Jump to content

All Activity

This stream auto-updates     

  1. Yesterday
  2. i don't think this is what i'm seeing. when i go to 2.7.0 i can only use the nano for about 10 min max before the cpu spikes to 100% (according to the dashboard) and pages will no longer load and i can't ssh to it. one point that will add is that i had sslsplit mod loaded, but no other mods. either way the 2.6 firmware works perfect for me (aside from sslsplit not working).
  3. Hello fam, Plz in dire need of your assistance. Had been running my tetra fine on latest firmware for weeks as my main access point at home, suddenly went to do a mac change and it went offline with all 3 lights on. tried the reset button with no luck of seeing the pineapple come back up. Decided to do a firmware recovery as per Hak5 Docs Being on Manjaro XFCE, i used the ip command to try and set the static ip address ip link show revealed the name of the network interface 10: enp0s20f0u5 Following this guide i used sudo ip addr add 192.168.1.2/24 dev enp0s20f0u5 This says its connected me, however I get pings from 192.168.1.2 but no pings from 192.168.1.1 ping: sendmsg: Operation not permitted and no browser connection. Can you please tell me what im doing wrong?
  4. Hello, i can't install any module because module manager do not work (impossible to start it, impossible to download and install the modules) I have update the firmwire to the last. I tried to install the modules manually. To do this I did: update opkg opkg install curl but when I use curl I get the following error: "Error relocating /usr/bin/curl: curl_multi_poll: symbol not found." so I can't install a module via module manager, or manually via curl... I don't know what to do anymore. does anyone have any ideas?
  5. digininja

    MSI Laptop

    Can you send a screenshot of the password screen? BIOS info isn't battery backed any more and some of the settings, like requiring a password, can't be cleared with a reset as they are designed to lock the machine down regardless of what happens to it.
  6. BrianL

    MSI Laptop

    Members 2 posts Report post Posted 1 hour ago I have an MSI gaming laptop MS-16J9, My son was playing with the buttons on startup and now it says I need to put in password on startup. He doesn't know what he has done. I have removed the battery and the bios battery leaving it over night and shorting out the bios battery terminals but still asks for a password before it gets to windows. Any help appreciated. Brian
  7. I have an MSI gaming laptop MS-16J9, My son was playing with the buttons on startup and now it says I need to put in password on startup. He doesn't know what he has done. I have removed the battery and the bios battery leaving it over night and shorting out the bios battery terminals but still asks for a password before it gets to windows. Any help appreciated. Brian
  8. BrianL

