Active Members
  • Content count

  • Joined

  • Last visited

  • Days Won



About Just_a_User

  • Rank
    Hak5 Pirate

Profile Information

  • Gender
    Not Telling
  • Location
  • Interests

Recent Profile Visitors

961 profile views
  1. On the bashbunny storage or root there should be a version.txt to give you an idea of installed firmware. At the moment you can go directly from 1.0 to 1.3 without needing 1.2. Also the wiki has lots of information to get you up and running with the basics, https://wiki.bashbunny.com/#!index.md check out the downloads with changelogs for the versions/change history.
  2. modules

    It may be best start from scratch - instead of a factory reset try a firmware recovery as per the wiki https://wifipineapple.github.io/wifipineapple-wiki/#!troubleshooting.md Complaining about support generally makes people not want to help you, so you might want to dial that down a bit :) you might find you get more people offering constructive suggestions to help you find a solution.
  3. Which version of TwinDuck did you install? from memory there are 3x versions - c_duck_v2.hex - Supports DuckyScript as HID payload, triggered automatically and on GPIO (limited instructions) c_duck_v2_S001.hex - Triggered on CAPS/NUM/SCROLL LOCK c_duck_v2_S002.hex - Triggered on Ducky's GPIO button only
  4. Have a look round the hak5 youtube channel, it is full of good stuff. Here is the link for the university playlist https://www.youtube.com/playlist?list=PLW5y1tjAOzI1benBAgqAbMExp5dWkQLgO
  5. Pretty much, have a read of other forum posts.
  6. There are a few 10/20A solar charge regulators about that have 1 or 2 USB ports built in, might be worth a look. https://www.banggood.com/Intelligent-Home-20A-12V24V-LCD-Display-Solar-Charge-Controller-wit-USB-Port-p-985075.html
  7. I only ask as I haven’t seen the question asked yet - was this a brand new (sealed box) laptop? or was this a used/refurbished machine? Just putting it out there that second hand machines, if not cleaned or properly reset, could sometimes incorporate some of the previous owners history or at worst malicious software. That could maybe explain the unknown history found on the machine. But date/time stamps should clear that up for example if the conversations took place before you owned the laptop you would have a valid argument. Also (but maybe not as nice to hear) is that maybe you did do it and are looking for viable reasons to be able to defend your position and keep your job. Just saying its possible and not that is what has happened. For example most of my family users wouldn’t know what the darkweb is, let alone know they could buy anything from it. Either way I hope your situation comes to a conclusion soon as the "not knowing" can take its toll on anyone being investigated especially added with potential of loosing their job. Dont forget to de-stress often :)
  8. Just tried the tetra version, I can work with this :) thank you.
  9. Q1 - Copy the ch_fw_1.3_264.tar.gz file as is (no need to unpack) to the root of the bashbunny storage. Q2 - Yep the root of the bashbunny storage would be media/root/BashBunny/ don’t place it in any directory, just there. remember to safe eject then plug in and let it do its thing. Hope this clarifies things for you. if not just ask
  10. If your nano is already full, you might want to factory reset it on the Configuration/General tab on the pineapple UI. also insert the sd card and format it using the pineapple UI on advanced/usb page. This formats correctly and enables a swap on the sd. I am maybe lucky but I haven’t experienced much issue with my nano using its SD card. I install everything I can to sd, also I make sure I change the PineAP log location to /sd/ to stop my nano filling up on longer operations. Hope this helps.
  11. Sure, I found the module as it is works great if your moving around as it highlights MAC's that stay in range - potentially following you as you suggest. If inverted - It would ignore for example staff working regularly at a location and highlight MAC's that are new - potentially highlighting strange/new devices in a known environment. I hope I explained it clearly, if not let me know.
  12. Sorry I cant help with the pinesniffer crashes. But I have a different question. Would this module be able to operate inverted? so ignoring MAC's it has seen for the last 'n' scans and highlighting "new" MAC's? I can see use cases for both.
  13. Its possible on 1.0 but not as easy/simple - the closest I could find to written instruction was this post: -
  14. try this To restore the BB to original point you can put it into arming mode, plug it into power, wait for the green light to turn on then as soon as the green led goes out unplug it. do this a total of 3 times. The 4th time leave it plugged in and wait for the police lights to finish. it should then be restored to original point. you can then re-flash 1.3 and start again.
  15. Depends on what you want to do, if you were capturing handshakes that would be enough. You could also try a longer Deauth to pester the user of the phone (you) to manually try one of your open networks. As its your known AP you could also try to EvilTwin your AP mirroring the settings (including password) and position yourself/pineapple between the AP and device to improve chances. If you want to get your phone to associate automatically with the pineapple you would do better to go out to the middle of a field for example (or delete your AP from its known networks for test) where your phone would be looking for networks but was not in range of any known AP's. Ideally your pone had at least one open network in its saved networks, say you used Starbucks free wifi in the past. then your phone would most likely associate to the pineapple with the settings you mention above.