Jump to content
Hak5 Forums


Popular Content

Showing content with the highest reputation since 02/12/2011 in all areas

  1. 11 points
    Evil Portals A collection of portals that can be loaded into the Evil Portal module and can be used to capture credentials. Usage and more; https://kbeflo.github.io/evilportals I'd be happy to hear about issues, and suggestions. Feel free to ask anything, contribute new templates, and improve the project.
  2. 11 points
    Hi all -- big news we're super excited to share with you. If you've been following the recent 6th gen WiFi Pineapple developments you may have seen comments about 5 GHz. This has been on our road map for quite some time and man let me tell you it ain't easy. Then again, nothing worth doing ever is, right? Which is why we're excited to introduce our first ever dual-band device (2.4/5 GHz) -- the WiFi Pineapple TETRA! We're way ahead of schedule on the project and I want to give the forums community the first opportunity to get them in your hands because this ongoing project is made possible by you. Thank you! Ok - on with the good stuff! :) The WiFi Pineapple TETRA is the second device in the 6th generation line using the new software platform designed around usability and performance. So far the new modern interface has been very well received on the NANO and we expect the TETRA to continue taking the platform to the next level. Speaking of which, this is some serious next level hardware. The TETRA incorporates two Atheros dual-band (2.4/5 GHz) 2:2 MIMO radios capable of 802.11 a/b/g/n over a rock solid PCI Express bus directly connected to FOUR integrated skybridge amplifiers. With the included 5 dBi antennas we're right around 29 dBm EIRP -- which is huge. Range is incredible on this WiFi Pineapple. Under the hood it's a powerhouse. A 533 MHz RISC CPU from Atheros is running the WiFi Pineapple firmware - and it's not only 33% faster than the previous generation but it's based on the MIPS 74K instruction set. Adding to that we have 64 MB of high speed DDR2 32-bit memory and a fast SLC NAND controller with 2 GB of onboard storage -- so there's plenty of space. Ports are a plenty as we've gone with the classic Mark V style platform housing RJ45 Ethernet (eth0), 12V power, and USB 2.0 Host that'll support our new WiFi Pineapple Connector app on Android. Additionally we've incorporated some really convenient extras, like a built-in FTDI Serial UART over Micro USB -- so a console is never far! Next to that is an onboard Realtek USB Ethernet controller (eth1) over Micro USB so connecting directly to your laptop without Ethernet cables is a breeze! Furthermore, both the UART and ETH1 Micro USB ports can power the device over the included USB Y cables -- so most modern laptops can power it, as well as our Pineapple Juice 15000 battery included in the Tactical Edition of course :) This is a major milestone for the project and we can't wait to get them into your hands first. As you know developers are already working on the new 6th gen platform and this is one serious bit of kit that'll be taking advantage of all the new features. We invite you to get in on the ground floor with the TETRA from the HakShop at http://hakshop.com/products/wifi-pineapple-tetra
  3. 10 points
    In this video I walk through the basics of a the PineAP suite in a mock audit. This video covers: Linux ICS setup, logging in, Internet connection verification, Recon, Scan results, Unassociated clients, Filters, PineAP, Landing Page, Logging, Clients, Dashboard, Help and some of Advanced.
  4. 10 points
    Lookit, anyone that's been around for awhile, even noobs, there have been ups and downs. Hak5 stuck with it, I just want to say Thank you guys, I hope this year is a New Dawn. Thank you developers so much...guys lets donate a bit to them, they give us the good stuff....WhistleMaster, Newbi3, Foxtrot, sud0nic, Datahead, mbuckyboy, Ingsoc, hfam, ExigentCircumstance, patriceking, phpsystem, barry99705, leg3nd....ect ect... Whatever you have used.... Forgive me devs if I missed you, I had to post on my phone
  5. 10 points
    What would be a WiFi Pineapple firmware release without a code name vintage movie poster?
