Jump to content

Search the Community

Showing results for tags 'feature request'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Hak5 Cloud C²
    • Plunder Bug
    • Bash Bunny
    • Signal Owl
    • USB Rubber Ducky
    • Packet Squirrel
    • LAN Turtle
    • Screen Crab
    • Shark Jack
    • Key Croc
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 7 results

  1. I have a question can the c2 platform allow for instance, you've got pasword or other hashes and send them to gpu on the c2 server to break them, or some other cpu/gpu grunt work I should be able to do it using a shell on the vmserver passing 2 k2 grids nvidia cards to it in an ESXi based machine ( Thanks Matt circa 2009) can this be done just using c2 interface etc can it be added ??
  2. I have a couple of wishes for C2, not sure how difficult they would be to implement. 2FA - self explanatory. It would be great if it can be used with Duo, or Authy, or Google Authenticator or Microsoft Authenticator. SSH to the local server that C2 is running on. Sometimes it might be useful. Disk space check for the server that C2 is running on. Since we can upload our Loot to the C2 server, might be good to keep an eye on disk space easily in the web interface. Anyone else have any more ideas?
  3. To the Hak5 staff, would you consider distributing Cloud C² binaries that will run in Alpine Linux, which is "built around musl libc and busybox" instead of glibc? Alpine uses only a fraction of the storage/ram of other Linux distro's, which is particularly interesting for Docker containers (and Alpine also has some additional security measures). Thank you for considering. https://alpinelinux.org/about/
  4. It would be awesome if I could manage my wifi pineapples modules/payloads from cloud C2. Obviously this would be true of the other supported devices as well.
  5. Hi there, as other users already reported, payloads may get removed from the bunny since AV's can detect it when you are running in storage mode. One way to overcome this should be to simply not tell the target these payloads exist. It would be really nice if you could define your own filters to also hide other files the target shouldn't see in first place, like social engineering. Is this feature possible or is there a risk the target may overwrite the files hidden? VincBreaker
  6. I was scrolling through some forums trying to figure out a silent way to run scripts, and I found someone talking about how you can setup a file on the disk that windows will automatically run as soon as it finds the file. I can see this being an awesome feature / ability to have, where instead of having to open up the run dialogue and printing code, the victim already has instructions to run a predefined file on the BB. I'm assuming you could spoof a dvd drive the same way you could a keyboard, or a mass storage device, but there might be complications seeing as most dvd drives are hard wired into computers and don't connect through usb. I know some machines come setup to ask you what you want to do with the disk, but I've used several computers that don't require you to do anything, and the auto run programs on the disks will just run. Anyways, I think if this could happen, this would be a huge advantage and we'd be able run scripts soo easily on victims.
  7. Hi there, I got my bunny today and while developing a payload to drop my meterpreter onto the computer, it actually got detected by my AV and deleted from the storage. At that point, I remembered a pretty boring defcon talk I once saw showing a device able to block every write / delete on an usb stick. Further it allowed to filter the data to get passed to the os so you can ultimatively hide any files until you need them which can be especially useful when you have a stick with multiple exploits / payloads on it and some of them may trigger the AV but are not necesserily needed at one stage or your usb stick get's checked when walking into a facility while pentesting (actually happened to me once :/). So I'm kindly requesting an extension to the API which: Allows to block every write to the usb stick. Allows to filter every read / write from / to the storage. I would suggest the visitor pattern, but I guess it is not compatible to bash :( Yours sincerely, VincBreaker
×
×
  • Create New...