Jump to content

Search the Community

Showing results for tags 'hak5'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Hak5 Cloud C²
    • Plunder Bug
    • Bash Bunny
    • Signal Owl
    • USB Rubber Ducky
    • Packet Squirrel
    • LAN Turtle
    • Screen Crab
    • Shark Jack
    • Key Croc
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 17 results

  1. Hi, I bought recently an wifi pineaple nano and i started using dwall and tcpdump but i could get most of the encrypted stuff so i serched and discovered sslsplit but when i use it my browser says that i´m using a invalid/fake certificate and i dont know where i can get a valid certificate! Does this have to do with the config that comes with sslsplit? My config: ################################################################## # Certain packets are redirected to the local port 8080 and 8443 # ################################################################## ## Plain text HTTP traffic (80) is redirected to port 8080 iptables -t nat -A PREROUTING -p tcp --dport 80 -j REDIRECT --to-ports 8080 ## WhatsApp (5222) is redirected to port 8080 iptables -t nat -A PREROUTING -p tcp --dport 5222 -j REDIRECT --to-ports 8080 ## SSL-based HTTPS traffic (443) is redirected to port 8443 iptables -t nat -A PREROUTING -p tcp --dport 443 -j REDIRECT --to-ports 8443 ## IMAP over SSL (993), SMTP over SSL (465 and 587) is redirected to port 8443 iptables -t nat -A PREROUTING -p tcp --dport 587 -j REDIRECT --to-ports 8443 iptables -t nat -A PREROUTING -p tcp --dport 465 -j REDIRECT --to-ports 8443 iptables -t nat -A PREROUTING -p tcp --dport 993 -j REDIRECT --to-ports 8443
  2. Hello Everyone, When this guide was first launched I was about mid-way through my studies in Networking and Systems Administration, and since I've learned a lot since then I decided to completely rework this guide (04/05/2020). I want to provide everyone with a guide that will not only get you up and running, but will also provide you with a stable environment as well. Please remember that I am NOT responsible for your actions, and you should never perform nor condone any illegal activities. Notes: This installation guide is written ONLY for Ubuntu 18.04/20.04 LTS. Step-By-Step Youtube Vide By Void-Byte || Step-By-Step Web Series By Hak5 (Darren) Step 1. Update, upgrade, and clean your machine. sudo apt -y update && sudo apt -y upgrade && sudo apt clean Step 2. Install required packages. sudo apt -y install unzip ufw Step 3. Open ports depending on your needs (20, 2022, 80, 8080, 443). sudo ufw allow 22,2022,80,8080,443/tcp && sudo ufw enable && sudo ufw reload Step 4. Download and unzip the community ZIP files in the tmp directory. sudo wget https://c2.hak5.org/download/community -O /tmp/community && sudo unzip /tmp/community -d /tmp Step 5. Move the c2_community* file to usr/local/bin, and create the require database directory. sudo mv /tmp/c2_community-linux-64 /usr/local/bin && sudo mkdir /var/hak5c2 Step 6. Create a new systemd service to run the Hak5 C2 script. sudo vim /etc/systemd/system/hak5.service Step 7. Utilize a template below, or build your own. Template A (https) [Unit] Description=Hak5 C2 After=hak5.service [Service] Type=idle ExecStart=/usr/local/bin/c2_community-linux-64 -hostname IPAddressORHostname -https -db /var/hak5c2/c2.db [Install] WantedBy=multi-user.target Template B (http) [Unit] Description=Hak5 C2 After=hak5.service [Service] Type=idle ExecStart=/usr/local/bin/c2_community-linux-64 -hostname IPAddressORHostname -db /var/hak5c2/c2.db [Install] WantedBy=multi-user.target Template C (http / port 80) [Unit] Description=Hak5 C2 After=hak5.service [Service] Type=idle ExecStart=/usr/local/bin/c2_community-linux-64 -hostname IPAddressORHostname -listenport 80 -db /var/hak5c2/c2.db [Install] WantedBy=multi-user.target Step 8. Reload the systemd daemon, enable the service, and start. sudo systemctl daemon-reload && sudo systemctl enable hak5.service && sudo systemctl start hak5.service Step 9. View the status of your service in order to view your key. sudo systemctl status hak5.service Step 10. Visit your website and fill in the required information to finalize. Step 11. Sign into your Hak5 C2 website. Step 12. Add devices, export logs, and more! Woot!
