Jump to content

Search the Community

Showing results for tags 'working'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Hak5 Cloud C²
    • Plunder Bug
    • Bash Bunny
    • Signal Owl
    • USB Rubber Ducky
    • Packet Squirrel
    • LAN Turtle
    • Screen Crab
    • Shark Jack
    • Key Croc
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Enter a five letter word.

Found 2 results

  1. Hey guys? I have been trying the executable installer and usb exfiltrator for bash bunny but it's not working. The only payload that is working is the quickcreds payload. Is it because I installed the tools that the executable installer and usb exfiltrator are not working? I made sure that the "d.cmd", "e.cmd" and "i.vbs" files are in the ROOT of the the bashbunny and the "payload.txt" is in the "switch1" of the Bash Bunny. What is going on? Please help.
  2. Hi folks, I haven't bought this product yet, but i am really interested to buy it. But before actually buying it if some body can explain how it is helpful in wifi password cracking (specially WPA2)it would be great. In kali 2.0 with Alfa Wifi adapter: 1. Put alfa wifi adapter in monitor 2. start airmon-ng 3. capture packet of target 4. de-auth some client and capture the handshake when client connect to the AP 5. BF the captured handshacke with either aircrack-ng or hashcat (definately hashcat becuase with aircrack-ng you are not reaching anywhere.) becuase aircrack-ng is hell slow. BF is not useful at all these days, No-one is using those simple passwords at all and with minimum length of 8 characters for wifi even with hashcat (100,000 hashes per second) it need 22 days for a 8 character brute force. So the question is from above simple five steps in kali, how Nano is useful. At which step nano comes in and helps cracking WPA2 password. Thanks,
  • Create New...