Just_a_User

Active Members
  • Content count

    218
  • Joined

  • Last visited

  • Days Won

    2

6 Followers

About Just_a_User

  • Rank
    Hak5 Zombie

Profile Information

  • Gender
    Not Telling
  • Location
    Earth
  • Interests
    Yes

Recent Profile Visitors

612 profile views
  1. There are a couple of things online that look similar (but not identical) to the camera you have bought - did you already try: - User = root Password = 123456 or User = ADMIN Password = 123456789 if they don’t work then I would stick to your brute force or alternatively open it up and see if there is a serial/uart you can tap into.
  2. From a quick google I see you have asked a few places. ispyconnect seems to support IPC365 maybe this allows you to do what you want. https://www.ispyconnect.com/man.aspx?n=IPC# If you need telnet access then maybe try setting up an account on the android app (like described in the user manual) and then using those credentials on the terminal to get in. Worth a try.
  3. Welcome to the Pineapple :) Although its possible to spoof protected AP it isn’t part of the PineAP and needs to be crafted individually at the moment. The protected AP needs to be set up identically to the original including its password which you would usually not know by just running passive network scans.
  4. Yes it can, when you initially set it up you were asked to enter a name for the managment wifi with a password. find this network on your phone and join, entering the password you used. then open the phones browser and browse to http://172.16.42.1:1471 to get to the pineapple web UI. Everything is the same but the pineapple has no internet access. The connection app and tethering is only really used to share the mobile phones data connection combined with access to the pineapple UI.
  5. By what you describe I think you connected nano to battery and USB charge cable from nano to phone? this would indeed put power through the nano and charge the phone which is also fine if that’s what works for you and what you want to achieve. The lead I mentioned above allows fitting the other end of the nano to the phone while splicing in a power supply allowing the usb port on the nano to be used with something else such as a 3g dongle, gps or wifi adapter. As with most things there are many ways to get a similar result.
  6. I feel disabling the nano's management wifi network makes reception and operation slightly better and also helps you avoid pineappling your own network/connection to the nano. So for a solution without using wifi try looking for a OTG cable with power - I occasionally use mine like this as is allows the battery to power the pineapple and not drain the phone (depending on which cable). If you were to use a normal OTG type cable combined with a charger cable (uUSB to uUSB) it would drain the phone battery and probably make the nano unstable. Something like this https://www.amazon.co.uk/Micro-Cable-Power-Samsung-I9100/dp/B00C4521R4 some cables have no power connection to the phone at all some connect power to both pineapple and phone. decide what you prefer and give it a go. EDIT - I should add that I use my nano in this config when using a 3g dongle connected to the nano - it provides internet to both nano and phone which is handy.
  7. I think what b0N3z is saying is that the symptoms you describe sound similar to having power issues. From what you describe it could also be something to do with the Micro SD card. Does the problem persist over reboots? Have you tried a factory reset? Reformatted the SD from the Pineapple GUI? Some more detail might help narrow it down to the root cause.
  8. I recall this one being asked before, have a read of this: -
  9. Looks like my hunch was correct after all. Thank you Zylla for making it a reality!
  10. Just a guess - Wondering if you installed libnetfilter-queue - 1.0.2-1?
  11. Nice one, cheers!
  12. you pretty much came to the conclusion by yourself :) Forcing clients off of a secured network isnt the real strength of the pineapples - not saying its not possible but in most cases the client devices prefer a secured network over an open one and have a stronger signal to them than your pineapple - your options are a deauth attack in the hope to harass a user enough to click connect to an open network. Or you can attempt a WPS attack (if WPS is enabled on network) or a more traditional handshake capture and take the successful capture and run a password brute force attack against it. Where the pineapples come into there own is around unassociated clients looking for known networks. - such as personal devices at a work office location. The real vulnerable clients are the ones who have associated with an open network in the past (these will mostly be picked up by the pineapple like a sponge soaking up water) Or you could try making a new network that a client might be looking for such as an open guest network in a lobby area of a corporation that actually has no guest wifi. Keep it legal :)
  13. The antenna included with the TETRA are dual band so both 2.4 and 5ghz. The antenna you link to are intended for the NANO and are 2.4ghz only. Also they use RP-SMA and the TETRA uses SMA.
  14. A good collection of Mini-itx cases here http://www.mini-itx.com/store/?c=3 This one says half size pcie http://www.mini-itx.com/store/~JOUJYE528I-250W
  15. Interesting research worth a read and watch. I think the devices used are around the $185 mark. type RX band- TX band- Function Application width width UT-100A 6-8 MHz 2-8 MHz Rx-Tx General UT-100B 2-4 MHz 2-8 MHz Rx-Tx amateur UT-100C - 2-8 MHz Tx General UT-100D 2-4 MHz - Rx amateur http://www.idealez.com/hides/home/en_US/ http://www.ebay.com/sch/hides168/m.html?item=322470042239&hash=item4b14b65a7f%3Ag%3AGc4AAMXQVT9TBXWO&rt=nc&_trksid=p2047675.l2562