SoI am not sure if I am being dumb here but I am looking to get a
O.MG cable and have my eyes on the directional C to C but the wording explaining it is somewhat ambigous to me and I want to be sure before I maybe make an expensive mistake.
It says:
"Directional C to C: unique cable designed for demos & training. Changes behaviour depending on what direction you connect it. The active end is marked with a discreet logo: Connected to a USB host and it behaves like a normal cable, or connect just the active end to a compatible mobile device for mobile payload capabilities"
I cannot work out whether it is saying:
* one side is active and the other is passthrough
* Or when it says or "connect just the active end to a compatible mobile device for mobile payload capabilities" it will only do payloads if the other end is not connected to anything, ie. it would not do payloads if connected to a charger on the non-payload end.
It is the "connect just the active end" that is confusing me.
Can anyone answer this.
What I am trying to clarify is the wording of "unique cable designed for demos & training" where you "connect just the active end to a compatible mobile device for mobile payload capabilities" (note the emphasis on just that is the confusing part). This sounds to me like it could have a feature designed for use in training where it does not trigger the active end when the passthrough end is plugged or it kills execution in the active end when the passthrough end is plugged because it only does payloads when just the active end is plugged in and I am trying to understand if this is the case or just the wording.
The logo-end is the "sharp" end, the other it the dull blade, and does nothing, so you're always sure what you do, depending on what end you plug in, it's pretty simple ?
Same for A-->C, the sharp end is the A-USB ?
since the launch of Pwnie Express many moons ago, and then the introduction of Kali Nethunter, is it really worth the trouble to go through the entire setup process of Pwnie or should we just use Nethunter?
Pwnie Express provides full threat detection of every wireless and wired device in and around your workplace. We are the only company that detects rogue, misconfigured, and unauthorized devices across wired and wireless spectrums.
Kali NetHunter is an Android ROM overlay that includes a mobile penetration testing platform. ... The overlay includes a custom kernel, a Kali Linux chroot, and an accompanying Android application, which allows for easier interaction with various security tools and attacks.
thats what they do now hes talking of the pwnphone. i actually just dug up. itd no contest nethunter is way better pwn's apps are 5 years old and thats it for software 16 apps that open coresponding cli. nethunter u han have the whole kali repo. oh and a hourse on brown backgroung or dragon on blue. with killer boot img
But one thing,i never understood why having 200+ pentest tools (and many are useless) when a lot of us use only maximum 15 tools,i prefer a "classic" linux distribution and to install only tools i need,just my 2 cents...
Save your time effort and money..........a friend of mine paid for the training and it never arrived.......lots of 'Wait a short while' messages........finally they got the money back. Nothing but agro..........AVOID............you don't need it, you really don't.........Hope this helps.......?
Having used both, examined the literature from both, I would disagree that Andrax is better than Kali (PLEASE NOTE THAT I AM NOT SUGGESTING THAT YOU AGREE OR DISAGREE), but, it depends on your preference. However, let me know if you decide to buy the training for Andrax, just so I can canvass your views.
In many cases as you know it must be done in a very short time..then it could be Andrax,Nethunter,or any pentest mobile OS based on android,what are the common point of all these pentest tools,you need to burn through a terminal right?
Plus working with an android phone with a pentest OS is criminally insecure bro,many security holes,if i remember ssh port is open by default on Nethunter,and many other troubles since your phone must be rooted...
I genuinely like the concepts that you put forward and I too can see the advantages and disadvantages ?. So, what I did (as I have sausage fingers) I purchased a bluetooth keyboard from Rii and hey presto no need to touch the screen on the Nexus, which saves the whole screen and keeps it open and fully deployable.
I just picked up a Nexus 7 Mr Robot Kali Linux Nethunter Wifi Hacking Security Penetration Tablet. Anybody have any experience using these? Half way decent device for a n00b just getting started and using it on a range for a school project?
I did a little bit of security and hacking training for my colleagues just before Christmas. The aim was to explain why we have certain (sometimes unpopular) restrictions in place on the network, and at the same time, to show where we still need to put the work in.
Or you can use it to get passwords from the PC. Connect the Bash Bunny to your PC and connect it as a USB drive and keyboard. Through the keyboard, you type a command to run a program located on your USB drive. This program will download passwords (from the Windows credential manager to all saved Wifi networks, passwords and history from web browsers, passwords and the KeePass password manager database if it is running) and store it on a USB drive. It is all done within 40 seconds, Bash Bunny can be ejected from your PC and one can leave. (built on Lazagne and payload library/credentials/PasswordGrabber)
This is how I would just insert a Bash Bunny into their PC, which looks like a regular USB drive and disconnect it again in 30 seconds. I would then show them that in those 30 seconds I got their passwords/data / or remote access to their computer (keylogger, screen screenshots, access to data, webcam access).
Hak5 is a paid app for Android published in the Other list of apps, part of Education.
The company that develops Hak5 is Revision3. The latest version released by its developer is 1.1.1. This app was rated by 7 users of our site and has an average rating of 4.1.
To install Hak5 on your Android device, just click the green Continue To App button above to start the installation process. The app is listed on our website since 2011-10-17 and was downloaded 285 times. We have already checked if the download link is safe, however for your own protection we recommend that you scan the downloaded app with your antivirus. Your antivirus may detect the Hak5 as malware as malware if the download link to com.revision3.android.show.hak5 is broken.
How to install Hak5 on your Android device:Click on the Continue To App button on our website. This will redirect you to Google Play.Once the Hak5 is shown in the Google Play listing of your Android device, you can start its download and installation. Tap on the Install button located below the search bar and to the right of the app icon.A pop-up window with the permissions required by Hak5 will be shown. Click on Accept to continue the process.Hak5 will be downloaded onto your device, displaying a progress. Once the download completes, the installation will start and you'll get a notification after the installation is finished.
I am currently the #1 ranked payload contributor on hak5. With this I often have people asking me how they can get started making their own payloads. In response to that I have made this 20+ video series on different powershell functions I have written to build my payloads with. Functions ranging from changing your targets wallpaper, hiding text in an image, uploading exfiltrated data up to Dropbox, and even bypassing the UAC prompt to open an admin level powershell console to gain extra functionality.
3a8082e126