Jump to content

Search the Community

Showing results for tags 'tunnel'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 10 results

  1. Hi, I have a computer that establishes a point to point vpn tunnel through global protect. I was curious if the lan turtle has capabilities to address, resolve, and access this host while it is connected to that tunnel assuming that the turtle is connected directly to the host? Sort of like out-of-band support. Or do I have to reverse tunnel back to my local lan back through the vpn gateway?
  2. Hi, I am a mark V owner thinking of purchasing a TETRA. If I were to use it as a normal router with an OpenVPN tunnel (i.e. TETRA is the client) what kind of speeds can I expect to get? It seems most routers max out at ~ 20Mb/s. Am I correct in assuming TETRA will not be able to handle a 100Mb/s connection ?
  3. Hey Darren and Seb, Before DEFCON (22), I thought Darren indicated he was working on an OpenVPN infusion. (Did that get lost?) I'd love this, as well as some SSH infusion enhancements. Is there any movement on this? Thanks. Ugh, I gave it the wrong title.
  4. New here, I just got my Mark V, and discovered I understood the AutoSSH thing wrong. The purpose of buying the Wifi Pineapple was actually the opposite of its existence. I want to use it to create a private network wherever I am, and let the box connect to a public AP or mobile phone, while tunneling all traffic through an SSH (or VPN) tunnel to my home server, so the AP only sees one outgoing SSH. And so I discovered that this isn't provided out of the box and I couldn't find any topic on it. Given a few pointers I probably might come up with an infusion that adds this cool feature to the set. My first idea was a socks proxy as I sometimes use on a computer, but ideal would be to tunnel everything (DNS and all). So, pointers and comments welcome ;) Peter
  5. I'm trying to set up a VPN tunnel for all traffic connected to the Pineapple in client mode, with the tunnel endpoint being my Ubuntu VPS out in the cloud. The goal here is to provide internet access to all clients connected to the Pineapple, while enabling more powerful MitM attacks like Metasploit using my VPS. I've installed OpenVPN on both my server and Pineapple and set up their respective keys, but I am at a loss now as to the proper configuration. Tun? Tap? Br0? lo? Should I be using tap0 or tun0 for each side of the tunnel? (And how does it hook into the pineapple's traffic?) Could someone kindly sketch out the ideal configs for this kind of setup? In an earlier post, Sebkinne referred a user to this "howto", which specifies the client [=pineapple] as tap0. Forgive my ignorance, but don't you want to make the OpenVPN client side [=pineapple] "tun0" and the OpenVPN tunnel's endpoint on the ubuntu server "tap0"? (Which in turn redirects internet traffic to its internet-facing eth0 interface?) I'm lost. In advance, thank very much for any help you can offer.
  6. So after a week of everything I could possibly try I've come to the forums to discuss my Autossh Relay connection problem. I'm trying to reproduce Daren's relay server and Chriswat's tutorial and manage the gui remotely. Contents: MkV Virtual Ubuntu Server LTS 12.04 External Box Ubuntu Server LTS 12.04 Windows Putty Ubuntu 13.10 Virtual Phone Hotspot for External IP for MkV Ports: VM Ubuntu Server -p 7000 External Box Ubuntu Server -p 50456 MkV 1471:localhost:1471 First I have a Ubuntu Server 12.04 LTS box setup at work as a file server but it also has openssh-server installed. Then I setup port forwarding on the router and modem for 50456 to internal 22. I've tested this from hom and I can ssh just fine. I generated my public key for my MkV through putty and then ssh through the external IP to the port 50456 and it is now connected. root@Pineapple:~# ssh -p 50456 root@externalip I copied the pinapple public key to the authorized_keys for the server. I added the "AllowTcpForwarding yes" and "GatewayPorts yes" lines to the sshd_config, "service ssh restart". Then I logout. I do "ssh -p 50456 root@externalip -i /etc/dropbear/id_rsa" but for some reason I still have to enter the password. I don't know if I have to install dropbear on this particular server. But then I move on to installing my virtual ubuntu server. I do all the previous steps but this time I use 7000 as the forwarding external port and port 22 as the internal. I also have a ddns provided by asus as I have the Asus N66U router. "ssh -p 7000 root@externalip -i /etc/dropbear/id_rsa" This time I did not need to enter the password and now have an ssh connection from my pineapple to the server. I exit the ssh session. I then go to my web gui on the MkV then to the AutoSSH config and put in Host: root@externalip(VM) (I've also tried adding -p 7000) Port: 4567 Listen Port: 1471 I exit the configuration page and click connect for AutoSSH. Then I setup my phone for Mobile Hotspot and connect my MkV in client mode to my phone. I disconnect my ethernet cable connected to the MkV. I wait a few minutes for my pineapple to make a connection via AutoSSH. Next I power up my ubuntu 13.10 VM and make an SSH connection to my relay server "ssh -p 7000 root@externalip". I pull up a browser and type in externalip:4567. This does not work so I then try externalip:1471. This still doesn't work. I've tried to nail this down to a science before I posted on the forums about this. Please help. Thanks.