  6. 9 points
    Module: Site Survey Version: 1.2 Features: View APs around with information such as SSID, MAC, Encryption, Cipher, Auth, Channel, Frequency, Signal Quality. View connected Clients Vendor information on AP's MAC Start capture on AP Start deauth on AP Capture history with information such as number of IVS or 4-Way Handshake Change log: 1.2 Add timer to know when the scan will be finished1.1 View connected Clients Bug fixes
  7. 9 points
    MANA-Toolkit! Pineapple NANO + TETRA. (IPK installation-files, and source-files ready to compile with OpenWRT-SDK) MANA Toolkit includes a working version of SSLstrip2+dns2proxy for the Pineapples. Last update: 06.01.2018 Changelog: Updated to support latest Pineapple FW 2.0.2. (Just added some needed env. vars.) SSLstrip2, SSLsplit, dns2proxy, crackapd, net-creds, firelamb and every part of the MANA-Toolkit comes with the package. (Even aslEAP) Install procedure: root@Pineapple:~# wget -qO- https://raw.githubusercontent.com/adde88/hostapd-mana/master/INSTALL.sh | bash -s -- -v -v How do i start MANA? Make sure you are not using wlan1 for anything. If you are, hostapd-mana will not be able to set the interface to 'master' mode Type 'launch-mana' in the terminal to launch the attack. The attack will go silently into the background while at the same time giving output to the screen and log-files. root@Pineapple:~# launch-mana Type 'kill-mana' in the terminal to stop the attack. root@Pineapple:~# kill-mana Module: https://github.com/adde88/ManaToolkit I have released a pre-release version of the Mana Toolkit "Module" for the Pineapples. This lets you launch the attack from the Pineapples web-interface. General feedback or tips for improving the module are greatly appreciated! Github repo. + source-codes: https://github.com/adde88/hostapd-mana-openwrt https://github.com/adde88/hostapd-mana https://github.com/adde88/ManaToolkit (NEW BLEEDING-EDGE / DEV. BRANCH IS UP) The first repo. contains the IPK files you need to install everything, but it also contains the files you need to build it yourself with a proper SDK. The second repo. is used by the SDK. The SDK Makefile will download everything it needs from the github repo. to build the MANA-Toolkit package. You don’t need to touch the second repo. to get anything up and running. (OpenWRT-SDK handles this automatically.) The third repo. is the MANA Toolkit "Module", that needs testing and feedback from you guys. It also has a new dev-branch that contains my latest fresh changes, but it's not as stable as the master branch. Important directories: Config files: /etc/mana-toolkit/ Log files: /pineapple/modules/ManaToolkit/log (This is the log-directory, even if you don't have the Module installed) You will find the usual MANA Tools at: /usr/share/mana-toolkit/ OPKG Installation Files: (For those who want to install it manually) https://github.com/adde88/hostapd-mana-openwrt/raw/master/bin/ar71xx/packages/base/asleap_2.2-1_ar71xx.ipk https://github.com/adde88/hostapd-mana-openwrt/raw/master/bin/ar71xx/packages/base/hostapd-mana_2.6-5_ar71xx.ipk
  8. 9 points
    Hey all - just thought I'd share a great time I had with the NANO this weekend. My dear friends got married this weekend and I thought I'd have some fun, but not in the usual pineapple-y way. I wanted to wish them the best and congratulate them in my way - the hacker way. I loaded up the NANO with the Occupineapple module and created a list comprised of: Congrats Drew and Pete! Woohoo Pete and Drew! P&D 2016! Pete and Drew Tie the Knot! Pete and Drew Forever! etc, etc, etc I used a small usb battery, and fit it into my tux. People started arriving, and of course after the obligatory greetings and whatnot many of them pulled out there phones and were taking photos of themselves all dressed up. When they went to post to Facebook and Instagram, many of them noticed the new BSSIDs! Remarks such as "Whoa, whats this? Wow, cool!" and "Holy shit, Pete and Drew had a whole bunch of wifi things setup!" were overheard by my wife and I. Best of all, on the shuttle over to the reception, I cornered the couple and said "Hey guys, I think theres some wifi on the shuttle, that's pretty sweet". They both pulled out their phones and tried to connect, and upon seeing all the celebratory BSSIDs...ear to ear smiles. They both turned their heads to me, knowing I was somehow responsible, and we shared a great memorable moment. All because of the Pineapple. So big thanks to the hak5 crew and to Whistlemaster for the excellent module that added a bit more magic to the evening. You guys are the best telot
  9. 9 points
