Difference between revisions of "Hak5 Shark Jack"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 16: Line 16:
# Change mode to arming.
# Change mode to arming.
# Plug the Shark Jack into one of the LAN ports of your computer.
# Plug the Shark Jack into one of the LAN ports of your computer.
# Your PC will get an IP-address in rang 172.16.24.0/24.
# Your PC will get an IP-address in range 172.16.24.0/24.
# Connect via SSH to 172.16.24.1.
# Connect via SSH to 172.16.24.1.
# You are now connected to the Shark Jack.
# You are now connected to the Shark Jack.

Revision as of 11:25, 19 December 2021

Summary

Shark Jack

The Shark Jack is a penetration tool for penetration testers and system administrators looking like a simple USB-Stick. It consists of three main components: a LAN-Port for configuration and executing pentests (which also uses a RGB-LED for visual responses), a USB-C port for charging and a slider to change modes. It provides possibilities to perform network audits and information gathering attacks. These functions are provided by the packages which are installed on the Shark Jack. The packages are provided by the OpenWRT platform, which means that users can add other packages than the preinstalled ones.

Description

Modes

  • OFF (Slider is in position nearest to USB-C) - charging
  • Arming (Slider is in middle position) - configurating
  • Attack (Slider is in position nearest to LAN) - pentesting

Setting up the Shark Jack

  1. Change mode to arming.
  2. Plug the Shark Jack into one of the LAN ports of your computer.
  3. Your PC will get an IP-address in range 172.16.24.0/24.
  4. Connect via SSH to 172.16.24.1.
  5. You are now connected to the Shark Jack.

Installing/updating packages

  1. Connect to your Shark Jack
  2. Enter the command NETMODE DHCP_CLIENT
  3. The Shark Jack will now act as a normal client waiting for an IP-address from an DHCP-Server.
  4. Connect the Shark Jack to your router.
  5. Gather the IP-addres of the Shark Jack (Web interface of the router or form the DCHCP-Server).
  6. Connect via SSH to the new IP addres (e.g., 192.168.0.153).
  7. Use opkg upgrade [package] for updating packages or opkg install[package] for installing new packages.

Examples

nmap

ipinfo

netdiscover

References