Thecolorchanges

Active Members
  • Content count

    13
  • Joined

  • Last visited

About Thecolorchanges

  • Rank
    Hackling
  1. This technically can be done, but you need a very specific USB with Phison 2251-03 controller. A few years ago, you may have been able to find one.. almost impossible now. Buy the rubber ducky from HakShop, being able to hit a button and replay the payload is worth the $40 and time/frustration saved in buying a bunch of different USB sticks and trying.. probably cheaper too..
  2. in either reaver or wash there is a command to change the wps attack type, there is about 12 or so options. I iterated through the attacks until I found one that worked against the old test router I was trying it on. Good luck dood!
  3. Are you running pineap with rebroadcast + allow (basically everything checked) this will happen, the pineapple treats your phone no different than the devices tested against, you'll have to whitelist/blacklist to avoid.
  4. Reaver needs WPS on the router, do you have this enabled on your test ap? http://tools.kali.org/wireless-attacks/reaver ^ good starting point, WPS attacks do work in the wild however firmware updates and vendor implementations have made this attack vector very rare.
  5. Im not near my pineapple but I think it's either a .zip or tar.gz file, max size here is 1MB so may want to up it somewhere and link it to us
  6. Yep! It just hides the window :)
  7. Man that's wild, I get the hang and no data as well but it's very rare. Hope you can get it sorted, you've certainly gone through every troubleshooting step! If you feel like dumping the logs after a scan I love sifting through them.
  8. Quick question, i had a bit of this too. I narrowed it down to a bad SD card. Have you tried formatting/swapping that out? I also found that i get the best results by using the Y cable plugged into a battery pack with 2 outputs. I use a tertiary radio to connect the pineapple to my hotspot. When the tertiary radio is down, or if the pineapple is under very heavy load I've seen this as well. Also, do you already have PineAP running when you attempt to recon?
  9. On OSX: disable all active network connections (onboard LAN/Wifi) and then plug in a Cat5 cable from your router/switch to the lanturtle. Plug lan turtle into mac, open a terminal and type: ifconfig you should have an ip address of 172.16.84.x from there just ssh root@172.16.84.1 From there you should be set!
  10. Wiki is the best source. Check https://github.com/hak5/lanturtle-wiki/tree/gh-pages/modules Click the individual modules and you can read about what they do/require.
  11. @Mr. # Do you happen to have Responder/QuickCreds enabled? If so, try disabling them/reboot the turtle and let us know the results.
  12. nano /etc/turtle/modules/autossh somewhere around line 15-20 you should see your host, just tack on a -p and specify the port.