    Hey Everyone, Just three and a half weeks from dev launch, the WiFi Pineapple NANO is getting its first full firmware update. We're excited to bring you a number of bug fixes and features. In the coming days modules will begin to become available over the air through the Module Manager. Similarly the package repository is now online. Our next focus will be on API documentation. Thank you all for the continued support and feedback! Once again please submit any bugs found to wifipineapple.com/bugs Changelog 1.0.6: Wireless Update WiFi drivers from upstream Fixed an issue where the mac80211 driver would crash Fixed an issue where access to the WPA2 management network was lost Fixed an issue where adding a third radio caused the SD card to reset Recon Mode Added UTF-8 support Fixed an issue with channels not showing correctly Added more verbose security types Improved the scan reliability Logging Fixed MAC and SSID filters being case-sensitive Automatically apply filters when refreshing the PineAP log Misc Fixed tracking MAC being case-sensitive Fixed PineAP filters being case-sensitive Added nginx SSL module Fixed varius utf-8 issues Updated all system modules to their latest versions Ensure applications installed to the SD card can reference /etc/ correctly Ensure the correct PATH variables are set for the SD card Changelog 1.0.5: Fixed an issue with packages not downloading correctly Changelog 1.0.4: Added the ability to download the PineAP SSID Pool and Log Improved the stability of WiFi Client mode Improved various API components Changelog 1.0.3: Fixed an issue with Module Manager not upgrading system modules Fixed a couple of issues with the PineAP Pool Changelog 1.0.2: PineAP Improved the PineAP configuration view. PineAP Daemon is now a toggle which should clear up some issues and conclusions Fixed a bug where "Capture SSIDs to Pool" did not save for autostart Added a refresh button to the SSID Pool Added support for changing the PineAP log location Fixed jibberish SSIDs Networking Fixed an issue with a third external radio causing bootup and interface issues Fixed a bug where Android Tethering did not share the connection properly to clients Fixed an issue where scanning does not work when the radio is in monitor mode Added support for some ralink and realtek dongles Dashboard Clicking the number of connected clients / number of SSIDs in pool now opens up the appropriate module Fixed a bug where the "SSIDs added this session" counter would not increment Module Manager Module Manager has now been released Modules are going to be added over the course of this week API documentation for how to create custom Modules will be released shortly Fixed a bug where no SSIDs were show in the clients Module Fixed a bug where the SD card did not mount correctly Fixed a bug where no MAC dropdowns appeared next to some MACs in Recon Fixed a bug where the SSID filter would never change mode Misc Added and made public the Pineapple opkg (package) repository. Updated the old SSH ASCII banner The logout button is now a dropdown allowing for quick logging out, shutting down, or rebooting. API fixes We hope you enjoy this release! -The WiFi Pineapple Team
  10. 9 points
    Hey guys we're super excited to introduce our 6th gen wireless network auditing tool! We're calling it the WiFi Pineapple NANO. We engineered it from the ground up based on the successes and feedback from the Mark V with a focus performance and usability. What we ended up with is something total new. It's not a simple client radio, or just a router or access point. We believe the WiFi Pineapple NANO is the most powerful wireless network auditing tool you can put in your pants. It leverages our unique hardware design and intuitive new web interface to integrate with your pentest workflow. There's a huge emphasis on workflow and usability with the WiFi Pineapple NANO. We completely re-engineered the web interface built on modern standards. It's fast, intuitive, responsive and familiar. For example new table views give you a detailed look of the WiFi landscape and context menus provide instant access to core PineAP features and modules. But it's not just the web interface either - the entire system was rebuilt on a modern base and compartmentalized in way that'll allow us to take the platform to the level. Of course modules (ya know, Infusions ) remain a core feature. Over the air downloads of community developed add-ons and web front-ends to popular tools remain. The new API is extremely simple for seasoned developers and newcomers alike. We also put together a really sweet Tactical kit. The case straps to your bag as an every-day-carry including a new Pineapple Juice battery pack. We even