Search:

Type: Posts; User: Swacky12

Search: Search took 0.00 seconds.

  1. Awesome, and thanks to you we have an easy guide...

    Awesome, and thanks to you we have an easy guide to the stock fix. I don't suppose you can make a pull request on the Nethunter github for the fix for future versions?
  2. Ah I did have that problem briefly as well, and...

    Ah I did have that problem briefly as well, and it was solved by an offhand tweet by one of the creators of metasploit that I found while googling the error myself. To paraphrase the problem is that...
  3. Stoof, I can't tell you how to fix it, but I can...

    Stoof, I can't tell you how to fix it, but I can tell you how implemented the workaround to do virtually the same thing as the stock hid attack. Using the Rubber Ducky HID scripting that is also part...
  4. I've now bypassed the issue using a modified...

    I've now bypassed the issue using a modified ducky script as my nethunter HID attack to gain a shell. I suspect this issue can be fixed by using an older source shell. Will try modifying the source...
  5. I've noticed the issue too, a workaround I've...

    I've noticed the issue too, a workaround I've discovered is by changing the language in the script gui to british english works for getting the underscore back, the only thing is quotes " and the @...
  6. Well I've tried it on 3 different test boxes...

    Well I've tried it on 3 different test boxes which should have had no exposure before and gotten the same error. Different ports etc.
  7. I'm having the same issue, Nexus 7 2013. I'm...

    I'm having the same issue, Nexus 7 2013. I'm attempting to run the handler on the tablet as well. Running the HID attack causes powershell to crash after everything is input....
Results 1 to 7 of 7