Jump to content

Search the Community

Showing results for tags 'hacking'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapple University
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Hak5 Cloud C²
    • Bash Bunny
    • Packet Squirrel
    • LAN Turtle
    • USB Rubber Ducky
    • Plunder Bug
  • Hak5 Shows
    • Hak5
    • HakTip
    • Metasploit Minute
    • Threatwire
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 16 results

  1. Hi, I’m an author researching material for my next novel about a journalist who exposes an illegal CIA operation and who faces the wrath of the agency as a result. I’m keen to get conformation (or otherwise) on several key points, as follows: Given what we now know as a result of the Vault 7 leaks, is it possible for a top-level CIA hacker to frame a person by… (1) remotely accessing their computer without their knowledge and taking control of it; (2) accessing websites using their browser and planting incriminating material on their hard drive, again without the user’s knowledge; (3) modifying the dates and times when these websites were visited using a tool such as Time Stomper (or similar); (4) finally, having successfully executed the hack, erase it, or hide it, or obfuscate it to the extent that law enforcement forensics are unable to find any evidence that it ever took place? I would be very grateful if anyone could answer these points as I would very much like to get the technical details right in the story. I just need to know what is technically possible and what is fantasy. Many thanks in advance.
  2. So I was thinking about making a "smarter" RFID cloner. Every time you cloned and RFID tag it would store it on a local database that could be accessed by a web interface. You could then select an RFID tag that you have snagged, and it would automatically switch the RFID card to that tag. You could store different tag groups, and select favorite tags, and the coolest part is if you don't know which tag goes to what "lock" you can set the card to cycle, and it would go through and try all the stored tags until it got to the right one. This would be super useful for someone like me who carries around 15 different RFID enabled cards. I could only carry around one and it would be much easier for me to get around. Does anyone have any ideas to add or input? (It needs a cool name, "RFID Narwhal" is the only suggestion I've gotten...
  3. I know I may sound like a noob here, but is using Karma by itself already illegal? I'm just asking so that I don't go into the wrong direction.
  4. How would you go about hacking a WiFi based system like alarm.com or adt. Got one some time ago and would like to experiment with the cameras and system itself. Any tips or walkthroughs would be great.
  5. Hi guys, I am an undergraduate student and I am currently conducting a qualitative research on hackers. My study aims to explore Hackers’ subculture values in addition to their motivations in pursuing a hacking career. It will also aim to understand when and why a White Hat Hacker will decide to change path in becoming a Black Hat Hacker or vice versa if applicable. I would really appreciate if you can share your experiences/motivations/ if possible lifestyle and maybe have a discussion about it. Many thanks.
  6. Hi guys, I have a problem: I want to hack my Wifi but all the attacks which I found only worked for WPS 1.0 but not on my WPS 2.0. Of course I am open minded for other ways to hack my wifi but none of the attacks which I found worked.🙄😞
  7. I have been poking at an IP camera for a while now, and have found a few cool things but I was wondering if anyone knew of some good youtubers or forums for specifically IOT hacking, I can't seem to find one. Also back to my project, looking at the traffic in Wireshark shows me that the traffic is unencrypted, would there be any way to watch the stream from within Wireshark? Or any other way to collect the packets and just watch the unencrypted stream? Also since the camera is motorized I am able to see the commands sent to the camera. How would I go about crafting and sending my own packets to the device to make it function? (just looking to be pointed in the right direction, not step by step) I'm guessing this would be some type of python package. Also if anyone has any other ideas for me I would love to hear them.
  8. Hi~ I was wondering it's there any device(USB?) , Which can download all the picture , WhatsApp history in a lightening speed (10-30 second)once plugged into the mobile device. Maybe something like rubber ducky but in mobile version . I'm not very good at it , so thx for the advice and tips ahead .
  9. key is in image Dark.jpg help me with this
  10. An extremely asked theme is how to hack an wifi network easily, today i has the answer to you question totally free. Today is possible to attach a kali linux to your windows totally free and by a quickly mode, using Virtual Box the work is dis complicated. In the link bellow i taught how to hack any wifi with any operational system. You can ask for help in the post comments... Click here to go to article
  11. I need some help from someone. Someone raped my girlfriend and now i got his number. I would like to talk someone who can help me have revenge. i would love to destroy this number and bother him. contact me if u want to help.
  12. So Recently, Maybe a Day Ago, My WifiPineapple Nano Said it Couldn't Fetch Information from WifiPineapple.com. Obviously, This is a Problem Because I Cant Check For Updates, Get new Modules, and MOST Importantly, If a Client Connects To My WifiPineapple They Don't Have Any Wifi… I Can Still Search The Web With It Plugged In, So the Wifi Must Work. As I Said Earlier, This Just happened. I Tried Resetting My Pineapple, And Well That Didn't Work. I Went Back Through The Windows Setups (Windows is my main OS) And Everything Was Set Up Right. Any Help Would Be Greatly Appreciated.
  13. So i bought the wifipineapple TETRA, and ive been experimenting with modules and such. Now i have 2 questions which i couldent really figure out my self, thus im asking here. (Im also not sure into which subforum to post this but hey...) - i thought about creating a "fake ap" which, when you connect to it, asks you to login w/ your gmail or facebook account. If someone could suggest me a module that enables me to do this (with a reasonable tutorial), i would be very greatfull. - 2cnd question is probably simple but yet indid not find this option... How do i protect my fake ap with a password encryption (wpa/wpa2) ? It should really work with modules enabled..... is this possible? huge thanks in advance ;)
  14. Once I deploy the LAN Turtle, SSH into it using my own VPS, is it possible to run my own custom python scripts using the LAN turtle terminal. For example: I write my own python keylogger script and SCP it onto my LAN Turtle. Is there a way to run this? I'm unsure if this will work as this is connected via ethernet, not necessarily a normal USB stick. Thanks for your time.
  15. is it possible to mount say a ntfs (windows) from your computer through say the serial connection? this is what i get with lsblk through serial console or maybe a way to directly boot into the linux distro at startup without putting another distro on the storage..?
  16. While the tubes video below go through scenarios for ethical hacking. Can we start posting different "detailed" steps to do such ethical hacking for various scenarios. I would like to see step by step instructions from starting Tetra to using tools,acquiring etc. Go through each tool setup and use. I know HAK5 team has a online doc but can we start one to address how to"s with detailed steps. The PineAP book is good but want more details If Hak5 will allow ( subject to the forums ethical rules ----- can we start it here and post different scenarios ? If ok--separate each scenario with cut lines like below with Q&A to follow in each scenario If not ok to post please advise , or where to do such --all on the basis of ethical pen testing and educational uses for knowledge acquiring https://www.youtube.com/watch?v=eHnQwTCKe2o https://www.youtube.com/watch?v=ZiPAjruB1n4 ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Scenario One I have been asked to test security for a group of people with cell phones and open router points who have assembled close to my location. What are the steps from starting the Tetra, Recon,Clients mode, Pine AP, etc.. Please list in steps 1,2,3 etc.. ---------------------------------------------------------------------------------------------------------- Scenario Two ------------------------------------------------------------------------------------------------------------ Scenario Three --------------------------------------------------------------------------------------------------------------------
×
×
  • Create New...