Jump to content
Hak5 Forums

Leaderboard


Popular Content

Showing content with the highest reputation since 05/22/2018 in all areas

  1. 5 points
    This isn't necessarily true, imo. The truth is somewhere in the middle of this. Saying "Linux has a terrible UI" is entirely subjective, and is kind of a moot point considering there are a lot of different environments available on Linux, that can be highly customized. As for the "lack of enterprise applications" part, Valve have done a lot of work with Steam and other vendors to bring games to Linux, and watching movies on Linux has been possible for longer than I've been alive... What? Mac OS X can be an incredible pain in the ass (hi @Tesla) for general hacking and development. OS X has had and currently has glaring security holes just like Windows and Linux, and I would not say it gives hackers a false sense of security in any way shape or form (It really should not.). In my experience (and honestly, to my surprise) lots of people in the security scene are fond of using OS X because it seems "half way between Linux and Windows", but there are also lots of people in the same scene that prefer to use Windows, or prefer to use Linux. Use whatever tool is most effective for a certain task. You wouldn't use a screwdriver to put a nail in a wall, would you? apt-get, pacman, emerge, git clone, whatever package manager or source is available to you :P.
  2. 4 points
    Why should we have to convince you? If you want a wifi auditting device that dominates the market in its field, then there is no convincing. Be a smart consumer.
  3. 4 points
    It's also my opinion that you don't need to be very knowledgeable on <topic> to be a hacker. It's a mindset, or a way of thinking, a personality.
  4. 4 points
    Hacker - Someone who likes full control over everything techie they (or others) own. MacOS - An operating system that is the complete opposite of control, striving to lock down every little thing that a user should be able to do, but now can't. No thanks, I'll stick with Linux.
  5. 3 points
    Kismet - Pineapple Edition - With WEB-UI I just saw the video uploaded by Hak5 to youtube the other day, where they used an array of Tetra's running Kismet to scan ALL channels at all times. After that, i just had to get it working! Today i finally managed to compile the latest source-files for kismet, which also has a working web interface. I've tested it all day on my Tetra, but it should be working on the Nano as well. It might complain about the version of libmicrohttpd , so i recommend to also download the version of libmicrohttpd on my repo. (links to ipk's below) All the other libs should work (downloaded under installation), if you just remember to run opkg update before installing them. I've updated the version of Kismet (26.05.2018). So the "issue" with libmicrohttpd should be fixed, and it should now be content with the version on openwrt's repos. which it downloads under installation. Also tried adding support for libpcap and pcre, please test it out. 🙂 Kismet Kismet-remote After installation: Run "kismet" inside a SSH terminal to the Pineapple. Kismet should launch. You should now be able to access the web-interface on TCP-port 2501. (Eg: http://172.16.42.1:2501) Another tip: run airodump-ng-oui-update on the Pineapple When completed, run: ln -s /etc/aircrack-ng/airodump-ng-oui.txt /etc/manuf This will make Kismet use Aircrack-ng's OUI database. 🙂 Ask questions, or whine about issues here. I'll try my best to keep it up to date. Makefiles needed for the OpenWRT-SDK can be found on the repo. mentioned above, if you want to compile it yourself.
  6. 3 points
    Pretty much this. Our team is slowly growing though, and we are getting a better handle on these kind of things at the moment. We'll hopefully update these kind of things in the very near future.
  7. 2 points
    Hak5 is proud to announce the release of firmware version 2.1.X for the WiFi Pineapple NANO and TETRA! Usually we would write a longer post highlighting some of the cool new features, but I think the changelog speaks for itself this time. ♥ - The Hak5 Development Team Edit: A fix for a small bug inside of Recon has been fixed by pushing an update to the PineAP module. You can download the update via the Module Manager. Changelog 2.1.1 PineAP Fixed an issue causing the Pineapple to respond to the wrong probes. Recon More details about encryption types and ciphers is now displayed. WiFi Direct networks are now correctly identified, instead of showing a channel of 0. It is now possible to add all SSIDs of a running (but paused) scan to pool. Fixed an issue causing the wrong encryption type being shown. Fixed an issue where iPhone hotspots would show an invalidly connected client. Fixed an issue where loading recon results would only ever retrieve the latest one. Fixed an issue where the live scan checkbox would become unavailable. Fixed an issue where the scan duration field would turn blank. Fixed an issue where logged probes would be shown on one line instead of being separated by a newline. Fixed an issue where after stopping a live scan, it could not be started again without refreshing the interface. Fixed an issue which caused downloaded recon results to be empty files. Clients Fixed an issue preventing OUI lookups being done on MAC addresses. Fixed an issue where the wrong SSID would be shown. Networking Fixed an issue where MAC addresses would not correctly randomize or be reset, causing the wireless interfaces to disappear. Module Manager Modules installed onto the SD card (NANO only) are now restored after a firmware upgrade. Configuration Fixed an issue where the timezone setting would not persist across reboots. Filters Fixed an issue where MAC filters did not prevent an SSID, Probe, or Beacon Response from being logged, or executed. Logging Added SSID and MAC modals to PineAP results, allowing for OUI lookups and note taking. Added the probe count to the downloaded PineAP.log. Fixed an issue where removing duplicates from the PineAP log removed the wrong entries. Fixed an issue where the reporting log would show invalid content. Notes There are now only two types of Notes: SSID and MAC. General Fixed an issue where SSID modals would show an option to add all clients to filters, even if no clients exist. Other misc fixes. Changelog 2.1.0 Setup It is now possible to configure the timezone, wireless country code, firewall rules, and filters during Setup. The changelog and other important