Audrick Posted August 23, 2019 Posted August 23, 2019 Okay I know you didn't ask and maybe I am the only old person that will be get the joke but shouldn't the device be called Lan Shark.
INFOTRACE Posted August 25, 2019 Posted August 25, 2019 On 8/21/2019 at 1:57 AM, Jtyle6 said: The documentation page is now available. Thanks for sharing the link buddy.............it really is a simple device, which looks like it will work well in office environments........I will have to get a couple.......cheers again for sharing: Shark Jack A portable network attack and automation tool for pentesters and systems administrators designed to enable social engineering engagements and opportunistic wired network auditing. Getting Started Shark Jack Basics Default Settings Directory Structure LED Status Indications Product Information Specifications Important Safety Information and Warnings Payload Development Payload Development Basics LED SWITCH BATTERY
74rku5 Posted August 26, 2019 Posted August 26, 2019 At the booth in DC, I was told it would come preconfigured with nmap, but that doesn't seem to be the case.
74rku5 Posted August 26, 2019 Posted August 26, 2019 I correct myself. It is so armed. But the arming/attack switch doesn't seem to make a difference. I plugged it in to check, and it performed a scan, I was in arming mode.
oscaringosv Posted September 11, 2019 Posted September 11, 2019 You will see the scan results only if you use it in attack mode just confirmed.
Unauthed Posted September 14, 2019 Posted September 14, 2019 Nice one hak5 team!! Two questions... 1) what is the internal storage and 2) can you connect a usbc flash drive into the charging port for additional storage? The use case I am thinking is capturing and storing creds with responder.
Darren Kitchen Posted September 21, 2019 Author Posted September 21, 2019 There's ~23 MB free on the root file system and another ~30 MB available in /tmp Cocktail napkin math says with 14 byte hashes you're looking at being able to store some 1.6 million creds, give or take... And of course there's always C2CONNECT && C2EXFIL /tmp/logfile # :)
p4th0gen Posted October 7, 2019 Posted October 7, 2019 I never knew this thing existed ... Did you ever do a demo on the channel ? I love cheap but effective pocket sized gadgets , plus it doesn't look malicious at all .. Looks like something every IT guy might have on his keychain. I noticed a lot of things on sale in the hakshop , probably going to capitalize on that😎
dustbyter Posted October 11, 2019 Posted October 11, 2019 This is an interesting idea. Not sure on the extensibility of it through scripting. I guess I don't see the purpose of this device with its limited space. How has anyone used this so far other than running nmap really easy.
Scriptmonkey_ Posted October 12, 2019 Posted October 12, 2019 19 hours ago, dustbyter said: This is an interesting idea. Not sure on the extensibility of it through scripting. I guess I don't see the purpose of this device with its limited space. How has anyone used this so far other than running nmap really easy. I have a few ideas in mind for it, beyond just "quick!!!! make the SOC go red!" Hoping to get one progressed today and will submit it to the github payloads when it's ready for sharing. Also, for a device that can quickly check if there is a sterile area in the visitor areas of buildings when on an Phys SE job, this tool is pretty damn discrete. Certainly more so than "hey can I just er do some work! thannnnkkkss!" and whipping out a laptop with an ethernet cable.
Recommended Posts
Archived
This topic is now archived and is closed to further replies.