Fallen Archangel

Active Members
  • Content count

    105
  • Joined

  • Last visited

  • Days Won

    3

1 Follower

About Fallen Archangel

  • Rank
    "I will save you, I swear."
  • Birthday March 6

Profile Information

  • Gender
    Male
  • Location
    Oklahoma, US

Recent Profile Visitors

1,524 profile views
  1. Unfortunately I've never messed with PHP, so I can't make infusions or modules. But if you don't mind using SSH Wifite is a great way to go. I've never tried it on the nano but there is also AutoPixieWPS to consider, although it's limited to only pixiedust attacks.
  2. I have the S4 and mine works. Make sure on your settings you don't have the SSID hidden, and that you put it in the list of allowed devices.
  3. While the Nano doesn't have 5G or built in amplifiers, I believe it would work fine for this. You could always use something like kismet from command line, the pineapples have a nice UI that can record things. I'll upload an example of a report if you'd like.
  4. As far as connecting to hotspots, do this. First connect to the WiFi from the Nano's network page. Then on whichever device you have connected to the Nano, try to browse the internet. On that device it will show the portal. Example: Nano is connected to FreeWiFi My phone is connected to my Nano's AP On my phone, go to www.google.com The portal page appears, agree to the terms or whatever and click continue. Now the nano has internet access, and so do the devices connected. This has worked on every portal I've tried except for one, which used some weird form of mac address tracking. I never could figure out how to make it work correctly. So yes, some may be different, but this should work for most.
  5. The SSH server I'm using this with has a banner that authentication banner that displays whenever you connect with ssh (Just the standard, "Hey don't mess with this device!" type message). Will autossh still work with this server? If not, is there anything I can do about this, aside from removing the banner? Thanks!
  6. There are tons of great ones, but the one I use is called JuiceSSH.You don't need root. It also supports keys as well which is a nice plus. Once you've logged in, tap of the terminal part to bring up extra keyboard commands. Such as the Control key.
  7. If anyone has any requests let me know. I can't promise I'll know how to do it, but if it's within my abilities I'll make a video for it.
  8. It's installed. Airmon-ng is part of the aircrack-ng suite.
  9. Word of warning, doing it this way will only allow wifite to scan for 5 seconds before attempting to start attacking networks. 5 seconds isn't long enough, I'd say 20-30 would be a better choice. 120 would be even better.
  10. I know a lot of devices will stop probing for other networks if they are already connected to one.
  11. Samsung Galaxy S4 Stock ROM (Rooted) It's an AT&T phone, but I'm using it on a different network, so I can only use wifi tethering, not usb. I use the JuiceSSH app.
  12. You need to re-add it to your known hosts. (It's a file in /var/root/.ssh/)I've you don't know what this is, and you don't use ssh for anything else, it's probably save to just rename or remove it. Run this command and try it again. mv /var/root/.ssh/known_hosts /var/root/.ssh/known_hosts_backup Whenever you connect to a device with ssh, your computer will save a fingerprint of the device. This is saying that the fingerprint of the device is different from what it expects, so it's blocking it. (Happens whenever you do a factory reset or something.)
  13. Oh I just noticed what he was saying. Yeah, the pineapple is an entire standalone device. It doesn't need to be plugged in to a laptop or anything. It's easiest to think of it as a computer that doesn't have a monitor or keyboard. It's an entire computer on it's own, but since there are no input devices, you have to control it with another device. (For example, I control it from my phone using an SSH app.)
  14. I'm a bit busy at the moment as I haven't had a proper internet connection in way too long, but I'll try to put out a video as soon as I can. UPDATE: https://www.youtube.com/watch?v=Upf8bO7YuAU
  15. Sorry I've been gone so long everyone. Unexpected events. Wifite works just fine for me. Both the normal one as well as the ones by aanarchyy and the one from psyvision. Which is great because Wifite can also handle pixie attacks. (No bruteforce required if the ap is vulnerable) I've also stated in a previous post that I had my Mk5 use a list of the 1000 most common WPA passwords, and it only took 30 seconds for it to finish. Probably less with something like the Tetra.