Jump to content

Search the Community

Showing results for tags 'hak5'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

  1. Hi, We're happy to announce the 2.2.x release of the Cloud C2, which features a new notifications system and support for the new Hak5 Key Croc! Change Log (2.2.0) Hak5 Key Croc Added support for the Hak5 Key Croc! Hak5's Key Croc is a Keylogger armed with pentest tools, remote access and payloads that trigger multi-vector attacks when chosen keywords are typed. Live keystrokes, typed history and keystroke injection can be performed remotely with ease. Notifications Notifications can now be sent from enrolled devices.
  2. Hello Everyone, When this guide was first launched I was about mid-way through my studies in Networking and Systems Administration, and since I've learned a lot since then I decided to completely rework this guide (04/05/2020). I want to provide everyone with a guide that will not only get you up and running, but will also provide you with a stable environment as well. Please remember that I am NOT responsible for your actions, and you should never perform nor condone any illegal activities. Notes: This installation guide is written ONLY for Ubuntu 18.04/20.04 LTS. Ste
  3. Hi, I bought recently an wifi pineaple nano and i started using dwall and tcpdump but i could get most of the encrypted stuff so i serched and discovered sslsplit but when i use it my browser says that i´m using a invalid/fake certificate and i dont know where i can get a valid certificate! Does this have to do with the config that comes with sslsplit? My config: ################################################################## # Certain packets are redirected to the local port 8080 and 8443 # ################################################################## ## Plain
  4. Hello everyone! We're extremely excited to have announced the all-new Key Croc, and this update brings some improvements to the launch firmware as well as introducing support for the Hak5 Cloud C2. Change Log (1.2): General Fix non-ASCII logging Improved automatic VID/PID cloning Improved support for various ATTACKMODES Enable NTP Cloud C2 Add Support for the Hak5 Cloud C2 Misc Remove unneeded packages Improve LED status indication Update DuckyScript 2.0 lang files for US and
  5. Hey guys, I have a packet squirrel setup in Cloud2 and I can successfully start a terminal session. In a terminal session I would like to run a packet capture. If I run the command tcpdump -nni eth1 -f /mnt/loot/tcpdump/test2.pcap I am able to capture some packets. I can Exfil the packet capture with the command: C2EXFIL /mnt/loot/tcpdump/test2.pcap and the file shows up in the C2 dashboard. However, when I download the pcap, Wireshark cannot open it. I get an error message: "The file test2.pcap isn't a capture file in a format that Wireshark understands" Screenshot: https:
  6. Forgive me for feeling suspicious but I trust no one, especially companies and governments. I'm new to Hak5 and I've read through a lot of the sight and I see a recurring theme. "Hosted on our server's" like it's a good thing. It may be I guess but the untrusting part of my brian (95%) is saying that seems strange. Why would they still want you tied to there server's year's after you obtained there products. Why can't you use these item's without the umbilical cord attached? Or did i miss something that says you don't need there server's to use your products? How do I kno
  7. Hi, The first 10 months of feedback has been incredible, and we are excited to bring you some epic new features and enhancements to the platform with Cloud C2 version 2.0.0! This release adds support for the latest Hak5 devices, including the Screen Crab, Signal Owl and Shark Jack. It also features a protocol enhancement that reduces network overhead and bandwidth for deployed devices. This release includes a LOOT feature, allowing you to easily exfiltrate any arbitrary data from the target network using the C2 protocol. Accessible from the new Loot menu within each device type,
  8. I have been trying to figure out a problem with this payload and for some reason I just cant get it work i have impacket in my tools file and installed when I plug my Bunny in it goes throw the colors but it gets stuck in the blue color and i cant figure out why? Do anyone have the same problem?
  9. I have a question. Is there any way to join a actual WiFi with a captive portal with my wifi pineapple nano. Also is it possible to join that captive portal and copy it so I could spoof it later? (I'm doing this for a Wifi demonstration)
  10. Hi Guys I need help creating a payload on the Twin Duck rubber ducky that silently runs tree /a/ /f on the victims computer and then saves the output to the ducky. This is the code that I have so far: for /f %d in ('wmic volume get driveletter^, label ^| findstr "DUCKY"') do set myd=%d&echo tree /a /f > echotree.cmd&echotree.cmd > %myd%/results.txt&del echotree.cmd I would like to run it in the Run line. Please help me to optimise it!
  11. https://www.picz.in.th/image/fFGI3Q https://www.picz.in.th/image/fFGMbS Sorry,How to solve? I try configure ip static IP 172.16.42.42 mask 255.255.255.0 gateway 172.16.42. dns 172.16.42.1 it doesn’t work Please help me !!!!!!!!
  12. Good afternoon, Can't believe it has been 2 mos. since I last picked up this project. To bring you all up to speed, I have successfully gotten back into the packet squirrel, & installed Ovpn on my server(s) I believe I am at the last step, cannot....scp root@myserveraddress:client.ovpn . This is the order of steps per the hak5 video on the Packet Squirrel. This is the output from the command: connect to host 172.245.118.134 port 22: Network is unreachable. The command fails no matter which server/IP I use. Any suggestions? Maybe I skipped a step. Thanks again everyone.
  13. First off I have searched forums. I could have more carfully, but nothing seems to have matched exactly. Now out of the box; I connected the squirrel.i immediately lost internet. I checked to insure I had it correctly, and I did. The hookup looks like ISP modem--->> squirrel -->> wireless router I also tried it over again from pc. NO issues on pc. no wire issues. has to be squirrel I tried the sqitch and ran it with windows restore. This thing just doesn't work. Help me, help me said the k
  14. Hello Hackers !!! I am new into infosec practically i was learning before but now into industry work so i am fed up of searching different methodology, tools, frameworks. I am stucked with something real life scenarios, there is wifi router which have 10 users. Me as admin of that router, how can i access these 10 users (PC, Andriod, etc) ? I tried wireshark, and many other stuff didnt get anything suitable? can i do this via adding a default welcome page to my router if some one connect will have to download something or something like this? a Newbie need help ;D
  15. Hey Buddies a Newbie here, i watched https://www.youtube.com/watch?v=0UmJLLTr2gg i i have seen in video beside normal ducky there were micro ducky by having SD card. I didnt got any link to buy those any where? can anyone help here getting it ?
  16. Why is Hak5 leaving the warehouse and where will you be going???
  17. biob

