Jump to content

Search the Community

Showing results for tags 'c2'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 18 results

  1. Hi, We're happy to announce the 2.2.x release of the Cloud C2, which features a new notifications system and support for the new Hak5 Key Croc! Change Log (2.2.0) Hak5 Key Croc Added support for the Hak5 Key Croc! Hak5's Key Croc is a Keylogger armed with pentest tools, remote access and payloads that trigger multi-vector attacks when chosen keywords are typed. Live keystrokes, typed history and keystroke injection can be performed remotely with ease. Notifications Notifications can now be sent from enrolled devices.
  2. Hey Fam! I just set up my c2 cloud server on a digitalocean VPS w/ https, domain name and everything with no issues. I also set up my wifi pineapple to reconnect to the c2 web server when it connects to the interwebz. I cannot, however, seem to get the recon module working in the c2 web interface. It just keeps loading and saying there is no recon info yet. I let it run for a good 30-40 minutes before deciding something was wrong. Is this a bug or something on my end? Any help would be greatly appreciated. Much love to Hak5, Ramp115
  3. Hello Everyone, When this guide was first launched I was about mid-way through my studies in Networking and Systems Administration, and since I've learned a lot since then I decided to completely rework this guide (04/05/2020). I want to provide everyone with a guide that will not only get you up and running, but will also provide you with a stable environment as well. Please remember that I am NOT responsible for your actions, and you should never perform nor condone any illegal activities. Notes: This installation guide is written ONLY for Ubuntu 18.04/20.04 LTS. Ste
  4. ok, so I'm new to this, but if I want to combine a couple of the payloads that's available at hak5 GitHub, can I for example make one payload that has wifi connect payload and the open ap Nmap my thought was to copy the payloads into a single payload and make the individual payload a function! Any tips or tricks would be nice! My goal is that if it connects to a specific network when it boots up, it will dump the loot to C2, but if it doesn't connect, it will automatically start the Open AP Nmap Scan this is what I have so far: --------------------------------------------
  5. Hello. I just downloaded cloud c2 and was setting up the server. I closed down the cmd-windows and when I launched the .exe again, the token wouldn't show. Any ideas how to get the token again? Thanks.
  6. Hey guys! Been setting up my devices in prep for a up and coming pen test. I can connect my devices to C2 and I came across 2 issues. The first one is about seeing any Loot for the Lan Turtle in C2. I can see Loot for other devices and I know that the Lan Turtle doesn't work exactly the same way as say the Shark Jack in regards to gathering loot. But I was wondering if someone got a method of getting a specific folder shared to the C2 Loot section for the Lan Turtle. Thoughts?
  7. Heya! So, been setting up my devices in C2. Got all of them in there and I can see the Loot as well as other items like say the Pineapple Tetra's SSIDs and such. One thing I can't seem to do is SSH from C2 to any device. I was wondering if I'm missing something specific on my setup. I have even tried setting SNATs to the devices, though I knew that wouldn't have been a requirement nor really worked... But I went that far as I just couldn't figure it out. It would really help me if I can get this sorted as I have a Pen Test coming up and I'm foreseeing the need to drop some of
  8. denisit

