Jump to content
Hak5 Forums

Search the Community

Showing results for tags 'network'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapple University
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Bash Bunny
    • Packet Squirrel
    • LAN Turtle
    • USB Rubber Ducky
  • Hak5 Shows
    • Hak5
    • HakTip
    • Metasploit Minute
    • Threatwire
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Found 15 results

  1. Hello everyone just though I would say my JavaScript network scanner project here : https://github.com/DarrenRainey/JavaScript-Network-Scanner Currently I it will scan and fingerprint devices based upon what files exist or don't exist on the device and once it fingerprints or can connect to a device it sends a post request with the fingerprint such as the routers model, the internal ip address and the user-agent from the victims PC. This code could be embedded into any website and sent a victim for recon. Currently it only scans a few predefined ip address's in the test.html file but I plan to make it scan the local subnet automatically and report any found devices to the attacker web server. The scanning code is based of lan-js with some custom code for identifying and sending the data to the attacker.
  2. Computers at an office use a network login to access the machines, so the passwords aren't stored locally and the SAM file has a hash for a blank password. The users accounts are heavily restricted in what they can do, but they do have some power shell access for IT. I have a Rubber Ducky and a Bash Bunny in my arsenal if they can be used. My main goal is to get password to the admin account(s). The office that I'm testing has a network connecting multiple buildings across the city. Any ideas, thanks.
  3. Cai-Birdy

    Networking issue in Kali

    I am really really brand new in Linux. I recently set up a lab for pen testing, but stuck by a few networking issues. Host window10, guest Kali linux, eth0 and eth1(both are in same subnet, also same as host-only adapter ), use both host-only and bridged modes. there are several questions for help: 1. firstly I enabled host-only network mode in virtualbox for Kali. By using eth0, I can ping host-only adapter on host successfully, but cannot ping host ethernet adapter. I think that is how host-only mode works. then I enabled Bridged mode, I thought there should be a new ethernet interface showing up on host, however, it didn't(until now only two interfaces on adapter settings, one is host ethernet interface, the other is host-only) . my question is whether it is normal... 2. continued the above scenario...I assumed that is normal...then in bridge mode of virtualbox setting, I selected host ethernet adapter name from dropdown list as the one for bridge. Also configure eth0, eht1, host-only adapter and host ethernet adapter into the same subnet. When I bring eth1 down and bring eth0 up, from host terminal, I cannot ping ip for eth0, but from Kali terminal I can ping host machine and, cannot ping host-only adapter, cannot open up google.com in browser(it really confused me...); if I bring eth0 down and bring eth1 down, can only ping host-only adapter. so it appears that eth0 only works for Bridge and eth1 only works for host-only, is that right ? 3. I noticed some posts mentioning that there should be a bridged connection between host-only adapter and one local area connection(also an adapter, in my scenario, host ethernet adapter is supposed to take this role), but I don't think it is true. can you guys advise ? 4, sorry, my question or description of the question are a little mess...words in bold are questions. before entering the real pen testing, I already got so much confusion, thanks a loooooot !
  4. Hello guys, i want to seeking for you guys, i just got Mark V from my friend, and i want to learn it. i'll already do every step for first configuration, like turning on internet sharing, change ip address and so on. but when client connecting too ssid from markv it can connect but there's no internet access, and when i make it join (client mode) the same network as my pc, client can access internet but i cant find it anymore in pineap client report hope you guys can help thank you and sorry for my messy writing My pc using Win 10 My client Win 7 My pc connect internet via android tethering, and connect to Mark V via ethernet cable my client connect to ssid from mark v using wireless ifconfig here some image (dunno if its give you any help)
  5. nousagi

