Jump to content

Search the Community

Showing results for tags 'virtualbox'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • New USB Rubber Ducky
    • WiFi Pineapple
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
    • WiFi Coconut
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • Legacy Devices
    • Classic USB Rubber Ducky
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Enter a five letter word.

Found 11 results

  1. Hi all, I'm quite new to wireless sniffing. I just received a wireless adapter (Atheros AR9271 2.4 Ghz USB WiFi Wireless Adapter) and want to try man-in-the-middle type attacks at home, using kali Linux in VirtualBox on my Mac. I've set the USB ports to be accessible from the VM, and then used the adapter to connect to my wifi from the kali VM. I've set packet forwarding using echo 1 >> /proc/sys/net/ipv4/ip_forward. Then, I'm launching the two arpspoof commands from two terminal windows: "arpspoof -i wlan0 -t" and "arpspoof -i wlan0 -t", knowing that these are respectively my router's and my phone's local IPs. The commands seem to run properly (I'm having an output that look similar to the ones on any tutorial on arpspoofing on both terminals). But when trying to navigate the web from my phone, some pages load (Facebook, Google), but most don't (BBC or Amazon for instance). In any case, nothing appears when I trying to use "urlsnarf -i wlan0" on a new terminal, nothing appears apart from: "urlsnarf: listening on wlan0 [tcp port 80 or port 8080 or port 3128] ". I'm using the latest version from Kali Linux (2019_3) and MacOS (Catalina). Would anyone have an idea of what I'm doing wrong? Could this be a hardware issue? Thank you very much for any help! Best, Paul
  2. I just received my Pineapple Nano and i'm having a lot of trouble getting it to connecting through to the internet. I have been able to get everything setup but the internet. Ive used the .wp6 and what not. I'm on a 2012 Macbook pro running Linux in VirtualBox. Does anyone have any experience with getting it connect properly?
  3. I am really really brand new in Linux. I recently set up a lab for pen testing, but stuck by a few networking issues. Host window10, guest Kali linux, eth0 and eth1(both are in same subnet, also same as host-only adapter ), use both host-only and bridged modes. there are several questions for help: 1. firstly I enabled host-only network mode in virtualbox for Kali. By using eth0, I can ping host-only adapter on host successfully, but cannot ping host ethernet adapter. I think that is how host-only mode works. then I enabled Bridged mode, I thought there should be a new ethernet interface showing up on host, however, it didn't(until now only two interfaces on adapter settings, one is host ethernet interface, the other is host-only) . my question is whether it is normal... 2. continued the above scenario...I assumed that is normal...then in bridge mode of virtualbox setting, I selected host ethernet adapter name from dropdown list as the one for bridge. Also configure eth0, eht1, host-only adapter and host ethernet adapter into the same subnet. When I bring eth1 down and bring eth0 up, from host terminal, I cannot ping ip for eth0, but from Kali terminal I can ping host machine and, cannot ping host-only adapter, cannot open up google.com in browser(it really confused me...); if I bring eth0 down and bring eth1 down, can only ping host-only adapter. so it appears that eth0 only works for Bridge and eth1 only works for host-only, is that right ? 3. I noticed some posts mentioning that there should be a bridged connection between host-only adapter and one local area connection(also an adapter, in my scenario, host ethernet adapter is supposed to take this role), but I don't think it is true. can you guys advise ? 4, sorry, my question or description of the question are a little mess...words in bold are questions. before entering the real pen testing, I already got so much confusion, thanks a loooooot !
  4. What recommendations would you make for a noobs pentest lab? i currently have virtualbox running Kali, metasploitable, couple of Linux distro’s all on a internal network(virtualbox). Is there a simple solution to virtualise embedded system e.g. the firmware from my router? i know there is this thing called google....but would like guidance from people who are knowledgeable in this area. Any advise will be gratefully received, including recommended reading. Im not asking anyone to do it for me, just guide me in the right direction please. This is purely a obsession/hobby for me.
