? And if I could get some tips I'd be more than grateful . My gate way is 0.0.0.0 and I'm pretty sure this is not good
  4. Hi guys, Please see the attached poll (just the one question). It would be great to see the outcome, as this will gauge where most users go in times of need. Cheers šŸ˜Ž
  5. Hi Was wondering what the best practices are for using password managers? 1)Which ones would you recommend. 2) Where to store the database. 3) Password or key file?
  6. Hey guys, I have no professional background in IT and am learning how to use a PineApple Nano as a job for a friend of mine who has but has no time himself to do it. The goal is to be able to use the PineApple for a demonstration to show an audience that you can Man-In-The-Middle between their mobile devices and an AP provided for the demonstration, that you can read their traffic and lure them on an Evil Portal. I have a hard time finding step-by-step tutorials for the recent build and for someone that is an amateur and really has to be lead to the simplest steps. What I managed to achieve so far: 1. I set up my WiFi PineApple Nano on a Windows 7 Professional computer and established an Internet Connection 2. I downloaded the latest update and bulletins and also currently three modules, SSLSplit, DWall and Evil Portal 3. I ran Recon Scans, saw local SSIDs and added them and their MAC adress to my Filter and PineAP Pool 4. I've been trying to follow the PineApple Primer video and ran the PineAP accordingly. With an open WiFi I created here, I could passively listen to unsecured traffic on a device I connected with that and show it in WireShark and DWall 5. What I am now trying to do is make my PineApple pretend its an open WiFi and grant access to the Internet. Currently devices can connect to such a pretender AP but then dont have access to the Internet. 6. I would also like to be able to listen to secured traffic. If you have any ressources I could read up upon or watch, I'd be grateful. Kind regards
  7. I recent got a Pineapple NANO, just got the SD card and so far the device seems to be working. What I wanted to ask the group, I have to do a demonstration to a group of IT Directors on hacking and some of the tricks Pen Testers use. Any suggestions on what modules look the most impressive and are demonstrable in front of group. Any suggestions would be appreciated. I link to any tutorials you think I should look over would also be appreciated. Thanks
  8. I know this is a long shot (since it's 2012), but we don't have any Phone Phreaks in the house, do we? There's an older guy I have known for a couple of years from a Commodore club -- a real old school phone phreak. I respect the heck out of him and we normally get along really well, but we're having a little friendly disagreement right now, which has given way to him phone phreaking me a bit. He somehow made my calls forward to an adult bookstore and their calls forward to me. It's in good fun, but obviously I want to hit him back. I have read old proto-hacker stories about phone phreaking, but I don't know any decent tricks that I can pull off on the modern phone system, other than Caller ID spoofing. I suppose a lot of it is social engineering; though I'm not really good at that at all. Any suggestions, thoughts, tips, tricks, useful stories, or related download links?
×
×
  • Create New...