Difference between revisions of "Shark Jack network attack tool"
Stuffsyncbot (talk | contribs) (Automatic device update) |
m (Shark Jack Description) |
||
Line 1: | Line 1: | ||
{{Device|device_name=Shark Jack network attack tool|manufacturer=Hak5|link=https://lab401.com/products/shark-jack|image_link=https://stuff.elvis.science/uploads/models/assetmodel-image-8EubvbfP6k.png|description=Portable network attack tool, fast nmap scans.|technicalSpecification=https://docs.hak5.org/shark-jack/|supportedTechnologies=Ethernet, USB|includedEquipment=1x shark jack, 1x instruction card|elviscategory=Security/Crypto}} | {{Device|device_name=Shark Jack network attack tool|manufacturer=Hak5|link=https://lab401.com/products/shark-jack|image_link=https://stuff.elvis.science/uploads/models/assetmodel-image-8EubvbfP6k.png|description=Portable network attack tool, fast nmap scans. The Shark-Jack is a pen-testing utility developed by the ”Hak5” company and is designed for Ethernet plug and play vulnerability scanning in LANs. In its most basic form, it is essentially a small Linux-machine with a built-in Ethernet plug. The modest, portable physical nature of the device allows for quick and secretive reconnaissance activity. The Shark-Jack consists of following physical components: USB-C charging port, Battery, Status LED, RJ45 Ethernet Jack, MT7628DAN Mikrocontroller, 64 MB RAM, Casing with mode-switch. | ||
It provides 3 modes of operation: Off, Arming, and Attack. In attack mode, the Shark Jack will execute the payload.sh or payload.txt bash script from the /root/payload directory. In arming mode, the Shark Jack will be configured with a static IP address of 172.16.24.1 and will simply start an SSH server, without automatically executing any script. In this mode, a perpetrator may load and configure scripts, or retrieve output files placed in the loot directory from previous reconnaissance or attack operations. This can be done using the Linux command line utility “scp”. The status LED lights are configurable using appropriate syntax inside the payload script, provided by the Shark-Jack firmware. | |||
|technicalSpecification=https://docs.hak5.org/shark-jack/|supportedTechnologies=Ethernet, USB|includedEquipment=1x shark jack, 1x instruction card|elviscategory=Security/Crypto}} |
Revision as of 16:15, 3 March 2024
Name | Shark Jack network attack tool |
Manufacturer | Hak5 |
Link | https://lab401.com/products/shark-jack |
Specification | https://docs.hak5.org/shark-jack/ |
Technologies | Ethernet, USB |
Included equipment | 1x shark jack, 1x instruction card |
Description
Portable network attack tool, fast nmap scans. The Shark-Jack is a pen-testing utility developed by the ”Hak5” company and is designed for Ethernet plug and play vulnerability scanning in LANs. In its most basic form, it is essentially a small Linux-machine with a built-in Ethernet plug. The modest, portable physical nature of the device allows for quick and secretive reconnaissance activity. The Shark-Jack consists of following physical components: USB-C charging port, Battery, Status LED, RJ45 Ethernet Jack, MT7628DAN Mikrocontroller, 64 MB RAM, Casing with mode-switch.
It provides 3 modes of operation: Off, Arming, and Attack. In attack mode, the Shark Jack will execute the payload.sh or payload.txt bash script from the /root/payload directory. In arming mode, the Shark Jack will be configured with a static IP address of 172.16.24.1 and will simply start an SSH server, without automatically executing any script. In this mode, a perpetrator may load and configure scripts, or retrieve output files placed in the loot directory from previous reconnaissance or attack operations. This can be done using the Linux command line utility “scp”. The status LED lights are configurable using appropriate syntax inside the payload script, provided by the Shark-Jack firmware.