Jump to content

Search the Community

Showing results for tags 'mac'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 13 results

  1. Hello I’m sure I overlooked it but can someone please point me to a document / pdf / or even better a video of how to configure Tetra with Mac OS ??
  2. Reverse Shell Mac for Bash Bunny Author: 0dyss3us (KeenanV) Version: 1.0 Description Opens a persistent reverse shell on victim's mac and connects it back to host attacker over TCP. Targets MacOS (OSX may work but has not been tested) Connection can be closed and reconnected at any time Deploys in roughly 30 sec (working on making it faster) Works well with NetCat as the listener Requirements Have a working Bash Bunny :) and a victim with MacOS STATUS LED STATUS Purple Setup Amber (Sing
  3. Hi, Is it possible to spoof MAC address of my LAN turtle (by setting a specific MAC address). I don't want to clone the MAC address of the computer where i am plug-in, i want to set specific MAC address ? Do you know if it is possible ? Cordially,
  4. Hello Guys, I'm new to Pineapple and I need some help please :)) I got the NANO and it works great on my windows machine but when it gets to my macbook pro I can't get it to run (with Internet connection) :( I tried some step by step tutorials but they didn't work :( Plug the NANO in and get the connection and setup the gui no problems but I can't download the modules or the bulletins :( I'm connected to my home wifi and shared the internet connection with the Pineapple-adapter but it won't work :( anyone got some ideas or tips for me :)) THX :)
  5. I recently updated to the 2.2.0 update. Everything is working as expected using Firefox on my laptop, but I am having a lot of problems using the web API on my cell. Its an old cell, using Android 5.0.1. I can not open the PineAP module's page, and on the Recon module's page, when I pause or stop the scan, there are no drop down ( carets? ) next to the MACs. I haven't seen any other reports about this, is there anything else needed to help resolve this?
  6. Whenever I go into the Network tab and try to set a new MAC or Set Random MAC the radio that I try to change shuts off and becomes unusable. I have waited for them to become usable for up to 5 hours with no success, it doesn't matter if I do just one at a time or all of them, and doesn't matter how patient I am. And once this happens they are permanently unusable unless I preform a factory reset, which I've done several times. And I've also performed one Firmware Recovery, to no avail. Any ideas of what I can do?
  7. Hi There! Im relatively new then Wifi Pineapple NANO and its various modules, as such i've just been playing around with it on my Macbook Pro. Some very awesome tech. Ive wanted to start using it with my Kali Linux VM running through Virtual box and have run into some issues, particularly in regard to the device, once configured, being detected and the correct gateways to use for a MacOS VM. As you are probably well aware, Apple has a different default gateway to the rest of the world (using 192.168.2.1 instead of 172.16.42.42 i believe). I've configured my Kali box to have a bridged
  8. Hi everyone, I just got my first Nano and finished the setup. So far I have used airodump-ng etc. as part of my Kali setup, now I try to get familiar with the Nano. I am trying not to ask some obvious things. Currently, I am mainly reading through the wiki. However, there are two things right now I don't really get. I was playing with the Recon feature and downloaded the OUI file. However, every mac address is still displayed as "unknown mac prefix". What is it that I am missing here? Can the file be re-downloaded? Another thing is that the wiki talks about Log Probes and
  9. Hello all, With MAC's (and Linux) you have to know the device of course to serial into it. To make it quicker for me I wrote the below script to search the MAC for the bash bunny (If you have multiple modems this may not work for you) and prompt you to connect to it. Feel free to use and modify as desired. #!/bin/bash # # Title: Mac Serial Connect # Author: NightStalker # Version: 1.0 # # Finds the Bash Bunny in the /dev/cu.* location and # prompt you to connect to it. clear bunnyloc=`ls /dev/cu.* | grep usbmodem` echo "Bash bunny is located at: $bunnyloc" read
  10. Trying to make a payload for a password grabber for mac osx having trouble with it while using the bash bunny. Can anyone help with my code? $filecount = ((Get-ChildItem -filter ($filter + "*") -path $dest | Measure-Object | Select -ExpandProperty Count) + 1) Start-Process -FilePath ((-f 'label=''BashBunny''').Name+'payloads\switch2\laZagne.exe') -ArgumentList 'all -oN' -RedirectStandardOutput (( -f 'label=''BashBunny''').Name+'loot\PasswordGrabber\computer_' + $filecount +'.txt')
  11. I see lots of unanswered questions about layouts and foreign languages for mac os: And close to zero support nor answers, nor anything in fact, so here's my take on it since I spent quite some time getting it worked ! There is this thread to bypass the keyboard assistant, well this is half the solution in fact. You need to get the PID of the right layout AND have the correct json. So for instance, to have working payloads on a french mac, you'll need that fr-mc.json AND use DUCKY_LANG fr-mc ATTACKMODE HID VID_0X05AC PID_0X0250 { "__comment": "A
  12. Hi, i'm trying to block all connection from a specified mac address but it doesn't work. The payload that i'm using is this: #!/bin/bash # LOCK MAC ADDRESS function setup() { # Show SETUP LED LED SETUP # Set the network mode to NAT NETMODE BRIDGE sleep 7 } function run() { # Show ATTACK LED LED ATTACK # Block all traffic for/from specified mac address iptables -A INPUT -m mac --mac-source 00:12:34:56:78:90 -j DROP sleep 3 } setup run What i'm doing wrong? Thanks
  13. I decided to put together a payload to get myself familiar with the bunny. This was inspired by SudoBackdoor and borrows heavily from it, but uses python because I'm more fluent in that than bash. I'm hoping to have this thing completed by the end of this week or possibly the weekend. The code under development is on my github at https://github.com/michael-weinstein/bashbunny-payloads/tree/darkCharlie/payloads/library/credentials/darkCharlie
×
×
  • Create New...