  3. Hello everyone! We're extremely excited to have announced the all-new Key Croc, and this update brings some improvements to the launch firmware as well as introducing support for the Hak5 Cloud C2. Change Log (1.2): General Fix non-ASCII logging Improved automatic VID/PID cloning Improved support for various ATTACKMODES Enable NTP Cloud C2 Add Support for the Hak5 Cloud C2 Misc Remove unneeded packages Improve LED status indication Update DuckyScript 2.0 lang files for US and GB Add fallback Arming Mode Framework now validates payload syntax at startup with LED feedback. Add INSTALL_EXTRAS script Add KEY_DEBUGGER script Add CHECK_PAYLOADS script Add RELOAD_PAYLOADS script You can download the firmware from the Hak5 Download Center. Instructions for updating your Key Croc can be found in the docs.
  4. Hi, We're happy to announce the 2.2.x release of the Cloud C2, which features a new notifications system and support for the new Hak5 Key Croc! Change Log (2.2.0) Hak5 Key Croc Added support for the Hak5 Key Croc! Hak5's Key Croc is a Keylogger armed with pentest tools, remote access and payloads that trigger multi-vector attacks when chosen keywords are typed. Live keystrokes, typed history and keystroke injection can be performed remotely with ease. Notifications Notifications can now be sent from enrolled devices. Notifications can be managed from the new bell icon in the status bar of the Cloud C2. You can download the latest version over-the-air in your existing Cloud C2 instance on Linux or Mac, or visit the Hak5 Download Center to grab the release for all supported devices and operating systems. As always, thank you for the support and great community feedback!
  5. Okay so I setup OpenVPN, adding the auth.txt to the config and such, set it all up and it would run on my Tetra fine but devices connect to the router did not get their IP changed. My setup is MacBook setup to share it's Ethernet connection (working) and a chrome book and ps4 bridged to the WI-FI of this Macbook. So I use Tunnelblick to load my config and execute, again successful AUTHs, VERIFYs OK, IP established. Now my Macbook hooked to Ethernet still works and going through the VPN and changing it's IP. But all other devices go offline. Is this a routing issue of making bridged traffic go through the VPN somehow? At one point messing with the protocols and configs, Tunnelblick did run sharing Wifi, connecting from the router to ethernet to ps4. Wireshark showed only communication between my router and a single VPN server. When it stopped working like that I tried to reload the configs on Tetra and I issued 'service openvpn start' and then instead of restarting and loading the config it just basically went in a cycle of all colors to blue blinking to online blue yellow to black offline again, repeat. Even after reset. I'll try a firmware update. Any help plz? thank youi
  6. Hopefully one of the Hak5 team can answer 😞 I’m starting to worry that Hak5 are shutting up shop 😳 There’s been a rapid decline in their content. We hardly see Daren anymore and when checking the Hak5 webpage it doesn’t look like their really using it. Couldn’t believe someone has posted an advert for hacking services on their Facebook page. i really hope this is a lul in preparation for greater things. Hak5 has been in my life for the best part of a decade and even inspired me to make a career change👍🏻
  7. Hey guys, I have a packet squirrel setup in Cloud2 and I can successfully start a terminal session. In a terminal session I would like to run a packet capture. If I run the command tcpdump -nni eth1 -f /mnt/loot/tcpdump/test2.pcap I am able to capture some packets. I can Exfil the packet capture with the command: C2EXFIL /mnt/loot/tcpdump/test2.pcap and the file shows up in the C2 dashboard. However, when I download the pcap, Wireshark cannot open it. I get an error message: "The file test2.pcap isn't a capture file in a format that Wireshark understands" Screenshot: https://imgur.com/a/t9MJtoZ I can open the pcap file with Wireshark from the USB stick, if I remove it from the Packet Squirrel and plug it into my PC. Could the C2EXFIL command be modifying the .pcap file when it moves it? I've used the C2EXFIL command to move other files like .txt and .nmap and have not had any issues. Has anyone else experienced this or figured out a way to move pcap's using C2EXFIL?