information is displayed on first setup. Recon There is now a live mode, allowing recon results to be streamed directly to the browser. No more waiting for a scan to complete before viewing the landscape. Recon results are now much more accurate due to the smarter scanning behavior of PineAP. OUI lookup has been improved and MAC addresses are verified to check if they have been randomly generated. The last seen column has been added, showing when an AP or client was last seen. PineAP The PineAP suite has been completely re-written to be more robust and provide better results. Added options to enable or disable client (dis)connection notifications. An issue has been fixed where SSIDs in the PineAP pool, which contained non-ascii characters, were corrupted. Clients Connections and disconnections are now shown as notifications. Filters Fixed an issue where SSID filter modes would not persist across reboots. Fixed an issue where connections to the Management network were denied. Tracking Fixed an issue where variables would not resolve on the WiFi Pineapple TETRA. Module Manager Users will not be asked to confirm a destination on the WiFi Pineapple TETRA. Configuration Users can now run a custom script on reset button press. Advanced Upgrades will now be able to hotfix some issues before an upgrade. Networking On the WiFi Pineapple TETRA it is now possible to allow SSH and webinterface access over the WAN port. OUI Lookups Added the ability to look up the OUI of a MAC address. Added the ability to download and clear the OUI lookup file. Logging The PineAP log is now sortable by clicking on the column headers. The PineAP log now displays the number of times a MAC has probed for an SSID. Reporting The reporting module has been refactored. Notes It is now possible to take notes on BSSIDs, SSIDs, and MAC address (via the recon modal). Profiling This module has been removed for the time being. Help Updated help text where appropriate. More comprehensive debug script output. General LEDS can now be controlled using the led command. CLI capable modules can now be controlled using the module command. AutoSSH now defaults to disabled when not setup. libnet0 and libnet1 are now built into the firmare (fixes issues with ettercap, reaver, etc). Aircrack-ng has been updated to the latest version. Various other fixes.
  8. 2 points
    I hacked it, you "fixed it", I looked at your fix after you said you'd closed all the doors, I saw a work around for your fix, i.e. you didn't fix the problem. You want a paid pentest, it is what I do for a living, I'll happily send you a contract.
  9. 2 points
    There is no real advantage running the Nano plugged into the Tetra for kismet. The new kismet handles remotes as they are like local sources , hence if you have the Nano and Tetra running side by side as a kismet remote you are getting all the benefits of all 4 radios.
  10. 2 points
    its a weird one, as the kismet info says it can share wiresharks OUI db and thats similar format as aircrack by the looks of it :- https://code.wireshark.org/review/gitweb?p=wireshark.git;a=blob_plain;f=manuf Ahh wait, the aircrack-ng db has (HEX) appear between MAC and Manufacturer. Confirmed - i copy paste the link above to a manuf file in /etc/ and Kismet picks it up and works. @b0N3z maybe try that. manuf
  11. 2 points
    Updated Kismet just now. It should now use the "correct" older version of libmicrohttpd, please test it and confirm if possible. I've also tried adding support for libpcap, and pcre, as some users got some errors relating to that. Please check if those "errors/warnings" are gone. 🙂
  12. 2 points
    Yes. As long as the Tetra manages to map the device to eg: /dev/ttyUSB0 (or whatever device it gets mapped as.) Then if the Tetra manages to read from it, Kismet should also be able to read from it. I have an iPhone (yeah, i'm getting it replaced with an Android device in the future), and been having great success "wardriving" with the App: GPS2IP ($6.99 USD @ AppStore (URL)). So here's how do use it: Method 1: Using the command below on the Tetra will make netcat listen on TCP port 11123, and then forward the data to the device /dev/ttyUSB0 nc -l -p 11123 | tee /dev/ttyUSB0 & You then setup Kismet to use /dev/ttyUSB0 it should be receiving GPS data perfectly. (Remember: Socket must be marked in GPS2IP. The iPhone and Tetra has to be on the same network. Make sure to mark the correct network in GPS2IP, if not; no connections can be made) Method 2: Or you can setup GPS2IP to use Socket-mode, instead of using "TCP Push" as we did above. Using the command below on the Tetra will make netcat connect to your iPhone's IP and PORT, and then forward the data to the device /dev/ttyUSB0 nc 192.168.1.15 11123 | tee /dev/ttyUSB0 & You then setup Kismet to use /dev/ttyUSB0 it should be receiving GPS data perfectly. (Remember: Socket must be marked in GPS2IP. The iPhone and Tetra has to be on the same network. Make sure to mark the correct network in GPS2IP, if not; no connections can be made) This is on my todo-list! For example, the kismet version now is compiled "without" python support (for plugins). But as python most definitely does work on OpenWRT, i don't see why it shouldn't be able to work here. It might need some customized tweaking to get it working, but it's definitely on my todo-list. And should be doable. Hell, i got sslstrip+ working on these devices 😄 I recommend every one of you to watch this awesome video uploaded to YouTube by Hak5. (Wifi Cactus) Where they tested Kismet with like 20+ Pineapple Tetra's in a huge array. To cover every 2.4GHz + 5GHz channels, with no hopping! Each Pineapple ran a client, and they all reported back the WiFi-traffic to a main kismet-server, which you could access the web-ui on. Even with all these devices, and all that WiFi-traffic, it used quite low memory! But still, kinda limited RAM on the Pineapples. 64MB on the Nano, and 128MB on the Tetra. So my gut-feeling says to use swap on the Nano at all times. But on the Tetra; only if you experience issues. I have medium amount of traffic around my house, some neighbors , and a lot of bypassing cars, buses, etc. It only used about 8MB RAM in the beginning, and then scaled minimally. About libpcap, i'm gonna try to implement libpcap into this version. It's also on my todo-list 🙂 Last tip is to: Transfer the captures to a laptop, or thumb-drive. They can get quite big. Especially if you leave it running for a long time, in a high-WiFi environment.
