Jump to content

r3g3x

Active Members
  • Posts

    39
  • Joined

  • Last visited

Recent Profile Visitors

1,325 profile views

r3g3x's Achievements

  1. I see questions from people who do not understand how open authentication works for WiFi. Hopefully the steps below can help address some of the questions and serve as a small tutorial. There are 3 parts of the process for a client to connect and transmit data on a wireless network. They are the probe stage, Authentication stage and Association stage. In documentation the client is the station or STA for short. The access point is AP. PROBE STAGE STA --- Probe Request --> AP STA <-- Probe Reponse --- AP AUTHENTICATION STAGE STA --- Authentication Request --> AP STA <-- Authentication Process --> AP STA <-- Authentication Response --- AP ASSOCIATION STAGE STA --- Association Request --> AP STA <-- Association Response --- AP Probe 1.1 STA sends a probe on all channels to find the AP (ff:ff:ff:ff:ff:ff) 1.2 APs in range answer the probe request Authentication 2.1 STA authenticates to the AP - the strongest signal wins 2.2 Authentication process takes place 2.3 AP sends a response to the authentication (success or failure) Association 3.1 STA sends association request 3.2 AP sends association response 3.3 STA now has communication ability with network Data exchanges do not happen until this entire process completes I hope this can help some people
  2. I am no sure of your depth of understanding of wireless, but there are also a series of free WiFi videos available online at: http://www.securitytube.net/groups?operation=view&groupId=9. The videos are good and will help you to understand WiFi workings, security and tools. Without a solid understanding of wireless using a pineapple can be frustrating. Once yo understand tools available and wireless, reading the description and purpose of the modules is easier to understand, implement and troubleshoot. Good luck. Jim
  3. You don't use PineAP - PineAP is for use with open networks, not WPA/WEP/WPA2 networks. If PineAP impersonates a network you have in your PNL that is WPA, it will advertise it as an open network. As the other guy said use aircrack-ng. It would be easier to use a Kali instance with an Alpha card using the aircrack-ng suite. Jim
  4. The other day I was doing a technical demo at a large gathering in a large dense packed city and was using a Tetra for part of it. On setup day the Tetra worked great, I had people connecting into the pineapple and it worked great. On the demonstration day, there were a couple of hundred people in the room, the Tetra could not keep up and stopped collecting SSID's. The scan function worked well, but PineAP did not work. Anyone else try to use a pineapple in a large densely attended area? Jim
  5. Can you post output from ifconfig or the text displayed after you run the Tetra setup scripts?
  6. Hi Jsync: In my case I have both and use both, but I am becoming vey fond of the Tetra. I like the tactical option because it gives you all the extra gear plus the backpack which I really like. The book is helpful if you are new. That said, if you research the forums and have a good Wi-Fi base you can get by without it. You will need an Internet connection to provide connectivity to clients and you need a source to connect and configure. I use both Linux and Windows without any issues, never used a phone. The Tetra is very powerful and does both 2.4 and 5 frequencies. The Nano is smaller and only does 2.4 One last word of caution to set your expectations. You will need Wi-Fi understanding to use the Pineapple, it is not as easy as plug it in and own everything. It seems there are people who buy a pineapple and have unrealistic expectations. Good luck, Jim
  7. I have both the Tetra and Nano and have been using them for quite a while. I am now running current firmware and modules on both. I am finding that the modules and results are much better on the Tetra than the Nano. Anyone else have this experience?
  8. I just looked in the shop and do not see the book. Is it in there yet?
  9. I do not have any additional modules running, nor do I have PineAP running. This is pure AP & client scan. So, I think the TETRA thinks it is seeing a weird SSID out there. I will run again and grab logs for you.
  10. Is there an easy way to differentiate which radio is wlan0 and wlan1 when looking at the NANO? Thanks, Jim
  11. Using my TETRA last night, it was impressive on the amount of AP's found compared to my NANO. There was one AP it found that was a string of random characters. It was almost: }{|;$#@!#$. But it was like 40 characters long. Bug or clever SSID? Jim
  12. No wp6.sh does not run on windows. I set that up manually. I use wp6.sh when I am using my NANO on KALI, and manual setup when using the NANO on windows. Sorry for the confusion. The NANO works great on either a Windows or KALI platform. I am not talking about wp6.sh. Jim
  13. Albert: How are you connecting to the Pineapple? If you are using Windows make sure the IP of the ethernet to the pineapple is "172.16.42.42 and 255.255.255.0". Your Internet device on your laptop must be set to sharing. If you are using LINUX download and run the wp6.sh script - it works great. I had success with both LINUX (Kali) and Windows. Jim
  14. Hi thanks for the replies - let me clarify. I see and AP with associated clients and it does not have the "dauth" option for it. If I run this at home it sees my home network that my PC connects through, but all the others in the vicinity do not have the "deauth" option. If you notice (and based on Darren's video), when there is an AP with associated client you can "deauth" the AP and all it's clients from the option on the AP. In my list I do not have that option for anything but my home network.
  15. When I scan and select the AP or AP and Client option, how does the pineapple determine when I can send a deauth found resources? There are times when the drop down has the deauth option and times it does not. Thanks, Jim
×
×
  • Create New...