  8. Forgive me for feeling suspicious but I trust no one, especially companies and governments. I'm new to Hak5 and I've read through a lot of the sight and I see a recurring theme. "Hosted on our server's" like it's a good thing. It may be I guess but the untrusting part of my brian (95%) is saying that seems strange. Why would they still want you tied to there server's year's after you obtained there products. Why can't you use these item's without the umbilical cord attached? Or did i miss something that says you don't need there server's to use your products? How do I know that your server's aren't collecting data from our target's for later use or putting clients at risk if your server's get compromised? Go ahead and call me paranoid but I'll be standing when many fall's.
  9. Hi, The first 10 months of feedback has been incredible, and we are excited to bring you some epic new features and enhancements to the platform with Cloud C2 version 2.0.0! This release adds support for the latest Hak5 devices, including the Screen Crab, Signal Owl and Shark Jack. It also features a protocol enhancement that reduces network overhead and bandwidth for deployed devices. This release includes a LOOT feature, allowing you to easily exfiltrate any arbitrary data from the target network using the C2 protocol. Accessible from the new Loot menu within each device type, the Loot view allows you to sort, view and export collected files. An accompanying C2EXFIL command for all Cloud C2 enabled devices can be used in your modules and payloads to send files up to the server. With this release, all deployed devices will need to be updated to their latest firmware versions, so be mindful when updating if you have devices deployed in the field. As always, thank you for your feedback and we feel free to join the discussion within the Hak5 community.
  10. I have been trying to figure out a problem with this payload and for some reason I just cant get it work i have impacket in my tools file and installed when I plug my Bunny in it goes throw the colors but it gets stuck in the blue color and i cant figure out why? Do anyone have the same problem?
  11. I have a question. Is there any way to join a actual WiFi with a captive portal with my wifi pineapple nano. Also is it possible to join that captive portal and copy it so I could spoof it later? (I'm doing this for a Wifi demonstration)
  12. https://www.picz.in.th/image/fFGI3Q https://www.picz.in.th/image/fFGMbS Sorry,How to solve? I try configure ip static IP 172.16.42.42 mask 255.255.255.0 gateway 172.16.42. dns 172.16.42.1 it doesn’t work Please help me !!!!!!!!
  13. Good afternoon, Can't believe it has been 2 mos. since I last picked up this project. To bring you all up to speed, I have successfully gotten back into the packet squirrel, & installed Ovpn on my server(s) I believe I am at the last step, cannot....scp root@myserveraddress:client.ovpn . This is the order of steps per the hak5 video on the Packet Squirrel. This is the output from the command: connect to host 172.245.118.134 port 22: Network is unreachable. The command fails no matter which server/IP I use. Any suggestions? Maybe I skipped a step. Thanks again everyone.
  14. First off I have searched forums. I could have more carfully, but nothing seems to have matched exactly. Now out of the box; I connected the squirrel.i immediately lost internet. I checked to insure I had it correctly, and I did. The hookup looks like ISP modem--->> squirrel -->> wireless router I also tried it over again from pc. NO issues on pc. no wire issues. has to be squirrel I tried the sqitch and ran it with windows restore. This thing just doesn't work. Help me, help me said the k
  15. I've been trying all day to fix my bash bunny, but nothing seems to work. I've been trying all kinds of payloads on the GitHub repo and even making one my self. The issue I'm having is that the bash bunny won't do anything when I plug it in, but it's still recognized though. Keep in mind that I got my bash bunny yesterday so I'm not good at managing it. So if you think I'm making a beginner mistake Just go ahead and tell me. Hope you can help me, thanks!
  16. I would like to thank the Hak5 team for developing such a great little product that is the Packet Squirrel. I see posts with people complaining that it doesn’t do gigabit, POE etc.. An people are missing the point, you get get a lot for your $60. The packet capture facility alone is worth the price tag. I would imagine that, to add gigabit and POE would probably triple the price, double the size and triple the power requirements. I for one, am very impressed with the devices that Hak5 have developed. I recently managed to buy a pineapple nano(second hand) , USB ducky and a Packet squirrel. My only regret is that I can’t afford the other devices at the moment. So come on gals and guys, let Hak5 team know the positives instead of the, why doesn’t it do this!
  17. I saw your latest Defcon video packet squirrel. Any more information on that?
×
×
  • Create New...