tailored the case with a nice Hak5 imprint liner and a cut out for the USB host port so you don't have to take it out of the case to plug in your phone. Oh yeah, it works with your phone now. The new WiFi Pineapple Android app simplifies USB Internet connection sharing. You just tap to tether and it instantly connects to the beautiful new mobile friendly web interface. No root required. https://play.google.com/store/apps/details?id=org.hak5.pineappleconnector You can also plug the NANO into your laptop and it'll both power on and enumerate as a USB Ethernet adapter so less cables and mess. And if you're doing a long term deployment, you can just plug the NANO into any standard USB power plug. Getting out-of-band access is even easier seeing as it supports the new gen of QMI-based modems. Here'a an intro video Seb and I made: So it should be no surprise that we had been working very hard to bring the new device for our little WiFi Pineapple ecosystem. What really surprised us though was the Mark V availability ending so soon. We were caught off guard post-DEFCON when our parts supplier notified us that the RTL8187 would no longer be available. We had developed a Mark V successor prototype using an alternative chipset, one that would allow for a somewhat inline change, but we found it came with a number of new complications that made the change unfeasible. At that time we had also anticipated the launch of our new WiFi Pineapple device to be much sooner. That being said, with as meticulous as we have been throughout the development, it's added considerable time to the process. Thankfully though our attention to detail has paid off as what we've developed is nothing short of amazing. We're so proud of the new device! Design decisions were made based on feedback from users and directly by observing the way in which the Mark V is being used, and it's clear we have a real winner. Unfortunately we underestimated the time in which certification takes to complete. For the last month and a half we've been anticipating the ability to launch for mass availability "in just another week or two". We have CE. We have FCC. We even have units in hand, awesome firmware, and a team raring to go. The latest development is that we're undergoing SAR testing, and sadly between labs being backed up and the new dongle requirement - we're looking at needing to wait just a while longer. The good news is that we're ready to launch for development and evaluation - meaning software developers like you here on the forums will now have early access to the new device. I want to give the core community that has been so good to us first dibs. Link at the bottom of the post. We'll be updating the other sites soon in anticipation of the official launch. Lastly, thank you for your patience and continued support for the project. I know it's not easy when we run into snags like this, especially while we're working tirelessly and quietly to bring something epic to the WiFi Pineapple community. And yes, we're rethinking that quietly part now. I'll keep you all updated with all of the latest as we take this next big step together and I'll try my best to answer any questions you have. Order the WiFi Pineapple Evaluation and Development Kit here: https://hakshop.myshopify.com/products/wifi-pineapple-nano-evaluation-and-development-kit Specifications: CPU: 400 MHz MIPS Atheros AR9331 SoC Memory: 16 MB ROM, 64 MB DDR2 RAM Disk: ROM + Micro SD Card Reader (card not included) Wireless: Atheros AR9331 + Atheros AR9271, both IEEE 802.11 b/g/n Ports: (2) RP-SMA Antenna, Ethernet over USB (ASIX AX88772A), USB 2.0 Host, Micro SD Power: USB 5V 1.5A. Includes USB Y-Cable Configurable Status Indicator LED, Configurable Reset Button FCC NOTICE: This kit is designed to allow: (1) Product developers to evaluate electronic components, circuitry, or software associated with the kit to determine whether to incorporate such items in a finished product and (2) Software developers to write software applications for use with the end product. This kit is not a finished product and when assembled may not be resold or otherwise marketed unless all required FCC equipment authorizations are first obtained. Operation is subject to the condition that this product not cause harmful interference to licensed radio stations and that this product accept harmful interference. Unless the assembled kit is designed to operate under part 15, part 18 or part 95 of this chapter, the operator of the kit must operate under the authority of an FCC license holder or must secure an experimental authorization under part 5 of this chapter. For evaluation only; not FCC approved for resale.