    Hak5 artwork

    https://instagram.com/p/BatFZAIA8Pk/ Anyone know where I can find the Packet Squirrel and Ducky version?
  18. I've been trying all day to fix my bash bunny, but nothing seems to work. I've been trying all kinds of payloads on the GitHub repo and even making one my self. The issue I'm having is that the bash bunny won't do anything when I plug it in, but it's still recognized though. Keep in mind that I got my bash bunny yesterday so I'm not good at managing it. So if you think I'm making a beginner mistake Just go ahead and tell me. Hope you can help me, thanks!
  19. hi guys i've a big proble, in the last weeks i won a usb rubber ducky during an hackathon but the replay buttons seems broken. When i press it the rubber ducky doesn't replay the script, what could be the problem?
  20. I have purchased about 80% of your equipment, Pineapple Mark V, Nano tactical, bash bunny, pocket squirrel, lan turtle, usb rubber ducky, router, wifi dongles, etc. Unfortunately I purchased them separately as they came out. Therefore I don't have a custom Hak5 case to keep them in. I wish you would consider selling the cases separately. I would be your first customer to buy one. Love your products, and the show.
  21. I would like to thank the Hak5 team for developing such a great little product that is the Packet Squirrel. I see posts with people complaining that it doesn’t do gigabit, POE etc.. An people are missing the point, you get get a lot for your $60. The packet capture facility alone is worth the price tag. I would imagine that, to add gigabit and POE would probably triple the price, double the size and triple the power requirements. I for one, am very impressed with the devices that Hak5 have developed. I recently managed to buy a pineapple nano(second hand) , USB duc
  22. Dear Hak5, don't mean to anger anyone with this post... but im finding myself missing the good old Hak5 podcasts. The days when we had tutorials based around hacking tools , readily available . It seems the show is now based purely on Hak5's amazing products. An as great as they maybe, they aren't very affordable outside of the US e.g. Wifi Pineapple nano, being £125 , from European supplier. i appreciate, that Hak5 is a business and they have to eat. But would it not be possible to setup another channel to provide the tutorials for the products you sell and get back to the old form
  23. I know this may be seen as a very pointless and stupid question. Does the Hak5 team provide a set of the icons they use for the various diagrams they publish? E.g https://www.hak5.org/wp-content/uploads/2017/10/openvpn_diagram1.png Although not essential it would be good to be able to produce diagrams while learning, using the same theme as used by Hak5. Must admit I really like the simplistic look of them.
  24. Hello, I must be doing something totally wrong. When I try connecting to irc.hak5.org/6697 it takes me to the darkscience irc. I am using hexchat. What am I doing wrong?
  25. xD I just hope its not to expensive
×
×
  • Create New...