Jump to content

Search the Community

Showing results for tags 'hacking'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

  1. HiddenWall is a Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). The motivation: on bad situation, attacker can put your iptables/ufw to fall... but if you have HiddenWall, the attacker will not find the hidden kernel module that block external access, because have a hook to netfilter on kernel land(think like a second layer for firewall). My beginning purpose at this project is protect my personal server, now is protect the machines of my friends. When i talk "friends", i say peoples that don't know how to write low level code. Using the HiddenWall you can generate your custom kernel module for your firewall configuration. The low level programmer can write new templates for modules etc... First step, understand before run Verify if the kernel version is 3.x, 4.x or 5.x: uname -r Clone the repository git clone https://github.com/CoolerVoid/HiddenWall Enter the folder cd HiddenWall/module_generator Edit your firewall rules in directory rules/server.yaml, the python scripts use that file to generate a new firewall module. $ cat rules/server.yaml module_name: SandWall public_ports: 80,443,53 unhide_key: AbraKadabra hide_key: Shazam fake_device_name: usb14 liberate_in_2_out: True whitelist: - machine: ip: 192.168.100.181 open_ports: 22,21 - machine: ip: 192.168.100.22 open_ports: 22 If you want study the static code to generate, look the content at directory "templates". Second step, generate your module If you want generate a kernel module following your YAML file of rules, follow that command: $ python3 WallGen.py --template template/hiddenwall.c -r rules/server.yaml This generate a generic module with rules of server.yaml, if you want to use another template you can use "wall.c", so template module "hiddenwall" have option to run on hidden mode(is not visible to "# lsmod" for example). Third step, install your module To test module: # cd output; make clean; make # insmod SandWall.ko The rule of YAML to generate module is simple, drop all out to in packets, accept ports 80,443 and 53. The machine 192*.181 can connect at ports 22 and 21... if you use nmap at localhost/127.0.0.1 you can view the ports open... because rule liberate_in_2_out is true. Password to turn Firewall visible is "AbraKadabra". Password to turn Firewall invisible is "Shazam". You need to send password for your fake device "usb14". To exit module, you need turn visible at "lsmod" command ... # echo "AbraKadabra" > /dev/usb14 # lsmod | grep SandWall # rmmod SandWall Random notes Tested on ubuntu 16 and fedora 29 at kernels "3.x","4.x" and "5.x". TODO Suport to IPV6. Macro to select the interface(to use multiple modes for each interface). Option to remove last logs when turn hide mode. Option to search and remove others toolkits... Code generator to BFP... References Wikipedia Netfilter https://en.wikipedia.org/wiki/Netfilter Linux Device Drivers http://lwn.net/Kernel/LDD3/ M0nad's Diamorphine https://github.com/m0nad/Diamorphine/
  2. How can we make a usb password stealer for windows 10? Which can store saved password from chrome and firefox browser.
  3. Hi~ I was wondering it's there any device(USB?) , Which can download all the picture , WhatsApp history in a lightening speed (10-30 second)once plugged into the mobile device. Maybe something like rubber ducky but in mobile version . I'm not very good at it , so thx for the advice and tips ahead .
  4. Can someone guide me to become a Ethical Hacker. I am just new to this and I know little bit of python and Java. I have always been interested in this field and I am looking forward for a career in it.
  5. Can someone tell me how can we guess password using python
  6. I sell an Ubertooth One, a Throwing Star LAN Tap Pro and a Rubber Ducky. In perfect conditions, material left from a former pentesting lab and never used (Rubber ducky still brand new, in its original sealed plastic bag). All for 160 euros + shipping. I can also send to most countries in Europe via certified mail or UPS/DHL, etc.
  7. Hi Guys! I hope you guys are safe and fine. I have a query regarding hacking Kakao Talk app. I urgently need someone who can help me with this because I doubt my husband that he is having an affair with another woman and he is not allowing me to check his phone. Every day he chats with some women on Kakao Talk. This extramarital affair is bringing barriers in our relationship and our relationship is getting worse day by day. I just want to know whom he is talking to at my back and what he is planning. Hacking Kakao (카톡 해킹) has become essential for me to keep me and my kids safe if anything my husband is planning against us.
  8. Do we neeed external wireless wifi adapter for performing deauthentication attack?
  9. Hey guys, I am kind of new to the hacking world and was just wondering what would be my best bet in learning how to properly hack? I am pretty good with HTML and know a little PHP, aside from that I do not know anything else. Let me know if any of you would be willing to teach me anymore languages, help me learn more or simply just assist me!
  10. Does anyone have any information about who is behind the Ransomware attack on eHealth Saskatchewan? Really would just like to find out exactly what they want from the government? Background here: https://www.ehealthsask.ca/NewsPage?StoryID=25