  7. Hey Guys, Need a little help understanding ssh proxy forwarding, otherwise known as ssh pivoting. I Have read a few tutorials that were very vague, seen a few videos from Hak5, but It still hasn't hit home yet. Here's my lab setup; I have a few static IP's. I am testing a real world scenario using a remote ssh box to pivot and scan the remote internal network. I am also using Metasploit. Remote network: 75.xxx.xxx.x96 My local Public IP: 75.xxx.xxx.x98 .x96 is behind a pfsense firewall I have setup. Port 22 is fowarded to a Metaspolitable2 box I Have there, lan IP 192.168.2.2 (no worries, I have it setup to only accept connections from .x98 for security reasons) Also behind that pfsense firewall is a Proxmox VM server running various windows images on the same lan subnet as Metasploitable2. on .x98 I am running a standard nat router device, with my Kali linux VM on the DMZ. the local lan IP of the kali machine is 192.168.1.2 so in Kali, I do the following; ssh -D 127.0.0.1:8001 msfadmin@75.xxx.xxx.x96 - This should setup my ssh proxy to msfadmin on x.96 I added in socks4 127.0.0.1 8001 in proxychains.conf I have confirmed this works by doing: proxychains nmap -sT -Pn 192.168.2.4 (the winxp box on .x96 with lan IP 192.168.2.4) and this works, nmap returns results. One of the windows boxes on that remote lan is 192.168.2.4 and it's Vulnerable to the ms08_067 netapi exploit. I can confirm this in msfconsole after I setg Proxies socks4:127.0.0.1:8001 and run the check command against 192.168.2.4 - returns Host is vulnerable. However, when I fire the exploit in question, it almost seems like nothing is returning. Say I setup the exploit and payload with bind_tcp to use port 4444. Since I have the Kali linux box on the dmz, no NAT port forwarding should need to happen, right? I would assume, since my above examples of nmap and check in msfconsole return results for the remote lan IP of 192.168.2.4 that the tunnel is working bi-directional, but still why isn't anything returning? The exploit identifies the machine as windows xp pro, etc, but still my payload never gets sent to that machine. I'm probably missing something, so I am asking you guys for some guidance. Thanks in advance!
  8. Good day to everyone As the subject states, I have a general question regarding proxychains. I've watched the hak5 episode on it (ep 11.19) but I'm curious as to how you guys (fellow white/grey hats) get access to the various ssh servers that you're then chaining together. Do any of you use any so-called "Free Shells"? I've checked out a couple of the free shell providers, but they mostly seem to be crap (fill out these polls, sign up for these 15 credit cards, give us your email to spam, etc). My goal for this is mostly just to play with/test proxychains, i.e. how usable is it, get comfortable with the configuration, etc. Anyone have any insight into how I can experiment with globetrotting ssh tunnels? Thanks! telot
  9. Guess who again? :) Here's what's up: Decided to play around with Ozyman. *DUNN Dunn dunnn...* So I'm running Kali Linux on both server (Virtualized on Mac OS X) and on a Netbook (who owns a netbook anymore, common!?) I have my domain set up appropriately (I think so) VIA freedns.alfred and uni.me , it accepted the appropriate namespaces and what not as demonstrated in the original episode with Mubix. On my Virtualized server: In Kali, I have ozyman on the Desktop, so my total bash line looks like this: root@kali~/Desktop/ozyman# ./nomde.pl -i 0.0.0.0 url.uni.me (Obviously it's not really "url.uni.me" :D ) and kicks back : Creating TCP socket 0.0.0.0#53 - done. repeats for UDP* waiting for connections.. Great! now on my client Kali box: ssh -D 8080 -C -o ProxyCommand="/root/ozyman/droute.pl sshdns.url.uni.me" root@url.uni.me *Enter ..... Nothing. Not even a return. It acts like it just hangs. Any ideas? I'm trying this off an isolated network from the server.
  10. I am using BT5 R3 on a laptop. My router is a wrt54g with dd-wrt v24. Is there anyway I can link wlan0 or mon0 directly to the router either wired or hopefully wirelessly. So when I run airodump-ng mon0 it will be using the routers antenna? I have been looking into airtun-ng but no luck so far.
×
×
  • Create New...