  13. 2 points
  14. 1 point
    Hacking in general is a very broad based term. You will usually find that most have a favored 'specialist' area in which they develop an expertise in, as Its quite difficult to be a kung-fu master level 11 in all. For example, some prefer exploiting Web Applications on the server side, others on the client side......some specialize in Browser based attacks, whilst others are guru's in AP and Network exploitation etc etc. Some hone in on Remote Code Execution exploits, others on Cross-Site Scripting exploits, others on SQL/SOAP and other Injection techniques.....anyway, you get the drift.
  15. 1 point
    a probe request is made by the client to the AP. the mac address shown would be the device and the SSID is the name of the AP its looking for. The count is how many times that one device has called for that AP.
  16. 1 point
    Just_a_User, Everything seems to be working well now. I'm going to play with it a bit today/tonight to see how things hold up. Thanks again for the advice!
  17. 1 point
    No, we don't need "hacker" licenses, that's a really bad idea.
  18. 1 point
    Looks like they removed the pineapple command, unfortunately I couldn't find the doco or changelog about this. I had to take the code in /usr/bin/pineapple/notify (which is in PHP), and wrap a new PHP function around it, then include it and call it in MyPortal.php. Hope someone comes up with a better way to do this.
  19. 1 point
    No, wait. I see it now, read wrong lol. LIBCAP. Not LIBPCAP I'll see into it asap.
  20. 1 point
    Greetings bro I really hope there is a simplest way to bypass the OTP cuz i have search so much without a credible answer.
  21. 1 point
    Oh boy what a thread. i dont attend infosec meetings ect but what i do carry every day out side of that. Maxpedition. wallet with the norm wallet contents and a sparrows mace and expansion set and a few blank access cards. one plus phone ( what ever is latest i always upgrade) ( custom nethunter rom) Leatherman multi tool ( mut eod) sparrows creeper case with a full set of south ord slim euro picks with out handles ( the only ones that you can fit a full line of picks in a small case) a hall pass also in the case aswell as three different sized z bars and tok tools in the case. and i guess a water bottle. items i carry depend on the day. why lock picks ? , i drink alot of energy drinks , sometimes 6 a day as im a tradesman and most of the time bathrooms that are nere were i am working are closed after hours so i like to be able to shit in a toilet and not in the grass.
  22. 1 point
  23. 1 point
    No one will tell you how to penetrate a system because they are all different. What you need to learn is the basics and then put them together in an attack. I can teach you to walk but walking up a mountain is different to walking to the shops or through a wood or with friends. The best advice, and very few people listen to this, is to learn to admin or develop first. If you want to do network testing then learn to admin a network. Properly. Not two boxes at home connected to your router. Build big networks in VMs, put in different OSs, set up roles and services, do big things. If you want to be an app tester, install LAMP stacks, swap out Apache for Nginx, migrate to IIS, write some code, get database connections working. If you don't understand how things work you'll never be able to fully test them as everything you'll be doing will be blind. It is hard work, it isn't glamorous, you won't be able to show off your skills to your mates, but it will pay dividends in the long run. And stay away from CEH, it has no credibility in the industry. Look at things like SecurityTube instead, much better quality.
  24. 1 point
    are you allowed to setup a Demo Wifi? As Glowinghot666 said show them how insecure wifi in ggeneral is. Setup your tetra as a MITM don't pull any data just show them as a Proof of concept. Are you just trying to give them a broad overveiw of security or are their any use cases that they are looking for?
  25. 1 point
    https://twitter.com/daniel_bilar/status/934138325320871936
×