    MSI Laptop

    I have an MSI gaming laptop MS-16J9, My son was playing with the buttons on startup and now it says I need to put in password on startup. He doesn't know what he has done. I have removed the battery and the bios battery leaving it over night and shorting out the bios battery terminals but still asks for a password before it gets to windows. Any help appreciated. Brian
  9. Hello guys, So i want to buy pineapple nano and sharkjack but i have no idea to how much gonna cost me shipping ? and i have some question about shipping cost How many kilos does "sharkjack and pineapple nano" come because i live in Turkey so i have to calculate my shipping cost @Darren Kitchen can you give me exact cost fee to Turkey/Istanbul ? for those gears I am thinking of buying it if costs suits me. Thanks.
  10. Last week
  11. HiddenWall is a Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). The motivation: on bad situation, attacker can put your iptables/ufw to fall... but if you have HiddenWall, the attacker will not find the hidden kernel module that block external access, because have a hook to netfilter on kernel land(think like a second layer for firewall). My beginning purpose at this project is protect my personal server, now is protect the machines of my friends. When i talk "friends", i say peoples that don't know how to write low level code. Using the HiddenWall you can generate your custom kernel module for your firewall configuration. The low level programmer can write new templates for modules etc... First step, understand before run Verify if the kernel version is 3.x, 4.x or 5.x: uname -r Clone the repository git clone https://github.com/CoolerVoid/HiddenWall Enter the folder cd HiddenWall/module_generator Edit your firewall rules in directory rules/server.yaml, the python scripts use that file to generate a new firewall module. $ cat rules/server.yaml module_name: SandWall public_ports: 80,443,53 unhide_key: AbraKadabra hide_key: Shazam fake_device_name: usb14 liberate_in_2_out: True whitelist: - machine: ip: 192.168.100.181 open_ports: 22,21 - machine: ip: 192.168.100.22 open_ports: 22 If you want study the static code to generate, look the content at directory "templates". Second step, generate your module If you want generate a kernel module following your YAML file of rules, follow that command: $ python3 WallGen.py --template template/hiddenwall.c -r rules/server.yaml This generate a generic module with rules of server.yaml, if you want to use another template you can use "wall.c", so template module "hiddenwall" have option to run on hidden mode(is not visible to "# lsmod" for example). Third step, install your module To test module: # cd output; make clean; make # insmod SandWall.ko The rule of YAML to generate module is simple, drop all out to in packets, accept ports 80,443 and 53. The machine 192*.181 can connect at ports 22 and 21... if you use nmap at localhost/127.0.0.1 you can view the ports open... because rule liberate_in_2_out is true. Password to turn Firewall visible is "AbraKadabra". Password to turn Firewall invisible is "Shazam". You need to send password for your fake device "usb14". To exit module, you need turn visible at "lsmod" command ... # echo "AbraKadabra" > /dev/usb14 # lsmod | grep SandWall # rmmod SandWall Random notes Tested on ubuntu 16 and fedora 29 at kernels "3.x","4.x" and "5.x". TODO Suport to IPV6. Macro to select the interface(to use multiple modes for each interface). Option to remove last logs when turn hide mode. Option to search and remove others toolkits... Code generator to BFP... References Wikipedia Netfilter https://en.wikipedia.org/wiki/Netfilter Linux Device Drivers http://lwn.net/Kernel/LDD3/ M0nad's Diamorphine https://github.com/m0nad/Diamorphine/
  12. HiddenWall is a Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). The motivation: on bad situation, attacker can put your iptables/ufw to fall... but if you have HiddenWall, the attacker will not find the hidden kernel module that block external access, because have a hook to netfilter on kernel land(think like a second layer for firewall). My beginning purpose at this project is protect my personal server, now is protect the machines of my friends. When i talk "friends", i say peoples that don't know how to write low level code. Using the HiddenWall you can generate your custom kernel module for your firewall configuration. The low level programmer can write new templates for modules etc... First step, understand before run Verify if the kernel version is 3.x, 4.x or 5.x: uname -r Clone the repository git clone https://github.com/CoolerVoid/HiddenWall Enter the folder cd HiddenWall/module_generator Edit your firewall rules in directory rules/server.yaml, the python scripts use that file to generate a new firewall module. $ cat rules/server.yaml module_name: SandWall public_ports: 80,443,53 unhide_key: AbraKadabra hide_key: Shazam fake_device_name: usb14 liberate_in_2_out: True whitelist: - machine: ip: 192.168.100.181 open_ports: 22,21 - machine: ip: 192.168.100.22 open_ports: 22 If you want study the static code to generate, look the content at directory "templates". Second step, generate your module If you want generate a kernel module following your YAML file of rules, follow that command: $ python3 WallGen.py --template template/hiddenwall.c -r rules/server.yaml This generate a generic module with rules of server.yaml, if you want to use another template you can use "wall.c", so template module "hiddenwall" have option to run on hidden mode(is not visible to "# lsmod" for example). Third step, install your module To test module: # cd output; make clean; make # insmod SandWall.ko The rule of YAML to generate module is simple, drop all out to in packets, accept ports 80,443 and 53. The machine 192*.181 can connect at ports 22 and 21... if you use nmap at localhost/127.0.0.1 you can view the ports open... because rule liberate_in_2_out is true. Password to turn Firewall visible is "AbraKadabra". Password to turn Firewall invisible is "Shazam". You need to send password for your fake device "usb14". To exit module, you need turn visible at "lsmod" command ... # echo "AbraKadabra" > /dev/usb14 # lsmod | grep SandWall # rmmod SandWall Random notes Tested on ubuntu 16 and fedora 29 at kernels "3.x","4.x" and "5.x". TODO Suport to IPV6. Macro to select the interface(to use multiple modes for each interface). Option to remove last logs when turn hide mode. Option to search and remove others toolkits... Code generator to BFP... References Wikipedia Netfilter https://en.wikipedia.org/wiki/Netfilter Linux Device Drivers http://lwn.net/Kernel/LDD3/ M0nad's Diamorphine https://github.com/m0nad/Diamorphine/
