Jump to content

Introducing the Shark Jack


Darren Kitchen

Recommended Posts

Posted

Okay I know you didn't ask and maybe I am the only old person that will be get the joke but shouldn't the device be called Lan Shark.

 

Posted
On 8/21/2019 at 1:57 AM, Jtyle6 said:

The documentation page is now available.

 

Thanks for sharing the link buddy.............it really is a simple device, which looks like it will work well in office environments........I will have to get a couple.......cheers again for sharing:

Shark Jack

A portable network attack and automation tool for pentesters and systems administrators designed to enable social engineering engagements and opportunistic wired network auditing.

 

 

Posted

I correct myself. It is so armed. But the arming/attack switch doesn't seem to make a difference. I plugged it in to check, and it performed a scan, I was in arming mode.

  • 3 weeks later...
Posted

Nice one hak5 team!!

Two questions... 1) what is the internal storage and 2) can you connect a usbc flash drive into the charging port for additional storage?

The use case I am thinking is capturing and storing creds with responder.

Posted

There's ~23 MB free on the root file system and another ~30 MB available in /tmp

Cocktail napkin math says with 14 byte hashes you're looking at being able to store some 1.6 million creds, give or take... 

And of course there's always C2CONNECT && C2EXFIL /tmp/logfile # :)

 

  • 3 weeks later...
Posted

I never knew this thing existed ... Did you ever do a demo on the channel ? I love cheap but effective pocket sized gadgets , plus it doesn't look malicious at all .. Looks like something every IT guy might have on his keychain.  I noticed a lot of things on sale in the hakshop , probably going to capitalize on that😎

Posted

This is an interesting idea. Not sure on the extensibility of it through scripting. 

I guess I don't see the purpose of this device with its limited space. How has anyone used this so far other than running nmap really easy.

Posted
19 hours ago, dustbyter said:

This is an interesting idea. Not sure on the extensibility of it through scripting. 

I guess I don't see the purpose of this device with its limited space. How has anyone used this so far other than running nmap really easy.

I have a few ideas in mind for it, beyond just "quick!!!! make the SOC go red!" Hoping to get one progressed today and will submit it to the github payloads when it's ready for sharing.

Also, for a device that can quickly check if there is a sterile area in the visitor areas of buildings when on an Phys SE job, this tool is pretty damn discrete. Certainly more so than "hey can I just er do some work! thannnnkkkss!" and whipping out a laptop with an ethernet cable.

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...