  11. 9 points
    To all those that are whining about "customer service" and/or the "we want value for money" boys; you're not only giving your money for the hardware, you're also supporting innovation. You're supporting a good cause, see it as a way you can make Unicef keep doing what they do. But without the CEO that fills his pockets with $1000000 a year. Besides that, they have given us more updates for the hardware then Linksys, Netgear and Belkin did combined for all of their stuff in the past year... And not only you get the best piece of hardware you yourself never could come up with, they also are giving you a weekly dose of technolust, and everything that surrounds that. Have you ever seen a company that gave you as much bang for buck than these bunch? No you haven't. It's absurd how much heart they put into their product, it is pure love and dedication. You can't even compare it to another company, these are the people we need more of in the world, make sure they can keep doing what they do.
  12. 8 points
    Hello all, With MAC's (and Linux) you have to know the device of course to serial into it. To make it quicker for me I wrote the below script to search the MAC for the bash bunny (If you have multiple modems this may not work for you) and prompt you to connect to it. Feel free to use and modify as desired. #!/bin/bash # # Title: Mac Serial Connect # Author: NightStalker # Version: 1.0 # # Finds the Bash Bunny in the /dev/cu.* location and # prompt you to connect to it. clear bunnyloc=`ls /dev/cu.* | grep usbmodem` echo "Bash bunny is located at: $bunnyloc" read -r -p "Would you like to connect to it? (Y/N): " connanswer echo $connanswer if [ "$connanswer" == "N" -o "$connanswer" == "n" ] then exit 0 elif [ "$connanswer" == "Y" -o "$connanswer" == "y" ] then screen $bunnyloc 115200 fi
  13. 7 points
    Hi All - I've started the beginning of a comprehensive user manual on the WiFi Pineapple NANO and TETRA. This will eventually become available as a PDF download, but until then I invite you all to review and comment on the living Google Doc either here or in the doc. https://docs.google.com/document/d/1KVYSTedUJTjn8VxG2Wk2iXeo3QHnnwM8V1GVFnr8w8c I'm very excited to hear your feedback on what I believe will help many newcomers and veterans alike with this project. Cheers!
  14. 7 points
    not sure what it is yet but just shut up and take my money!!!
  15. 7 points
    dafuq are you talking about? If you have a problem with a module post the issue in its support thread and the developer will help you.