    Networking stuff on plane

    Hi! I´ll be flying from Vienna to Italy next week and i want to know if I can carry this stuff with me, since I cannot find any information on TSA. So, here´s the list: Network switch (8 ports) 10 RJ-45 cat6 cables crimping tool RJ-45 connectors
  6. Hi, Is there a tool to passively map a network from a packet capture and produce documentation e.g. network map, ports open on devices etc...?
  7. NetworkToolbox - Network scanning and analyzing by Marcus Roskosch https://appsto.re/us/9wa2M.i https://networktoolbox.de/ Shits extensive. I don't pay for apps willy-nilly, this one has not failed to impress. Heres a list of it's features: Features of NetworkToolbox Scan your local home- or corporate-network within seconds. Explore all connected devices and get a complete picture of your network. Over 26 individual tools are available to analyze your network, to perform various security checks or even connect to devices on your network. SCANNING – FAST AND COMPLETE The included Network scanner runs repeated scans to get the most accurate results. To prevent from being detected by Firewalls or IDS (Intrusion detection systems), the scanned addresses are selected randomly. For the fastest possible speed, scans will be performed in hundreds of concurrent tasks at the same time. This results in the fastest and most reliable scan results compared to any other app. Devices, found by the Network scanner can be further analyzed by scanning for services using the Portscan tool. Portscans may reveal known and unknown (hidden) services of devices. All tools are highly integrated. Wherever you want to dig deeper into the results of one tool, a single tap will allow you to open the internal browser, start a telnet or FTPsession, ping the host, get information about a SSL certificate, perform certain security checks and more. Scan results can also be logged and multiple scans can be compared to each other. This way, it is easy to find out, if devices have been added, removed or changed between two scans. NO NETWORK SPECIALIST – (YET) ? If you are not a network expert, don’t worry and don’t be scared. NetworkToolbox makes it easy for you to dig into those networking details. Several included How-To’s and Guides will show you how easy it is, for instance, to perform an open-port analysis. By this, you will be able to quickly scan your home network to find ports that are unintentionally open to the web. Such ports will often be used by cyber criminals to break into your internal network. The app also includes Video tutorials, samples and other learning resources. Each tool also has a comprehensive Help text that explains the purpose of each tool and how to use it. Last but not least, a Glossary is included that explains terms from A like “Access control” to Z like “Zero day”. TELNET AND SSH TERMINAL NetworkToolbox also includes a telnet or SSH terminal which allows you to connect to linux devices, routers with telnet interfaces or any other telnet or SSH device. SHODAN AND MORPHEUS DEVICE SCANNING SHODAN is a search engine that lets you find specific computers (routers, servers, etc.). SHODAN can be seen as a public port scan directory. Web search engines, such as Google and Bing, are great for finding websites. But what if you’re interested in finding computers running a certain piece of software (such as Apache)? Or if you want to know which version of Microsoft IIS is the most popular? Or you want to see how many anonymous FTP servers there are? Maybe a new vulnerability came out and you want to see how many hosts it could infect? Traditional web search engines don’t let you answer those questions. SHODAN is fully integrated in NetworkToolbox. In addition to SHODAN, NetworkToolbox integrates it’s own Device scanning engine called Morpheus. Like SHODAN, Morpheus runs on a distributed network of scanning engines around the world and can be queried from inside NetworkToolbox. ALL FEATURES : The above just shows a fraction of the possibilities of NetworkToolbox. Below is a list of features. This list may already incomplete because NetworkToolbox is being extended and updated continuously. If you are missing a feature or have questions, please feel free to ask. Local device and network information Local and public IP address Network Gateway and DNS Server addresses WiFi network information Cell network information Shodan and Morpheus search engines DNS lookup Reverse DNS lookup IP Geo-Location Provider information MX, NS, SOA DNS Server record information Graphical PING Network Scan Shows Device Type MAC address Device Network name Device Vendor Individual names can be assigned Port Scan Individual port ranges Traceroute Telnet client FTP client SSH client SFTP client HTTP Header analyzer Internal Webbrowser Individual User-Agents to mimic iPhone, Windows PC, Mac Individual Mime types Standard password test function HTTP traversal exploit test function Source display with syntax highlighting XML browser Website Spider WEB-Service analyzer Individual Endpoint, Service header and body GET, PUT, POST methods XML, JSON, plain-text SOAP, REST support Results will be displayed in a drill-down browser SSL Certificate inspector Bonjour scanner Bluetooth LE (4.0) scanner Port forward tool MAC address database IP address calculation Security check tool Router exploit tests mongoDB exploit test and more Mail server check Reports mail client settings Identifies mail server issues Glossary Logbook To collect scan results To remember Addresses and links To compare two scan results and find differences Ability to integrate external apps For instance, your preferred VNC or SSH app can be fully integrated Support URL-Scheme Other apps can call NetworkToolbox e.g. to use the WebService tool Additional resources and links Vulnerability databases Exploit archive Internet Storm Center and definitely much more…
  8. Hi, let me give you some introduction: I bought the nano months ago and pentested some of my old routers. Unfortunately I had to realize that the nano only can handle the 2.4 GHz frequency, but no problem, great product anyway. Most newer routers support both 2.4 to 5 GHz, so I decided to buy the tetra to continue pentesting with my network that has one brand new access point with both frequencies up at the same time. The start with the tetra was great, because with the "Recon" tab it's possible to scan both frequencies at the same time. Sorry I'm not a fan of the "Modules" so I always continue with an ssh connection and use the aircrack-ng tools. Here comes the question: Why can I scan my networks (2.4 and 5 GHz on same AP), but the injection does not work on the 5 GHz frequency? I know that the MAC Address changes in the last character, but I started to airodump my 5 GHz and fixed the channel (also tried different ones), but it is still not working. What am I doing wrong? Screenshots included. Scan results: http://i.imgur.com/2QV8OkJ.png Airodump: http://imgur.com/taEl4EY Aireplay: http://imgur.com/wRSW3ed Second test with another router (also dual frequencies): I'm wondering how I can capture my WPA2 handshake when I'm connected to the 2.4 GHz frequency and when I try to deauth my phone for example, it will reconnect to the 5 GHz frequency without giving the handshake. Same goes if I'm connected to the 5 GHz first and deauth it, the reconnect goes to the 2.4 GHz. I know that is normal behavior for modern devices, but can you please give me some advices how to handle this? Maybe a script with a loop of switching frequenies and deauth could work? Thank You!
  9. Hi, let me tell you that I am new when it comes to WIFI Pineapples. This month i started Uni and this is my first year of Cyber Security, so we were told that we would play around with Kali and many other softwares, the thing is that I have use Kali before and I loved how the AirCrack ng works and the other in-build softwares So I used these softwares for pentesting on my own home network, but now I am limited, I am living in a student accomodation and I cannot use kali because it would become illegal to use it in an open network like the uni one so i was thinking on creating a home network only for me, so using only a router and just making it be conected to my devices and I would be able to do my pentesting projects for uni, but I was thinking whether to get a Wifi Pineapple to creating this small home network (if its possible), and then for one of my final projects use the Wifi Pineapple for what it is supposed to be used for, and make the project about a Wifi Pineapple and man-in-the-middle pentesting. You see, this is only a plan that i thought it could work, because I wanted to only spend 99.99$ and do all of that, and not to spend 140$ (99 for the pineapple and 40 for a home router) My question is if i can use the Wifi Pineapple to create a little wifi network so I can test my projects for Uni. So, for example, having a device (device A) connected to the Wifi Pineapple and having my device (device B with kali) trying to access data by penetrating on device A. I dont need a tutorial, as far as I know if its possible to do what I want and i know I have your approval of working I would totally be happy, and be able to purchase the Wifi Pineapple Nano. Thanks for your time, I hope I explained myself nicely, this is not my first language after all. Spanish Dude living in England.
  10. Daemon0x90

