Jump to content
Hak5 Forums

Search the Community

Showing results for tags 'network'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapple University
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Hak5 Cloud C²
    • Bash Bunny
    • Packet Squirrel
    • LAN Turtle
    • USB Rubber Ducky
  • Hak5 Shows
    • Hak5
    • HakTip
    • Metasploit Minute
    • Threatwire
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 11 results

  1. lucas alves

    How to Hack any Network Connection

    An extremely asked theme is how to hack an wifi network easily, today i has the answer to you question totally free. Today is possible to attach a kali linux to your windows totally free and by a quickly mode, using Virtual Box the work is dis complicated. In the link bellow i taught how to hack any wifi with any operational system. You can ask for help in the post comments... Click here to go to article
  2. Hello all. I have been a fan of the hak5 team for a while and over the last 2-3 years have collected pretty much everything in the hak5 shop. I have all the things that do the things. ? Recently during a fever dream, I imagined that I had a new device. One that magically grabbed 4 way WPA handshakes with the push of a button and was small enough to hold in my tiny pen testing fist. We have all been there right? We know there is a network with clients but we are just too far away to effectively do a deauth airodump attack. Sure we could get closer and open our Linux laptop, plug in a wonky antenna and fire up a couple terminals, but as if our hoody wasn't enough of an indication, now we'd really be drawing attention. Ok maybe we all haven't been there but at least I have and when I awoke from that fever dream I thought to myself, damn why didn't I think of this sooner. I need this thing to be as real as all my other things. Anyway, I went right to my work bench and started soldering away. I have started a GitHub repo for this thing that I'm tentatively calling FistBump. It's in it's beta stage for sure and a fairly simple device really, but would love some feedback. Please be constructive with your feedback, it's my first try at prototyping my own device. https://github.com/eliddell1/FistBump
  3. Hello everyone just though I would say my JavaScript network scanner project here : https://github.com/DarrenRainey/JavaScript-Network-Scanner Currently I it will scan and fingerprint devices based upon what files exist or don't exist on the device and once it fingerprints or can connect to a device it sends a post request with the fingerprint such as the routers model, the internal ip address and the user-agent from the victims PC. This code could be embedded into any website and sent a victim for recon. Currently it only scans a few predefined ip address's in the test.html file but I plan to make it scan the local subnet automatically and report any found devices to the attacker web server. The scanning code is based of lan-js with some custom code for identifying and sending the data to the attacker.
  4. Computers at an office use a network login to access the machines, so the passwords aren't stored locally and the SAM file has a hash for a blank password. The users accounts are heavily restricted in what they can do, but they do have some power shell access for IT. I have a Rubber Ducky and a Bash Bunny in my arsenal if they can be used. My main goal is to get password to the admin account(s). The office that I'm testing has a network connecting multiple buildings across the city. Any ideas, thanks.
  5. Cai-Birdy

