Darren Kitchen Posted August 20, 2019 Share Posted August 20, 2019 Quote Link to comment Share on other sites More sharing options...
Darren Kitchen Posted August 20, 2019 Author Share Posted August 20, 2019 Quote Link to comment Share on other sites More sharing options...
Irukandji Posted August 21, 2019 Share Posted August 21, 2019 The documentation page is now available. Quote Link to comment Share on other sites More sharing options...
Audrick Posted August 23, 2019 Share Posted August 23, 2019 Okay I know you didn't ask and maybe I am the only old person that will be get the joke but shouldn't the device be called Lan Shark. Quote Link to comment Share on other sites More sharing options...
INFOTRACE Posted August 25, 2019 Share Posted August 25, 2019 On 8/21/2019 at 1:57 AM, Jtyle6 said: The documentation page is now available. Thanks for sharing the link buddy.............it really is a simple device, which looks like it will work well in office environments........I will have to get a couple.......cheers again for sharing: Shark Jack A portable network attack and automation tool for pentesters and systems administrators designed to enable social engineering engagements and opportunistic wired network auditing. Getting Started Shark Jack Basics Default Settings Directory Structure LED Status Indications Product Information Specifications Important Safety Information and Warnings Payload Development Payload Development Basics LED SWITCH BATTERY Quote Link to comment Share on other sites More sharing options...
74rku5 Posted August 26, 2019 Share Posted August 26, 2019 At the booth in DC, I was told it would come preconfigured with nmap, but that doesn't seem to be the case. Quote Link to comment Share on other sites More sharing options...
74rku5 Posted August 26, 2019 Share Posted August 26, 2019 I correct myself. It is so armed. But the arming/attack switch doesn't seem to make a difference. I plugged it in to check, and it performed a scan, I was in arming mode. Quote Link to comment Share on other sites More sharing options...
oscaringosv Posted September 11, 2019 Share Posted September 11, 2019 You will see the scan results only if you use it in attack mode just confirmed. Quote Link to comment Share on other sites More sharing options...
Unauthed Posted September 14, 2019 Share Posted September 14, 2019 Nice one hak5 team!! Two questions... 1) what is the internal storage and 2) can you connect a usbc flash drive into the charging port for additional storage? The use case I am thinking is capturing and storing creds with responder. Quote Link to comment Share on other sites More sharing options...
Darren Kitchen Posted September 21, 2019 Author Share Posted September 21, 2019 There's ~23 MB free on the root file system and another ~30 MB available in /tmp Cocktail napkin math says with 14 byte hashes you're looking at being able to store some 1.6 million creds, give or take... And of course there's always C2CONNECT && C2EXFIL /tmp/logfile # :) 2 Quote Link to comment Share on other sites More sharing options...
p4th0gen Posted October 7, 2019 Share Posted October 7, 2019 I never knew this thing existed ... Did you ever do a demo on the channel ? I love cheap but effective pocket sized gadgets , plus it doesn't look malicious at all .. Looks like something every IT guy might have on his keychain. I noticed a lot of things on sale in the hakshop , probably going to capitalize on that😎 Quote Link to comment Share on other sites More sharing options...
dustbyter Posted October 11, 2019 Share Posted October 11, 2019 This is an interesting idea. Not sure on the extensibility of it through scripting. I guess I don't see the purpose of this device with its limited space. How has anyone used this so far other than running nmap really easy. Quote Link to comment Share on other sites More sharing options...
Scriptmonkey_ Posted October 12, 2019 Share Posted October 12, 2019 19 hours ago, dustbyter said: This is an interesting idea. Not sure on the extensibility of it through scripting. I guess I don't see the purpose of this device with its limited space. How has anyone used this so far other than running nmap really easy. I have a few ideas in mind for it, beyond just "quick!!!! make the SOC go red!" Hoping to get one progressed today and will submit it to the github payloads when it's ready for sharing. Also, for a device that can quickly check if there is a sterile area in the visitor areas of buildings when on an Phys SE job, this tool is pretty damn discrete. Certainly more so than "hey can I just er do some work! thannnnkkkss!" and whipping out a laptop with an ethernet cable. 1 Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.