  5. I am a newbie to security and have started my learning by downloading Metasploitable 3 and trying to get into it using Metasploit's "script_mvel_rce" module to exploit Elasticsearch 1.1.1 At my home the exploit works and I get meterpreter shell with the following (in first trial without any glitches): VirtualBox 5.1.14, Metasploitable 3, Kali 2016.1, No proxies However at work, we have a corporate proxy for internet access, Windows Firewall turned on (that I am not allowed to change) and Symantec AV. However, for host only networks, it should not be an issue (I guess) once the downloads are all done and setup is done. The setup at work is: VirtualBox 5.1.26, Metasploitable 3, Kali 2017.1 When I try to use the same exploit, the Meterpreter shell gets closed immediately. msf exploit(script_mvel_rce) > exploit [*] Started reverse TCP handler on [*] Trying to execute arbitrary Java... [*] Discovering remote OS... [+] Remote OS is 'Windows Server 2008 R2' [*] Discovering TEMP path [+] TEMP path identified: 'C:\Windows\TEMP\' [*] Sending stage (49645 bytes) to [*] Meterpreter session 1 opened ( -> at 2017-09-07 02:18:39 -0400 [*] - Meterpreter session 1 closed. Reason: Died ^C[!] This exploit may require manual cleanup of 'C:\Windows\TEMP\UBB.jar' on the target [*] Exploit completed, but no session was created. I tried all the following: (1) compared the metasploit module from home setup (on Kali 2016.1) to that at home (Kali 2017.1). apart from minor print format differences, the module seems similar (2) disabled firewall on metasploitable 3 (3) disabled host-only network adapter on my host pc (my work computer) (4) ping work fine (when firewall disabled) between Kali and MS3 and back (5) on metasploitable 3, I can see a java process running taking high cpu usage Can someone please suggest what should be my next step to succeed with this exploit? Thanks in advance FYI, I have posted same question on StackOverflow, but no one replied: https://security.stackexchange.com/questions/168867/cannot-exploit-elasticsearch-on-metasploitable3
  6. Hey i am new'ish to ctfs and have only done the a few on https://www.vulnhub.com , if anyone knows of a good one to do please leave a comment.
  7. i instaled virtualbox and i need to know how to put other ISO on my PC
  8. So last week I bought a DVD (from eBay), which was supposed to be or I had assumed to be a Mac OS X Yosemite installer. I wanted to use this DVD to install Mac OS X Yosemite into VirtualBox on my Windows 8.1 PC. Unfortunately, I was unable to do it, even after I tried to convert the DVD into an ISO, and also tried to convert the DVD into a USB "bootable" drive. Nothing worked. I even tried to install the DVD into VMWare, also with no success. If anyone has any suggestions or can offer help on this matter, it would be greatly appreciated. Thanks!
  9. Okay so i am going to get the MSI GT60 0NF-612US laptop an i wanted to know if i could run OSX in virtual box on it...... I am only asking because when i tried it on my dell inspiron 1545 it said that i had the wrong processor or something so idk if it would work in laptop im going to get or not.... Does any one actually know why it didnt work? And will it work with this processor? Windows 7 Professional/ Intel Core i7-3630QM Processor I really just want to have the best of both worlds mac when i need it and windows when i dont!!!! Any help would be apriciated! -Thanks
  10. Hello h5 comnity, I have several things in this situation and is a bit extensive and take serveral topics, I have a machine with this specs: Micro: Intel Core i7 930 OC 3.5gz MB: MSI X58pro E RAM: 24gb DDR3 1600mhz Drives: OCZ SSD 128gb for Main OS and adicional 3TB So here is the thing, I saw in a resent video to Mr.D auditing a wifi with cowpatty running 20k+ keys per seccond in a eee pc... well I runing a BT5r3 x64 as a guest in VB installed in Win8 x64 with all cores and 3d activated in the box but cowpatty is running only 1k of keys/secs.... And I wondering why is this? .... Other thing that I noticed is when the BT boot up my ALFA ans set [ifconfig wlan0 up] the card start to flicker like it has a lot of activity but does not... And the final issue I thinking in combine this items: ALFA AWUSO36H with Amped WA12, what do you think about this... Thanks any help with this
  11. There is an open ticket for a USB pass-through for the AWUS036NHA on Oracle's site. https://www.virtualbox.org/ticket/9511?cversion=0&cnum_hist=2 So if you are like Digininja and I, trying to pass through your AWUS036NHA to your linux guest, this is why it's not working.
  • Create New...