Jump to content

Search the Community

Showing results for tags 'key'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 11 results

  1. Hi, We're happy to announce the 2.2.x release of the Cloud C2, which features a new notifications system and support for the new Hak5 Key Croc! Change Log (2.2.0) Hak5 Key Croc Added support for the Hak5 Key Croc! Hak5's Key Croc is a Keylogger armed with pentest tools, remote access and payloads that trigger multi-vector attacks when chosen keywords are typed. Live keystrokes, typed history and keystroke injection can be performed remotely with ease. Notifications Notifications can now be sent from enrolled devices.
  2. Hello everyone! We're extremely excited to have announced the all-new Key Croc, and this update brings some improvements to the launch firmware as well as introducing support for the Hak5 Cloud C2. Change Log (1.2): General Fix non-ASCII logging Improved automatic VID/PID cloning Improved support for various ATTACKMODES Enable NTP Cloud C2 Add Support for the Hak5 Cloud C2 Misc Remove unneeded packages Improve LED status indication Update DuckyScript 2.0 lang files for US and
  3. I just received my bash bunny In the mail today! And to put it mildly, I am Enthused! Right away I was very interested in "alternative" ways to use the bash bunny's power. I am new to the Ethical Hacking / IT community (I'm currently enrolled in college as a Cyber sec. and Info. Assurance major) and therefore am not extremely acquainted with scripting. Now. Onto my Idea! I use KeePass on a day to day basis. It is my most trusted application. And I thought I could combine it with the power of the bash bunny! Imagine, If you will, plugging in the bash bunny, it opens Kee
  4. Hi guys, I have questions. I have pin and ssid of a hiden network but i don't know the way to find key? Thank's
  5. I got the crib and the encrypted version, i need to find the key. The input is a 16 byte Hex sequence and the output is a 64-byte Hex sequence. Im not sure of the type of enccryption, im thinking about SHA256-512. but im not sure How can I do the known plaintext attack. its not a file, its a simple text Which type of encryption do you think its possible to be ?
  6. My friend bet me that I couldn't shut down his computer with my rubber ducky, so I decided to prove him wrong. I started writing my code to shutdown his laptop (he has a dual booting linux and windows setup), it works well in linux but in windows it opens start and types e in the search bar instead of going across to shutdown. I have tried "RIGHTARROW" and "RIGHT" and it is using US keyboard. Code: REM Linux Shutdown (needs root user to be logged in) DELAY 550 ALT F2 DELAY 600 STRING poweroff ENTER DELAY 500 REM Windows Shutdown GUI DELAY 250 RIGHT RIGHT ENTER
  7. Hi everyone, I've been using the USB Rubber Ducky for the past few months and coded pretty interesting stuff, the thing is that the other day I found this video where it shows you how to get web browsers passwords whithin a few lines. So, I decided to try it and I found out that in a Spanish keyboard the Rubber Ducky doesn't recognize these keys { } and instead it replaces them with these keys [ ] therefore Powershell gives me an error everytime I try it. Ok, now what I'm asking you is to tell me if there's any way of making it work for expample replacing '{' with any other keys that the
  8. Maybe someone can share where to find the storage for WiFi Client Mode ssids and associated preshared keys *** no luck here grep -rnw '/' -e "psk" ...but found in plain text: /dev/mtdblock5:6947024:*mixed-psk▒1+tki)L▒.[PINEAPPLE ROOT WEB INTERFACE ACCESS PASS]' *** no luck here Found from the /etc/pineapple/ path then ran sqlite> .open ssid_list.db tried to select * from ssid_list; which yields nothing for me cause I haven't been been adding any to the filter lists I suppose. *** some success here Found from the /etc/config/wireless file held config wifi-iface option device 'radio
  9. Hey guys, i was checking the System Log as I saw the following entries: auth.err sshd[2499]: error: Could not load host key: /etc/ssh/ssh_host_ecdsa_key auth.err sshd[2499]: error: Could not load host key: /etc/ssh/ssh_host_ed25519_key I recently made a fresh factory reset and update to 1.0.6. SSH into the pineapple is possible, but I wonder why the keys were not generated. Anyone else with this error message?
  10. Hey, I got a TKIP Shared key but its encrypted so it looks like this : 01000000D08C9DDF0115D1118C7A00C04FC297EB01000000AB0755C8A2892F47A7C0032ADE095A320000000002000000000010660000000100002000000082DCC8201C2332E711B161AEA724C1823E62BD26843D4FBF4D53177C28F85384000000000E80000000020000200000003B263D71C9A1773CD4607C19949D3273DF5F15F9BD82FF655C5869B5E7FAA222200000004AECBD9F55861394941FEB35CA8C12E552E2307CEC8535F0CE8243A9190BD17F400000005A05F984231ACDCB7ED3251E4BCB3E51190E63B139CDB10FB7479F544E9C48426D50613C19F8DBC910C5A7254644353598365A4F372CA0774839EF6B17706EAE Is there a way to decrypt this? i
  11. How can I trigger the OPTION key on OSX? I am trying to use keyboard shortcuts to open finder, search for terminal, and then open it. I want to minimize all windows using COMMAND-OPTION-M and then launch finder with COMMAND-F
×
×
  • Create New...