  16. 7 points
    TL;DR: The NANO isn't txpower locked -- they're capped the chips maximum which is what we've implemented. No magic command is going to push the silicon past its spec. The easy way to increase total output power is with a higher gain antenna. If you want to take it a step further, I recommend using a low noise amplifier like the USB powered ALFA booster in the hakshop. There's a lot of myth and legend surrounding txpower, mostly because improperly configured systems would let you set the txpower as high as the config file would allow -- but not actually do anything. So while you can sometimes issue a command to set txpower to 30 and the system will report back 30, it won't actually do anything on the radio side. No special command is going to push the silicon to output more than it's made to, regardless of what the OS says -- and that goes for any system. Here's how it actually works: You start with a radio SoC. In our case chain0 is AR9331 and chain1 is AR9271. Actual silicon is typically between 16-22 dBm depending on mode. (HT40 for instance, while twice the bandwidth, typically sees lower output power than HT20). The txpower reported by the OS is determined by a special partition which is written to when the board is calibrated at the factory. This calibration is essential to the sensitivity, reliability and overall effectiveness of the device since no two things in the universe are 100% identical. #physics. What you end up with is the output power in dBm. Then you have the antenna, which is rated in dBi gain. The NANO ships with small 2 dBi gain antennas -- though we will soon offer a pair of 5 dBi gain antennas specially fit for the tactical case. The more gain, the higher the total output power. When you add the two values -- the dBm output and dBi gain, you get your total output power in dBm. It's often called EIRP. For the NANO that's 20 and 22 dBm. A watt calculator will tell you that a stock NANO can output some 158 mW while an upgraded 5 dBi antenna brings it to 316 mW and a 9 dBi will get you to 800 mW. If you want to increase the output power further, you'll need an amplifier. These are large and expensive, but when paired with the right transmitter and antenna can greatly improve performance. We have four skybridge amps built into the TETRA -- which constitute nearly 50% of its mass and at least half of the power budget. For them to work efficiently they need to be tuned and they'll want a relatively lower input power. It's sorta like how you don't want your iPod cranked to max volume when you plug it into your car stereo. The NANOs size, cost and power budget couldn't warrant such onboard amplifiers, but that's not to say you can't use one downstream. It's just a matter of plugging in and powering on. The ALFA booster in the HakShop will up the NANO output to 27 dBm (500 mW) or 29 dBm (800 mW). The later with a 9 dBi antenna will do 6.3 Watt and the former with a 15 dBi antenna will do 16 Watt -- both legally. Here's some further reading: http://www.cpcstech.com/dbm-to-watt-conversion-information.htm
  17. 7 points
    If you read through these forums a few things should become readily apparent. First, this community is very supportive and helpful and Hak5 is quite responsive. You'll also notice that many threads are successfully marked answered, and many others do not require such tags. Some have to do with newcomers to the project, or Linux as a whole -- and that's awesome (we welcome you). Most of the "unanswered" threads are known issues being addressed by the upcoming firmware release this week. I'm using a beta build on 1.0.2 now and it has addressed many of the concerns. Likewise if you take a few steps back and look at the project as a whole you'll see that throughout the lineage of the WiFi Pineapple, the tool has grown leaps and bounds in both hardware and software. For example the Mark 1 and 2 on the very original "jasager" firmware only allowed for enabling/disabling Karma, watching a log, managing a black/white list and seeing connected clients. That's it. We've come a LONG way... We're only at the very beginning of the 6th generation. We're in a development and evaluation phase where documentation and modules are being written, feedback is being gathered, and the project is being refined. Yes, there are bugs (that have been and will continue to be squashed) and yes we'll encounter hiccups along the way -- but through it all you'll see us continue to up our game and stand by our WiFi Pineapple. In the last 3 years there have been 50 firmware updates. 50. Each bringing bug fixes, security improvements, and features -- many of which are based on feedback from this community. The constructive critical feedback we've been receiving in the last two and a half weeks have been immensely positive and valuable in refining this WiFi Pineapple. If you have similar constructive critical feedback, it is wholeheartedly welcomed by Seb, myself, and I believe this community as a whole.