    C2 ipV6

    Hello, I try to set up a C2 server on a RPI 3 but I get a problem. I want just use it in a LAN. I run the command below : ./c2_community-linux-armv5 -hostname RPI_IP But I cannot access to the web interface. When I check the listen port with netstat I see the C2 server listen on tcp6, not on tcp : tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN tcp6 0 0 :::8080 :::* LISTEN tcp6 0 0 :::22 :::* LISTEN tcp6 0 0 :::2022 :::*
  9. I have a question can the c2 platform allow for instance, you've got pasword or other hashes and send them to gpu on the c2 server to break them, or some other cpu/gpu grunt work I should be able to do it using a shell on the vmserver passing 2 k2 grids nvidia cards to it in an ESXi based machine ( Thanks Matt circa 2009) can this be done just using c2 interface etc can it be added ??
  10. I have a new install of Cloud C2 and a WiFi Pineapple. I've just been tweaking the configuration, etc. when I noticed that the Pineapple shows offline in the C2 server after about 15 minutes (the exact time varies, sometimes it can be longer). Each time it happens, all indications is that the Pineapple is continuing to function fine. I can log it via web or SSH, stop and start PineAP, make configuration changes, etc. The Pineapple can ping the C2 server by name. If I reboot the Pineapple it reconnects to the C2 server, but that's the only way I can figure out to get it to reconnect. Obvi
  11. Nmap Quickscan (Cleaned & C2 Enabled) This is a cleaned up output version of the Original Nmap Scan that Hak5 introduces us to. The Payload waits for "Internet Connection" to be present. Once Internet Connection is found, It scans the local subnet for any online devices. - While also logging the Public IP of the Victim's Network (Very useful when you are scanning multiple networks in a short amount of time.) payload.sh #!/bin/bash # Title: Nmap Quickscan (Cleaned & C2 Enabled) # Author: REDD of Private-Locker # Version: 1.0 # # This is a cleaned u
  12. SharkHelper This Tool completes the Hak5 "SharkJack.sh" script. This adds small features that the original Helper Script is missing - While also making it easier to setup/re-setup the SharkJack itself. Linux version to be released soon. Any features or requests are welcome. The Menu: O=====================================O | | | SharkHelper Menu | | | O=====================================O 1. Install SharkLib 2. Remove SharkLib 3. Install Default Nmap Scan 4. Install Internet Tes
  13. Hey y'all, just wanted to share my slightly modified nmap scan payload. It scans a bunch of ports, saves the output with a date stamp and multiple output types, and then uploads the loot to the C2 server. #!/bin/bash # # Title: Custom Nmap Payload for Shark Jack # Author: Flatlinebb # Version: 1.02 # # Scans target subnet with Nmap using specified options. Saves each scan result # to loot storage folder. Uploads loot to your C2 server # # Red ...........Setup # Amber..........Scanning # Green..........Finished # # See nmap --help for options. Default "-sP" ping scans the address space
  14. I'm trying to test a few things with a self hosted C2 and a Tetra on the same LAN. since it want setup to work both internal and external via a host name, I setup an a record on my internal DNS so that the external DNS name will resolve to the internal IP while on the same LAN. This issue is getting the Tetra to look to my DNS server automatically. I'm currently using eth0 (wired) for my network connection. What I would like is for the Tetra to get its DNS information from the same DHCP server that is handing out it IP address. I have tried removing the "Option DNS 8.8
  15. Hi I'm currently playing around with the signal owl. I'm trying to include it into my c2 instance which doesn't work. The Signal Owl is connecting to my open wlan but it looks like it isn't connecting. I copied the device.config to the /etc/directory to configure the C2 server. This worked on the pineapple before. Anyone experience the same issues? The c2 server is running on TCP 443 with SSL (letsencrypt). BusyBox v1.30.1 () built-in shell (ash) .___. {o,o} /)__) Hak5 Signal Owl " " Version 1.0.1 ======================================= Built on OpenWRT 19.07
  16. Hey guys, I have a packet squirrel setup in Cloud2 and I can successfully start a terminal session. In a terminal session I would like to run a packet capture. If I run the command tcpdump -nni eth1 -f /mnt/loot/tcpdump/test2.pcap I am able to capture some packets. I can Exfil the packet capture with the command: C2EXFIL /mnt/loot/tcpdump/test2.pcap and the file shows up in the C2 dashboard. However, when I download the pcap, Wireshark cannot open it. I get an error message: "The file test2.pcap isn't a capture file in a format that Wireshark understands" Screenshot: https:
  17. I have managed to make screencrab take screenshots succfully, but cant get it to connect to the wifi/C2 server. I've tried many forms of the config.txt file in order for it to work (of course, Iv'e also placed the device.config in the SD root). can anybody please upload a sample of config.txt file including a pseudo ssid and password?
  18. Hi, The first 10 months of feedback has been incredible, and we are excited to bring you some epic new features and enhancements to the platform with Cloud C2 version 2.0.0! This release adds support for the latest Hak5 devices, including the Screen Crab, Signal Owl and Shark Jack. It also features a protocol enhancement that reduces network overhead and bandwidth for deployed devices. This release includes a LOOT feature, allowing you to easily exfiltrate any arbitrary data from the target network using the C2 protocol. Accessible from the new Loot menu within each device type,
×
×
  • Create New...