    Networking issue in Kali

    I am really really brand new in Linux. I recently set up a lab for pen testing, but stuck by a few networking issues. Host window10, guest Kali linux, eth0 and eth1(both are in same subnet, also same as host-only adapter ), use both host-only and bridged modes. there are several questions for help: 1. firstly I enabled host-only network mode in virtualbox for Kali. By using eth0, I can ping host-only adapter on host successfully, but cannot ping host ethernet adapter. I think that is how host-only mode works. then I enabled Bridged mode, I thought there should be a new ethernet interface showing up on host, however, it didn't(until now only two interfaces on adapter settings, one is host ethernet interface, the other is host-only) . my question is whether it is normal... 2. continued the above scenario...I assumed that is normal...then in bridge mode of virtualbox setting, I selected host ethernet adapter name from dropdown list as the one for bridge. Also configure eth0, eht1, host-only adapter and host ethernet adapter into the same subnet. When I bring eth1 down and bring eth0 up, from host terminal, I cannot ping ip for eth0, but from Kali terminal I can ping host machine and 8.8.8.8, cannot ping host-only adapter, cannot open up google.com in browser(it really confused me...); if I bring eth0 down and bring eth1 down, can only ping host-only adapter. so it appears that eth0 only works for Bridge and eth1 only works for host-only, is that right ? 3. I noticed some posts mentioning that there should be a bridged connection between host-only adapter and one local area connection(also an adapter, in my scenario, host ethernet adapter is supposed to take this role), but I don't think it is true. can you guys advise ? 4, sorry, my question or description of the question are a little mess...words in bold are questions. before entering the real pen testing, I already got so much confusion, thanks a loooooot !
  6. Hi, let me give you some introduction: I bought the nano months ago and pentested some of my old routers. Unfortunately I had to realize that the nano only can handle the 2.4 GHz frequency, but no problem, great product anyway. Most newer routers support both 2.4 to 5 GHz, so I decided to buy the tetra to continue pentesting with my network that has one brand new access point with both frequencies up at the same time. The start with the tetra was great, because with the "Recon" tab it's possible to scan both frequencies at the same time. Sorry I'm not a fan of the "Modules" so I always continue with an ssh connection and use the aircrack-ng tools. Here comes the question: Why can I scan my networks (2.4 and 5 GHz on same AP), but the injection does not work on the 5 GHz frequency? I know that the MAC Address changes in the last character, but I started to airodump my 5 GHz and fixed the channel (also tried different ones), but it is still not working. What am I doing wrong? Screenshots included. Scan results: http://i.imgur.com/2QV8OkJ.png Airodump: http://imgur.com/taEl4EY Aireplay: http://imgur.com/wRSW3ed Second test with another router (also dual frequencies): I'm wondering how I can capture my WPA2 handshake when I'm connected to the 2.4 GHz frequency and when I try to deauth my phone for example, it will reconnect to the 5 GHz frequency without giving the handshake. Same goes if I'm connected to the 5 GHz first and deauth it, the reconnect goes to the 2.4 GHz. I know that is normal behavior for modern devices, but can you please give me some advices how to handle this? Maybe a script with a loop of switching frequenies and deauth could work? Thank You!
  7. Hi, let me tell you that I am new when it comes to WIFI Pineapples. This month i started Uni and this is my first year of Cyber Security, so we were told that we would play around with Kali and many other softwares, the thing is that I have use Kali before and I loved how the AirCrack ng works and the other in-build softwares So I used these softwares for pentesting on my own home network, but now I am limited, I am living in a student accomodation and I cannot use kali because it would become illegal to use it in an open network like the uni one so i was thinking on creating a home network only for me, so using only a router and just making it be conected to my devices and I would be able to do my pentesting projects for uni, but I was thinking whether to get a Wifi Pineapple to creating this small home network (if its possible), and then for one of my final projects use the Wifi Pineapple for what it is supposed to be used for, and make the project about a Wifi Pineapple and man-in-the-middle pentesting. You see, this is only a plan that i thought it could work, because I wanted to only spend 99.99$ and do all of that, and not to spend 140$ (99 for the pineapple and 40 for a home router) My question is if i can use the Wifi Pineapple to create a little wifi network so I can test my projects for Uni. So, for example, having a device (device A) connected to the Wifi Pineapple and having my device (device B with kali) trying to access data by penetrating on device A. I dont need a tutorial, as far as I know if its possible to do what I want and i know I have your approval of working I would totally be happy, and be able to purchase the Wifi Pineapple Nano. Thanks for your time, I hope I explained myself nicely, this is not my first language after all. Spanish Dude living in England.
  8. Simon

    MITM victim in the network

    Hallo, I have one question about the Lan Turtle. When i connect the Lan turtle in a PC from a "big" network so the lan turtle has acces to the network, doesnt it? When i want to start a MITM attack, have the target device only be in the same network or should i connect the lan turtle directly to the targetet device? So for example i plug in the lan turtle in "PC206" and i want to attack the "PC259" does it works or should i plug in the turtle in PC259? I Hope you understand my question :) Thanks in advice, Simon PS: sorry for my bad englisch, im not a native speaker
  9. Simon

    Steal Passwords from network

    Hello, We all know thats is easily possible to steal login datas from logged PC`s using the Lan Turtle. But whould this work also in a network? So i connect the Lan turtle with a Lancable to the network and not directly to a PC? I hope you can answer my question :) Thanks in advice, Simon Sorry for my bad englisch :/
  10. First let me say when using my Nano via the App on my phone, the networking functions correctly. When using it on my Windows 7 laptop however, I get no connectivity to the network. Bulletins will not load ( Error connecting to WiFiPineapple.com. Please check your connection. ) nor will the module list populate. My home network does not use a standard ip pool, that is to say, not 192.168.x.x - rather I use a 10.77.x.x. IMHO this is where the problem lies. Windows objects strongly to the settings recommended by the forums and video 'Setup Guide For Windows" https://www.wifipineapple.com/pages/setup. because "Warning - The default gateway is not on the same network segment (subnet) that is defined by the IP address and subnet mask. do you wish to save this configuration?" If I click [Yes] nothing changes. My IPCONFIG is : Ethernet adapter Pineapple Nano: Connection-specific DNS Suffix . : Link-local IPv6 Address . . . . . : xxx::xxx:xxx:xxx:xxx%xx IPv4 Address. . . . . . . . . . . : 172.16.42.42 Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : 10.77.x.1 Connection-specific DNS Suffix . : Link-local IPv6 Address . . . . . : xxx::xxx:xxx:xxx:xxx%xx IPv4 Address. . . . . . . . . . . : 10.77.x.49 Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : 10.77.x.1 Is there any way to work on this network or is the Nano slave to a 192.168.x.x schema? thanks!!!
  11. Hello! I have issue - I need to connect to wpa2 secured network automatically on nano boot, I would like to use bash script for this task, so I could extend script to some additional features. Could anyone give a hint to solve these tasks: 1 - which config file to edit (or better if can I use my own config file where I will put SSID, password and other necessary parameters) 2 - what command I need to run to connect to configured network) 3 - how to check if connection succeeded ( script need to check if IP was obtained via dhclient) Many thanks! (P.S. just in case if anyone is interested what I'm trying to do: I have a big password list for some particular wifi network and I need to find out which one is correct) King regards, imitm
×