    Scanning a subnet

    So, one thing that I have ran into lately is extremely large networks. Often its a network that I am pretty sure is used to just deter networking scanning and host discovery. Does anyone have any advice for scanning networks this size?
  11. Hello, I was asked a question and had no answer as I am just not old enough to have participated in the good old days of dial up internet. If two houses are next to each other and a dsl line runs to them both can the two houses communicate without a subscription to the phone company? And is it legal? Sorry if this is a stupid question but my knowledge of phone networks is limited. Thank you
  12. Simon

    MITM victim in the network

    Hallo, I have one question about the Lan Turtle. When i connect the Lan turtle in a PC from a "big" network so the lan turtle has acces to the network, doesnt it? When i want to start a MITM attack, have the target device only be in the same network or should i connect the lan turtle directly to the targetet device? So for example i plug in the lan turtle in "PC206" and i want to attack the "PC259" does it works or should i plug in the turtle in PC259? I Hope you understand my question :) Thanks in advice, Simon PS: sorry for my bad englisch, im not a native speaker
  13. Simon

    Steal Passwords from network

    Hello, We all know thats is easily possible to steal login datas from logged PC`s using the Lan Turtle. But whould this work also in a network? So i connect the Lan turtle with a Lancable to the network and not directly to a PC? I hope you can answer my question :) Thanks in advice, Simon Sorry for my bad englisch :/
  14. First let me say when using my Nano via the App on my phone, the networking functions correctly. When using it on my Windows 7 laptop however, I get no connectivity to the network. Bulletins will not load ( Error connecting to WiFiPineapple.com. Please check your connection. ) nor will the module list populate. My home network does not use a standard ip pool, that is to say, not 192.168.x.x - rather I use a 10.77.x.x. IMHO this is where the problem lies. Windows objects strongly to the settings recommended by the forums and video 'Setup Guide For Windows" https://www.wifipineapple.com/pages/setup. because "Warning - The default gateway is not on the same network segment (subnet) that is defined by the IP address and subnet mask. do you wish to save this configuration?" If I click [Yes] nothing changes. My IPCONFIG is : Ethernet adapter Pineapple Nano: Connection-specific DNS Suffix . : Link-local IPv6 Address . . . . . : xxx::xxx:xxx:xxx:xxx%xx IPv4 Address. . . . . . . . . . . : Subnet Mask . . . . . . . . . . . : Default Gateway . . . . . . . . . : 10.77.x.1 Connection-specific DNS Suffix . : Link-local IPv6 Address . . . . . : xxx::xxx:xxx:xxx:xxx%xx IPv4 Address. . . . . . . . . . . : 10.77.x.49 Subnet Mask . . . . . . . . . . . : Default Gateway . . . . . . . . . : 10.77.x.1 Is there any way to work on this network or is the Nano slave to a 192.168.x.x schema? thanks!!!
  15. Hello! I have issue - I need to connect to wpa2 secured network automatically on nano boot, I would like to use bash script for this task, so I could extend script to some additional features. Could anyone give a hint to solve these tasks: 1 - which config file to edit (or better if can I use my own config file where I will put SSID, password and other necessary parameters) 2 - what command I need to run to connect to configured network) 3 - how to check if connection succeeded ( script need to check if IP was obtained via dhclient) Many thanks! (P.S. just in case if anyone is interested what I'm trying to do: I have a big password list for some particular wifi network and I need to find out which one is correct) King regards, imitm