  11. Hello! This is my first post ever, I just bought an Arduino Leonardo (this one BAD USB AMAZON), and it's working fine on windows, but when I try to plug it into a mac, the macbook prompts a window saying that I have to set up my keyboard (keyboard set up assistant) so, is there anyway of avoiding this step? And also I would like to know how to access to the arduino leonardo SD from the OS (windows and mac) to copy from the PC to the SD. Is it even possible? By the way all the code that I am writing is being developed on arduino ( C )
  12. I just completed my Masters in COmputer Application. i want to learn ethical hackin all the way as its my passion and my interest. i like to hack things, find vulnerabilites and solve them. but my problem is i dont know where to start, how to pursue and what all to learn. i have good programming skills like java, python,c, mysqla dn javascript. i know basics of networking and operating system. can anyone help me .? it would mean a lot to me.? i want to become a ethical hacker and thats my ultimate goal..!!!
  13. I have been poking at an IP camera for a while now, and have found a few cool things but I was wondering if anyone knew of some good youtubers or forums for specifically IOT hacking, I can't seem to find one. Also back to my project, looking at the traffic in Wireshark shows me that the traffic is unencrypted, would there be any way to watch the stream from within Wireshark? Or any other way to collect the packets and just watch the unencrypted stream? Also since the camera is motorized I am able to see the commands sent to the camera. How would I go about crafting and sending my own packets to the device to make it function? (just looking to be pointed in the right direction, not step by step) I'm guessing this would be some type of python package. Also if anyone has any other ideas for me I would love to hear them.
  14. Hi, I’m an author researching material for my next novel about a journalist who exposes an illegal CIA operation and who faces the wrath of the agency as a result. I’m keen to get conformation (or otherwise) on several key points, as follows: Given what we now know as a result of the Vault 7 leaks, is it possible for a top-level CIA hacker to frame a person by… (1) remotely accessing their computer without their knowledge and taking control of it; (2) accessing websites using their browser and planting incriminating material on their hard drive, again without the user’s knowledge; (3) modifying the dates and times when these websites were visited using a tool such as Time Stomper (or similar); (4) finally, having successfully executed the hack, erase it, or hide it, or obfuscate it to the extent that law enforcement forensics are unable to find any evidence that it ever took place? I would be very grateful if anyone could answer these points as I would very much like to get the technical details right in the story. I just need to know what is technically possible and what is fantasy. Many thanks in advance.
  15. I know I may sound like a noob here, but is using Karma by itself already illegal? I'm just asking so that I don't go into the wrong direction.
  16. How would you go about hacking a WiFi based system like alarm.com or adt. Got one some time ago and would like to experiment with the cameras and system itself. Any tips or walkthroughs would be great.
  17. Hi guys, I am an undergraduate student and I am currently conducting a qualitative research on hackers. My study aims to explore Hackers’ subculture values in addition to their motivations in pursuing a hacking career. It will also aim to understand when and why a White Hat Hacker will decide to change path in becoming a Black Hat Hacker or vice versa if applicable. I would really appreciate if you can share your experiences/motivations/ if possible lifestyle and maybe have a discussion about it. Many thanks.
  18. Hi guys, I have a problem: I want to hack my Wifi but all the attacks which I found only worked for WPS 1.0 but not on my WPS 2.0. Of course I am open minded for other ways to hack my wifi but none of the attacks which I found worked.🙄😞
  19. key is in image Dark.jpg help me with this
  20. An extremely asked theme is how to hack an wifi network easily, today i has the answer to you question totally free. Today is possible to attach a kali linux to your windows totally free and by a quickly mode, using Virtual Box the work is dis complicated. In the link bellow i taught how to hack any wifi with any operational system. You can ask for help in the post comments... Click here to go to article
  21. I need some help from someone. Someone raped my girlfriend and now i got his number. I would like to talk someone who can help me have revenge. i would love to destroy this number and bother him. contact me if u want to help.
  22. So Recently, Maybe a Day Ago, My WifiPineapple Nano Said it Couldn't Fetch Information from WifiPineapple.com. Obviously, This is a Problem Because I Cant Check For Updates, Get new Modules, and MOST Importantly, If a Client Connects To My WifiPineapple They Don't Have Any Wifi… I Can Still Search The Web With It Plugged In, So the Wifi Must Work. As I Said Earlier, This Just happened. I Tried Resetting My Pineapple, And Well That Didn't Work. I Went Back Through The Windows Setups (Windows is my main OS) And Everything Was Set Up Right. Any Help Would Be Greatly Appreciated.
  23. Hello! I have a question. Is it possbile to hack someone who is not on Wi-Fi? Like I am in Poland and I am hacking guy from Spain or USA. I want this way on Kali Linux. ?
  24. I just want to know is it possible to hack an elevator and send it to any floor i want or to change text on display from a computer?
  25. NotPike

    Hacknet

    Has anyone else played this game? If you like terminal based puzzle games with an interesting story this might be the game for you. Catchy sound track too. http://www.hacknet-os.com/
×
×
  • Create New...