  18. 6 points
    For all the people who are new at this whole “computer†thing and don’t really understand what hacking is all about and where to begin, I offer up these links to some great places to start learning. Please contribute to this thread and I will keep it up to date. Probably should be made sticky. News: www.digg.com www.slashdot.org Presentations: http://www.lessig.org/freeculture/free.html <-- A speech given talking all about the problems facing culture when dealing with copyright and other digital laws. Podcasts: http://www.grc.com/SecurityNow.htm <-- This is fantastic for people who are new to the field. If you have the time or motivation, go back and listen to them from day 1, they assume you know very little if anything and hit on all of the major topics in the security field. Fantastic show. IPTV Shows: http://www.binrev.com/ <-- Produce a good IPTV show and also have forums that are usually helpful. http://www.hak5.org <--- Duh.... Tutorial sites: http://www.remote-exploit.org <-- Pretty good resources, some very nice video tutorials on various exploits. Defiantly check out the tutorial section. http://www.irongeek.com/ <-- Excellent tutorials/information/articles. http://www.antionline.com/ <-- Tutorials, tools and forums full of helpful people. Programming Related: Teach Yourself C in 21 Days: http://neonatus.net/C/index.html Teach Yourself C++ in 21 Days: http://cma.zdnet.com/book/c++/ The Art of Assembly Language Programming: http://maven.smith.edu/~thiebaut/ArtOfAssembly/artofasm.html Microsoft Developers Network: http://msdn.microsoft.com ----Web Programming: HTML: http://www.w3schools.com PHP: http://www.php.net ASP.NET: http://www.asp.net/Default.aspx?tabindex=0&tabid=1 SQL: http://www.mysql.com Perl: http://www.perl.com/ Python: http://www.python.org Security Related: SecurityFocus: http://www.securityfocus.com/ Milw0rm: http://www.milw0rm.com SecurityForest: http://securityforest.com/wiki/index.php/Main_Page
  19. 6 points
    I'll be demoing this on next weeks Hak5 episode but figured I'd post it here first and get some feedback. Thus far it works perfectly on a Galaxy Nexus running the latest Android 4.2.1. I've also tested it with a Galaxy Note 2 running 4.2.1 and it ran as expected. I'm very surprised that with the stock Android OS and recommended settings of setting a PIN code this was possible. I had expected the phone to reset or format after 100 attempts or something like that. With a 4 digit PIN and the default of 5 tries followed by a 30 second timeout you're looking at a best case scenario of exhausting the key space in about 16.6 hours. Not bad all things considered. If you're the NSA or the Mafia that's totally reasonable, I'd say. Thankfully the USB Rubber Ducky never gets tired, bored or has to pee. Rather than post the nearly 600K duckyscript I'll just post the bit of bash I used to create it. You could modify it to do 5 digit, but that would take 166 hours. 10 digit would take 1902.2 years. ;-) echo DELAY 5000 > android_brute-force_0000-9999.txt; echo {0000..9999} | xargs -n 1 echo STRING | sed '0~5 s/$/\nWAIT/g' | sed '0~1 s/$/\nDELAY 1000\nENTER\nENTER/g' | sed 's/WAIT/DELAY 5000\nENTER\nDELAY 5000\nENTER\nDELAY 5000\nENTER\nDELAY 5000\nENTER/g' >> android_brute-force_0000-9999.txt [/CODE]
  20. 6 points
    Hey Everyone, As is likely apparent from the name, Buffalo Bulldozer is a rock solid release with the intent of synchronizing a stable base for both WiFi Pineapples in the 6th generation - the NANO and TETRA. We've implemented some major improvements to the Recon mode of the PineAP engine, both increasing accuracy as well as stability. Recon scans now gather both AP and Client information by default using only one radio. This change decreases wlan0 overhead, allowing for faster association responses and uninterrupted communication with connected clients. WPS detection has also been added to Recon, further adding to the at-a-glance visibility of the wireless landscape. Information gathering is also enhanced from the Recon view with each client's probe requests visible from their respective menus, meaning you'll be able to immediately identify targets without having to page over to logs. Under the hood the kernel has been updated, upstream wireless fixes have been applied and packages have been updated. We feel you'll find this release rock solid throughout and we're eager to hear your feedback. Please as always use the bug tracker from https://www.wifipineapple.com/bugs This major release paves the way for an upcoming "CC" version and its accompanying cloud infrastructure. We're excited to share these developments as the project progresses. Once again thank you all for your support. This is truly the best time to be a WiFi Pineappler and we're grateful for this community! -- Seb & Darren Changes can be found at https://www.wifipineapple.com/downloads#nano.
