Jump to content

Search the Community

Showing results for tags 'remote access'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 7 results

  1. Windows Persistent Reverse Shell for Bash Bunny Author: 0dyss3us (KeenanV) Version: 1.0 Description Opens a persistent reverse shell through NetCat on victim's Windows machine and connects it back to host attacker. Targets Windows 10 (working on support for older versions) Connection can be closed and reconnected at any time Deploys in roughly 15-20 sec Works with NetCat Requirements Have a working Bash Bunny :) STATUS LED STATUS Purple Setup Amber (Single Blink) Installing and running scripts Green Finished Installation and Execution Plug in Bash Bunny in arming mode Move files from WindowsPersistentReverseShell to either switch folder Edit the persistence.vbs file and replace ATTACKER_IP with attacker's IP and PORT with whichever port you like to use (I use 1337 ?) Save the persistence.vbs file Unplug Bash Bunny and switch it to the position the payload is loaded on Plug the Bash Bunny into your victim's Windows machine and wait until the final light turns green (about 15-20 sec) Unplug the Bash Bunny and go to attacker's machine Listen on the port you chose in the persistence.vbs file on NetCat Run the command nc -nlvp 1337 (replace the port with the port in persistence.vbs) If using Windows as the attacker machine, you must install Ncat from: http://nmap.org/dist/ncat-portable-5.59BETA1.zip and use the command ncat instead of nc from the directory that you installed ncat.exe. Wait for connection (Should take no longer than 1 minute as the powershell command runs every minute) Once a Windows cmd prompt appears...YOU'RE DONE!! ? and you can disconnect and reconnect at any time as long as the user is logged in Download Click here to download
  2. Ok. So I have turned on remote router access to my own ISP-provided router at home (NowTV/sky router), where I have 2 laptops connected by WiFi, with a desktop on the ethernet. I have removed the firewall and lowered protection so I can have easier access. I have also turned on some services, namely FTP, IMAP, POP3, SSH, HTTP and some others - as advised by someone....not sure exactly why... What I now want to do is 'experiment' with what I can do from another location with remote access. For example - if I wanted to see the file systems on any pc/laptop - how would I go about it? Do I need to do an exploit or can I use SSH? How do I go about using FTP etc? These are just a couple of queations of many I can think, but it's somewhere to start. I'm still slightly confused about using the router and DCHP...I understand that the devices attached are given an internal IP (192.168.0.**) but I'm not sure how use access these IP's correctly from outside the LAN. How do I 'login' so to speak from a remote PC to my router and pivot to the desktop (if that's the right terminology)? As you can tell I'm quite new to this. So you know, I'm using Mint as my OS after ditching Windows, and also have Kali installed on a VM. I don't want step-by-step solutions - I fully understand the key to learning is to actually do things for myself, I just need a liitle guidance on where to go from now and what to do next (SSH, FTP etc). Can anyone help point me in the right direction?
  3. So after having a laptop stolen, and finding really no help to recover it, I had to come up with an idea of my own, or maybe it exists, and I don't know. I want to exploit my own laptop by soldering a USB to the motherboard. This USB, once the computer is turned on and logged into, and detects a network, will do one, or all of three things: 1) Will drop a specific remote access file matching one that is pre-saved in a cloud server, allowing the original owner to remotely access their stolen computer. This file will be dropped every single time on startup, and if the file already exists, will write over the existing one, instead of dropping a new one. 2) Email the owner the IP address of the computer when internet is detected. 3) Email the owner GPS coordinates if available. This would be extremely discreet, and, except the motherboard in which it's soldered to, even if the hard drive was swapped out, or the BIOS or OS was wiped and reinstalled, the drive itself would be present, and persistent, allowing the device to be recovered, remotely wiped, etc. at any given time. An added Idea I was given, was to have this soldered USB contain personal information, and proof of purchase, so the rightful owner can't be contested. Would anyone want to help make this possible? I feel I'm in the right place for this, and I also feel that this would be a product that a LOT of people would really want.
  4. Reverse Shell Mac for Bash Bunny Author: 0dyss3us (KeenanV) Version: 1.0 Description Opens a persistent reverse shell on victim's mac and connects it back to host attacker over TCP. Targets MacOS (OSX may work but has not been tested) Connection can be closed and reconnected at any time Deploys in roughly 30 sec (working on making it faster) Works well with NetCat as the listener Requirements Have a working Bash Bunny :) and a victim with MacOS STATUS LED STATUS Purple Setup Amber (Single Blink) Installing connect.sh script Amber (Double Blink) Creating cron job White (Fast Blink) Cleaning up Green Finished Installation and Execution Plug in Bash Bunny in arming mode Move files from MacPersistentReverseShell to either switch folder Edit the connect.sh file and replace the placeholder IP with attacker's IP and the port with whichever port you like to use (I use 1337 ?) Save the connect.sh file Unplug Bash Bunny and switch it to the position the payload is loaded on Plug the Bash Bunny into your victim's Mac and wait until the final light turns green (about 30 sec) Unplug the Bash Bunny and go to attacker's machine Listen on the port you chose in the connect.sh file on whichever program you'd like (I use NetCat) If using NetCat, run the command nc -nlvp 1337 (replace the port with the port in connect.sh) Wait for connection (Should take no longer than 1 minute as the cron job runs every minute) Once a bash shell prompt appears...YOU'RE DONE!! ? and you can disconnect and reconnect at any time as long as the user is logged in Download Click here to download.
  5. So im stuck over here in aus on nbn (good) but with telstra the isp (bad), they dont assign public ip's unless you agree to pay them another 20$ a month.... Is there a way for me to get remote access into my network without using a public ip and it has to be simple as im looking at some major project across all platforms?
  6. My Pineapple Mk V is tethered to my rooted Galaxy S3's WiFi hotspot. I'd like to access the Pineapple's web UI from outside of the LAN (I'll settle for SSH). I've tried port forwarder and some server setups but have not been successful. Port scan shows the ports are closed. Has anyone been successful in opening up ports on their Android and connecting to their tethered Pineapple?
×
×
  • Create New...