  13. Kali host interface and route configuration eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 192.168.1.139 netmask 255.255.255.0 broadcast 192.168.1.255 ether 95:d6:81:15:ed:19 txqueuelen 1000 (Ethernet) RX packets 260781 bytes 92776339 (88.4 MiB) RX errors 0 dropped 254 overruns 0 frame 0 TX packets 35398 bytes 4901000 (4.6 MiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 device interrupt 16 memory 0xdf200000-df220000 eth1: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 172.16.42.211 netmask 255.255.255.0 broadcast 172.16.42.255 inet6 fdeb:13fb:48e1::15e prefixlen 128 scopeid 0x0<global> inet6 fdeb:13fb:48e1:0:2c0:caff:fea7:d334 prefixlen 64 scopeid 0x0<global> inet6 fe80::2c0:caff:fea7:d334 prefixlen 64 scopeid 0x20<link> inet6 fdeb:13fb:48e1:0:f97c:1652:744a:1b03 prefixlen 64 scopeid 0x0<global> ether 00:c0:ca:a8:d4:35 txqueuelen 1000 (Ethernet) RX packets 728 bytes 591227 (577.3 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 819 bytes 117284 (114.5 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536 inet 127.0.0.1 netmask 255.0.0.0 inet6 ::1 prefixlen 128 scopeid 0x10<host> loop txqueuelen 1000 (Local Loopback) RX packets 1743 bytes 146205 (142.7 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 1743 bytes 146205 (142.7 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 wlan0: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500 ether 92:89:5b:50:b5:83 txqueuelen 1000 (Ethernet) RX packets 0 bytes 0 (0.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 0 bytes 0 (0.0 B) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 ROUTE TABLE ON KALI ============================= Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface 0.0.0.0 192.168.1.254 0.0.0.0 UG 0 0 0 eth0 0.0.0.0 172.16.42.1 0.0.0.0 UG 0 0 0 eth1 172.16.42.0 0.0.0.0 255.255.255.0 U 0 0 0 eth1 192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 interface configuraion on pineapple nano ================================= br-lan Link encap:Ethernet HWaddr 00:C0:CA:A8:C5:5D inet addr:172.16.42.1 Bcast:172.16.42.255 Mask:255.255.255.0 inet6 addr: fdeb:13fb:48e1::1/60 Scope:Global inet6 addr: fe80::2c0:caff:fea7:c45c/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:1261 errors:0 dropped:0 overruns:0 frame:0 TX packets:1031 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:147670 (144.2 KiB) TX bytes:636326 (621.4 KiB) eth0 Link encap:Ethernet HWaddr 00:C0:CA:A8:C5:5D UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:1261 errors:0 dropped:0 overruns:0 frame:0 TX packets:1031 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:165324 (161.4 KiB) TX bytes:636326 (621.4 KiB) Interrupt:4 lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:65536 Metric:1 RX packets:507 errors:0 dropped:0 overruns:0 frame:0 TX packets:507 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:44064 (43.0 KiB) TX bytes:44064 (43.0 KiB) wlan0 Link encap:Ethernet HWaddr 00:C0:CA:A8:A5:52 inet6 addr: fe80::2c0:caff:fea7:a451/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:221 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:21310 (20.8 KiB) wlan0-1 Link encap:Ethernet HWaddr 02:C0:CA:A8:A5:52 inet6 addr: fe80::c0:caff:fea7:a451/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:216 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:20433 (19.9 KiB) wlan1 Link encap:Ethernet HWaddr 00:C0:CA:A8:B5:BE UP BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) Routing table on nano ============================ Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface 0.0.0.0 172.16.42.42 0.0.0.0 UG 0 0 0 br-lan 172.16.42.0 0.0.0.0 255.255.255.0 U 0 0 0 br-lan
  14. https://www.gov.uk/goods-sent-from-abroad/tax-and-duty It seems that the item and postage costs are subject to customs duty and to find out what the percentage rate is you have to phone HMRC. Then the item and postage costs AND the duty are subjected to 20% VAT AND if you go down the duty unpaid route, when the Royal Mail gets the goods at your local sorting office they inform you that you have to pay the duty and they charge you £8 on top just for telling you and collecting the money. So an extra $42 seems reasonable to me and saves a lot of faffing about as everything is delivered straight to your door and you don't get mugged by Royal Mail. As an aside, have you seen the posts about the Tetra? https://forums.hak5.org/topic/51937-defective-item-wifi-pineapple-tetra/ Even at nearly half price I have not been tempted.
  15. I just installed new box kali 2020.2 and installed the wifi pineapple nano with latest firmware 2.7.0 and the pineapple works fine. But when i go to run the wp6.sh script to share internet, it doesn't work. Can someone please help me out with this?
  16. I am gonna take advantage of the awesome discount and order a Tetra and bash bunny. Does anybody know what is the customs duty fee is likely to be upon arrival in UK? In the shop it says I can include shipping with duty pre paid but it is $62 as opposed to $20 without duty fees pre paid.. Am I better off pre paying the Duty or Paying on UK arrival? I just want to pay less. Thanks in advance
  17. Hm, that shouldn't be the case. There's no such thing as a timeout. I'd maybe make a factory reset, although I don't know if that helps. It's probably a hardware issue. I'm sorry, I don't know any further.
  18. I just got the nano and I was having problems with getting the SD set up on 2.7.0 so I manually reset the firmware back to 2.6.2. Through that process I had to turn it off and on several times (I'm new to the platform so there was some trial and error). Fortunately I don't need an SD card. The SSH tip helps a lot tho!
  19. Use a crypter (found elsewhere)
  20. I even went so far as to modify the script that runs when I push the button underneath my Nano, to shutdown the device instead of rebooting it. The button is much more useful to me that way.
  21. Yes. Your mileage may vary, but I have had less issues with my pineapple when I do it that way. You can also type “poweroff” from an ssh or serial prompt, or from a C2 remote shell.
  22. So, instead of Log Out, you Shut Down unit and wait until it closes, before removing power from unit, is this Correct?
  23. Not sure if it is my Nano or Windows 8. Nano not stable, at times it connects, many modules do not Start! Also keep getting error network connection. I know for a fact it is not my wifi, as I am in another room. And I can access other sites, but Nano many times will not connect. Or should I dedicate a laptop with Kali Linux? Any comments appreciated.
  24. It does, Tried on an intel nuc as well. I wonder if there is some kind of timeout at play? It seems to happen only if I eject/unplug/plug back in within a few seconds. If it sits for ~5 minutes after being unplugged the issue does not occur
  25. Does the bunny behave the same on other computers aswell?
  1. Load more activity
×
×
  • Create New...