Rednas Posted December 9, 2019 Share Posted December 9, 2019 Hi all, After receiving the Shark Jack last week I did the following with this easy to use tool. I gave one to our Front Office / Service Desk and let them probe ports in our organisation when they need to With this payload which I will post with my modifications soon they can see what IP it gets and which VLAN and so on. The trick I use, because email is not allowed by clients / firewall settings and so on is to report to a Telegram Bot which the guys from the IT have on there phones. So when they run the payload and get an valid IP, an http request is made with alle the scan details directly viewable in the Telegram app of there phones! No laptop booting, RJ45 plugs not working, carrying a laptop around and so on!. The other SJ I use for random port probing to test my own network and random outlets when I ran into one :P Link to comment Share on other sites More sharing options...
Darren Kitchen Posted December 13, 2019 Share Posted December 13, 2019 Awesome. Looking forward to seeing the payload in action 🙂 Link to comment Share on other sites More sharing options...
SKiZZ Posted February 16, 2020 Share Posted February 16, 2020 Has the payload been posted? Link to comment Share on other sites More sharing options...
Don Joe Posted June 16, 2020 Share Posted June 16, 2020 where's the payload ? Link to comment Share on other sites More sharing options...
Grid Posted September 20, 2020 Share Posted September 20, 2020 On 12/9/2019 at 10:37 PM, Rednas said: Hi all, After receiving the Shark Jack last week I did the following with this easy to use tool. I gave one to our Front Office / Service Desk and let them probe ports in our organisation when they need to With this payload which I will post with my modifications soon they can see what IP it gets and which VLAN and so on. The trick I use, because email is not allowed by clients / firewall settings and so on is to report to a Telegram Bot which the guys from the IT have on there phones. So when they run the payload and get an valid IP, an http request is made with alle the scan details directly viewable in the Telegram app of there phones! No laptop booting, RJ45 plugs not working, carrying a laptop around and so on!. The other SJ I use for random port probing to test my own network and random outlets when I ran into one 😛 Please explain to me step by step how I can set it up Link to comment Share on other sites More sharing options...
chrizree Posted September 20, 2020 Share Posted September 20, 2020 The original post is pretty much almost 1 year old and the user has just posted once, so I guess there will be less of a chance that the original poster will get back with the final solution. However, there is a fairly new post (linked below) involving Telegram. Perhaps not the exact use case scenario as described in this thread, but it can be used as a base to develop/reproduce the same functionality using Telegram and the Shark Jack. https://forums.hak5.org/topic/53042-telegram-bot-nmap-sharjack/ https://github.com/felinuxing/sharkjack-payloads/blob/master/payloads/library/recon/Telegram-Nmap-to-Telegram/payload.sh Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.