  21. 6 points
    It really depends on what you're wanting to do. The Armory has some nice specs for a dev platform - so if you have a specific use case in mind and are keen on the programming, go for it. The Bash Bunny is a purpose built pentesting platform. We emphasize the convenience factor and really try to foster a healthy development community around the tools. It's a simple plan that's been working for us for nearly a decade as we've been making infosec tools. So - you could probably do some nifty attacks with the Armory, but there'll be more heavy lifting involved. As for the hardware differences - while Micro SD is nice for memory expansion, the fast SLC NAND memory in the Bash Bunny is one of the enabling factors for the quick boot -- which is very important for physical pentest engagements. The Bash Bunny has a 50% higher clock speed and 4x more cores. The other specs like RAM and dimensions are similar. At the end of the day it's really the software, community, and continued support you've come to know from Hak5 that makes the difference.
  22. 6 points
    No we aren't... Some people read books then go out and sell their services as testers and let people down. That reflects badly on the industry and can get clients into trouble if they trust bad advice or rely on faulty results. Some people pose as testers to ask questions that they know if they asked offering their real intentions that they would be kicked off. Some people are just hobbyists. Someone who is a working pen tester would know how to scan a network to find user names and would know that you can't know what reach you have into a network without looking.
  23. 6 points
    Hi This is a module that allows you to quickly generate a template for your GUI module. You can also manage the modules you have generated in the past. Module Maker creates a template for your module, with some comments to help you understand what each file does and how they work together. Images are available in the spoiler. -Foxtrot
  24. 6 points
    ZaraByte - Thanks for providing detailed feedback on the WiFi Pineapple NANO. While it is unfortunate that your particular Android device does not support USB Tethering, I have yet to see any indication that your NANO is not working properly. Similar to the wp6.sh script, the WiFi Pineapple Connector app is provided free of charge as a convenient way to tether the device. The former is a front-end to iptables, and the later is a front-end to figuring out the IP address of the WiFi Pineapple on your Android device when USB Tethered. Given the nearly infinite unix network configurations and nearly 20,000 unique Android devices, we cannot possibly warrant or support each. Not all Android devices support USB Tethering, and we are not in control of that situation. Simply put, the issue is far outside the scope of this project. That said, we're here on the community forums to be as helpful as possible. There is no one way to use the WiFi Pineapple, and creative solutions are presented all the time. As xrad pointed out, iMcPwn's tutorial on Easy Tether for Android may be helpful. https://forums.hak5.org/index.php?/topic/37101-questions-about-usb-tethering/page-2#entry270022 Similarly the WiFi Pineapple may be tethered over its built-in USB Ethernet controller in Windows, Linux, OSX, Android, or via WiFi to an access point or portable hot-spot. The requirements listed on the box state "Computer, Smartphone or Tablet" as well as "Internet Connection for Setup". In a previous video you demonstrated the new interface, so obviously you have completed setup successfully. I also see a Windows computer in your video, so might I recommend the following Hak5 video on Internet Connection Sharing with Windows: The WiFi Pineapple NANO is in a development and evaluation phase while we finalize certification -- and we're providing early access to developers and evaluators to gather feedback, make bug fixes, refine features and develop modules. Based on your shown expertise, I am confident that you will be able to use your NANO rather than relegating it to the "gadget box". Regarding the USB Rubber Ducky - it has always shipped with the same factory firmware -- so there's no way your friends device was a paperweight due to an out dated firmware. We do support flashing community firmware versions through the DFU bootloader, but those aren't made by us. Saying "Typical Hak5 sell you stuff that doesn't work correctly half the time" is absolutely bogus. Everyone here is trying to be as helpful as possible, and while we value your input, a little less hostility would be appreciated. We stand by our products and I reject any statement to the contrary. If you're not satisfied with the NANO, I'm happy to take it back.
  25. 6 points
    I'm planning on doing some videos covering the core functionality. For right now I highly recommend checking out the Help section in the new interface. I know it sorta sounds like I'm saying RTFM, but as the author of TFM -- I tend to think it's pretty good