Jump to content

Search the Community

Showing results for tags 'logs'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Enter a five letter word.

Found 4 results

  1. biob

    DJI flight logs

    Anyone been able to decode DJI Mavic air flight logs, exported using Assistant 2? Files compressed with zlib. Decompression shows some plain text, but a lot of random symbols etc
  2. Hello! I have a wifi pineapple mark V that fights with me, it don't want to work.. It disconnects sometimes. I use the pineapple with an 3g modem and i have the logs if somebody want to check it out for me, THANKS! Logs: Syslog Output:Sep 24 21:50:38 Pineapple daemon.info hostapd: wlan0: STA 00:22:fa:55:7d:72 WPA: group key handshake completed (RSN) Sep 24 21:50:26 Pineapple daemon.info dnsmasq[2093]: using local addresses only for domain lan Sep 24 21:50:26 Pineapple daemon.info dnsmasq[2093]: using nameserver Sep 24 21:50:26 Pineapple daemon.info dnsmasq[2093]: using nameserve
  3. I just flashed the new firmware and downloaded sslsplit on my pineapple. I started it and then went for a bus ride, and a walk around the city. When I got home I opened up the log file and I can see a lot of information like this- 2014-08-15 11:38:00 UTC ssl []:46824 []:443 sni:- crt:google.com/google.com/*.2mdn.net/*.android.com/*.appengine.google.com/*.au.doubleclick.net/*.cc-dt.com/*.cloud.google.com/*.de.doubleclick.net/*.doubleclick.com/*.doubleclick.net/*.fls.doubleclick.net/*.fr.doubleclick.net/*.google-analytics.com/*.google.ac/*.google.ad/*.google.ae/*.go
  4. So, I was reading Mubix's blog a little while back and he wrote about how PSEXEC shows up in the events log. It got me thinking, why can't I find a list anywhere of things like that which should be red flags in event, and other, logs? Anyone care to help build such a list? I'm starting off with what Mubix mentioned (though, I'm sure it will get changed later) and another obvious one. Windows Server 2003 Event ID 552 - when someone uses something such as RUNAS, it could be a sysad doing their job or an attacker doing something else, but worth looking into. What other things can we all thin
  • Create New...