Rainman_34

Active Members
  • Content count

    188
  • Joined

  • Last visited

  • Days Won

    1

About Rainman_34

  • Rank
    Lost in the sauce
  • Birthday

Profile Information

  • Gender

Recent Profile Visitors

736 profile views
  1. I have a script that will ask you what wireless device eg. wlan1 then once you input it it will change the tx-power to 30 but just a reminder that is illegal in the US and you will eventually burn up your radio.
  2. Thanks sud0nick. That was the issue it works allows me to do everything in firefox. There is one issue though that I am having and I don't know if it is me or the module. Anytime I check the modify certificate info box and attempt to put information in there it will generate the .pem file but not the .cer file which then prevents me from using that certificate on the pineapple. Is there any way to correct this? Thanks again for the great module.
  3. I tried it again a couple of times to both the SD card and the internal and I got nothing. When I right clicked on it and open link in new page it goes to the papers page but it is just blank. I will have to try and ssh into it tonight but I am using a Safari browser with OSX Yosemeti.
  4. I was attempting to mess with this earlier in January and when I download the module to my sd card and then go to modules and click on papers nothing happens. I deleted it and downloaded it again but clicking on the link for the papers module does nothing. Is anyone else experiencing this issue?
  5. Snort is only going to be able to detect what is sent at it's IP or if it is set up as a network tap what is sent at the IP it is between. PFSense is another viable firewall that lets you see activity. Snort itself is not going to monitor the entire network though.
  6. Which VM software are you using and it doesn't need to connect to the internet especially if it is on the same box as your kali machine.
  7. So to be completely honest with you the idea of breaking WPS to get a password is very close to being antiquated. Given the fact that now many access points will block you for too many failed attempts, lock WPS from too many failed attempts and the fact that many of the newer ones will change the pin when things connect WPS is becoming harder and harder to actually use to crack something. This I suspect is why the developer of reaver has kind of given up on the project and moved on.
  8. Has anyone had a chance to read this yet and go through it. Does it actually give some techniques to try and examples or is it more like the wifi pineappling book that discussed how it works and what it's capabilities are and setting it up? I want to order one but I want to make sure I will learn something first.
  9. I saw they are back in stock right now. I want one but I want some reviews on them first. I don't want to order one if it is like the pineappling book that was really more of a book on how it works and what it's capabilities are.
  10. @reboot is working as I have some other stuff working in there but I will try the rc.local this weekend. Thanks for the help.
  11. So it seems I am missing something here and I can't seem to figure out what I am doing wrong so any help here would be greatly appreciated. I have a Raspberry Pi 3 running Raspbian Jessie Lite and I have a VPS that I want it to automatically connect to. I am having a couple of issues and the first one is when I issue the following command nothing happens and by that I mean a netstat -antp still shows the port closed on the VPS. For security purposes I in the example I am using random port numbers but when I give the command I am using the actual ports that my ssh is running on. autossh -i secretkey.pem -f -N -M 0 1111:localhost:4444 user@VPS -p 5555 -o "ServerAliveInterval 360" -o "ServerAliveCountMax 5" When I issue the following command though autossh works and makes an ssh connection but because I have removed the -f flag it opens a connection in my terminal and once I exit the terminal it closes the connection and the port on my VPS autossh -i secretkey.pem -M 0 1111:localhost:4444 user@VPS -p 5555 -o "ServerAliveInterval 360" -o "ServerAliveCountMax 5" The next issue is that when I put the same command from above into a cronjob with @reboot no connection is made to the VPS when I reboot the Pi. Any help with this is greatly appreciated.
  12. It's not really a manual as much as a book about it's capabilities and how it works. It doesn't really teach you how to do anything
  13. The easiest way is to make a bootable USB of Kali linux. Then enter the bios and select to boot from the USB instead of the computers hard drive. Locate the SAM file and the system file. Copy those to the kali drive and run john the ripper agains the files. If his password is a simple one then it will figure it out. If not there are programs you can boot from a CD that will remove a use or add a user. I can't think of which ones they are though but they are extremely easy to use.
  14. I think it's a matter that C won't work on the Nano but I'm not sure. I sent you a PM zarabyte
  15. Essentially WPS attacks are becoming less and less possible as newer routers tend to lock WPS after 3 failed attempts and will only unblock WPS if the router is restarted. There are ways to force some routers to restart but doing that after every three pin attempts is rather time consuming. What kind of output are you getting on you reaver? Does it keep trying the same pin over and over or say it is locked waiting 60 seconds or something like that?