Difference between revisions of "Hak5 Shark Jack"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 19: Line 19:
# Connect via SSH to 172.16.24.1.
# Connect via SSH to 172.16.24.1.
# You are now connected to the Shark Jack.
# You are now connected to the Shark Jack.
=== Installing/updating packages ===
# Connect to your Shark Jack [[]]


== Use Cases==
== Use Cases==

Revision as of 11:14, 19 December 2021

Summary

Shark Jack

The Shark Jack is a penetration tool for penetration testers and system administrators looking like a simple USB-Stick. It consists of three main components: a LAN-Port for configuration and executing pentests (which also uses a RGB-LED for visual responses), a USB-C port for charging and a slider to change modes. It provides possibilities to perform network audits and information gathering attacks. These functions are provided by the packages which are installed on the Shark Jack. The packages are provided by the OpenWRT platform, which means that users can add other packages than the preinstalled ones.

Description

Modes

  • OFF (Slider is in position nearest to USB-C) - charging
  • Arming (Slider is in middle position) - configurating
  • Attack (Slider is in position nearest to LAN) - pentesting

Setting up the Shark Jack

  1. Change mode to arming.
  2. Plug the Shark Jack into one of the LAN ports of your computer.
  3. Your PC will get an IP-address in rang 172.16.24.0/24.
  4. Connect via SSH to 172.16.24.1.
  5. You are now connected to the Shark Jack.

Installing/updating packages

  1. Connect to your Shark Jack [[]]

Use Cases

References