Jump to content

Search the Community

Showing results for tags 'penetration testing'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 11 results

  1. I have a keylogger set to email logs to me on a USB drive, and a BadUSB that can run it on my home computer by navigating to the directory and opening it. However, because drive letters change from computer to computer, is there a way to make the script consistent? The drive letter on my computer is V, but obviously on other computers it could be anything. The BadUSB script opens the file through explorer by typing the drive letter, and I would like it to work on any computer, and not require admin access.
  2. Hi, im new to this forum and i have a question related to wireless penetration testing. I have a Alfa AWUS036NH Card and amped it to 33dBm and a Yagi-uno antenna with 25dBi of gain.. If i'm correct the EIRP calculation should result in 58 Watts / EIRP. So my question is how far would i get with this setup and another thing i live in a place where surrounded with a lot of houses does that mean that the walls, roofs etc block the signal and decrease the signal so i get less further than when (i.e on top of a building.)
  3. Hey, I'm signed up for the 30 day OSCP course to start in about a month and have a few questions, I understand everyone is supposed to keep quiet about the exam so if this is breaking the rules please let me know. So in the exam I've heard you have 5 machines on the network you have to get root on, are they all in the same IP range for example 192.168.0.1 -> 192.168.0.255 or is it more complicated than that? I'm guessing at the start they won't tell you what the IP addresses are as well? Also are there more machines on the network you aren't supposed to target to make things trickier?
  4. Hi all, i'm undertaking a project to determine which vulnerability scanning tools within Kali Linux are best suited for the job, there were three tools tested and these were, Nikto, Sparta and OpenVAS. The results that these scans returned when scanning metasploitable 2 with a Kali linux machine are as follows: Metasploitable 2 Nikto 15 Sparta 46 OpenVAS 144 These results are solely the number of vulnerabilities that were returned, OpenVAS seems to be the right cho
  5. Hi all i'm currently undertaking a project that involves exploiting a metapsloitable 2 machine and a windows XP machine running SP3, however the findings that i have found are that there are limited resources available when using metapsloit as there seems to be many step by step guides of how to complete an exploit but not enough information regarding troubleshooting. Do you think it would be beneficial to learning to explain more about each step of an exploit in terms of what each command does and if an exploit fails for there to be more information available about why it fails and worka
  6. Anyone interested in playing capture the flag? I've started a small group. We have VM hosting being set up over the next couple of days. Mostly just for fun. Probably prizes in the future. Contact me directly if you are interested.
  7. Hi there, I've got a question. During a professional penetration test with a team of penetration testers for a client, what is an effective way to store raw data during and after the tests? With this question I am looking for a data storage (directory and files) structure. The goal of this structure is to make a general overview for al penetration testers. As example, when I performed a penetration test in the past and store my raw data (output tools, phases of testing, logging, etc) in an encrypted environment, and a colleague needs to perform another test for the same client, what is a fast
  8. Hello hackers, coders and imagineers, I don't know if the Rubber Ducky is looking for an upgrade anytime soon, but if so I have a few ideas based on a recent project of mine, which uses the Teensy 3.1. Firstly, the one way nature of the device makes it difficult to acquire information from the host system. I see you have solved this by suggesting that a USB drive is used in parallel with the Rubber Ducky. Whilst this is a solution, it would be nice if the device could imitate a hub and provide the functionality of both the Rubber Ducky and a USB drive. Though, this will increase th
  9. I want to learn more about hacking. I have heard about free hacker spaces. But whenever I look those up on Google I find a nice long list of broken links. Are there still any legal hacker spaces open?
  10. Hello guys. It's my first post here, so sorry if I'm breaking a rule somehow but, I need some help. Every time I try to run apt-get update I get an error message basicly saying that I can't connect to the repos - being timed out every time, not even getting a response. I need someone else to please run apt-get update (in backtrack 5) and tell me if you get any error msgs. Since I made no changes to the sources.list file I do not see how I could have accidently changed my repos list.
  11. So I received a message from one of our fellow members on the forums. Maybe this should be stickied, maybe just moved to another thread, but the answer I gave applies to pretty much everyones questions in how to get started in hacking. DigiNinja did a whole questionnaire as well as a few talks on the same subject answering much of the same things, so I would suggest anyone having similar questions, go seek out his talk on YouTUBE. I'd post the links but I don't have them handy. They may even be on his site. Below was the question posted to me though, and my answer, and I hope it helps anyone l
×
×
  • Create New...