Jump to content

Leaderboard


Popular Content

Showing content with the highest reputation since 08/12/2019 in Posts

  1. 3 points
    Hey there - welcome to the community! I understand that the modules and payloads are a big factor of Hak5 gear, and it's our goal to create powerful pentest platforms that make it convenient to execute complex attacks. Over the years the community developed contributions to these projects have increased, as has our arsenal as a whole. With WiFi Pineapple firmware version 2.6, we're introducing a major update to the platform by jumping openwrt base from 15.05 to 19.07. At this time OpenWRT has not officially released 19.07 - it seems to be "late" if one goes by the version numbering scheme. Still, we wanted to build on top of the latest possible base so that we could take advantage of the most up to date Linux kernel. As with most major OS updates, package support may lag behind the initial release. This had not been the case with previous WiFi Pineapple firmware versions for the NANO or TETRA, however with the move to 19.07 some bumps in the road were to be expected. As a general rule developers are notified of upcoming releases and community members are encouraged to join the beta program to provide feedback via discord. See https://shop.hak5.org/pages/community We strive to ensure that all core functionality is thoroughly tested and works as expected before release. This covers the first-party modules, such as PineAP, which ship with the firmware. Additionally any underlying changes to packages or the API are documented so that third party module developers can make the most of the new firmware. Usually if a module breaks it's fixed in short order. I can say from experience this is the first instance where module updates were required to this extent - and that's likely due to the new linux base. It's something we're aware of, and we're currently working on a fix. Learning from this experience going forward I am reviewing our processes to see if there is a better release channel or means to incorporate module developers with releases. Thanks, Darren
  2. 2 points
    The whole point of the Pineapple is for legitimate security testing and research. I've not heard of any countries where it would be illegal to use for either personal research or where you have a legitimate business reason.
  3. 2 points
  4. 2 points
    If you aren't in a team and the rest of the company don't know anything about jail breaking phones then I think there is something wrong with the company's business model.
  5. 2 points
    I struggled for some time with mine. I was interpreting the instructions to mean that the first flashing sequence was the SELECT mode. It seems that the first blinking sequence that lasts like 10-15 seconds is the booting. Then a solid red light for maybe 5 seconds or a touch longer even, *THEN* it does the fast blink which appears to be the 3 second SELECT mode. I was hitting the button during the boot. Maybe that's apparent to others, but I F'ed around with the thing for some time before I got that down. Then I was able to flash it and then repeat that SELECT mode to get to ARMING mode after the update/upgrade. From there the SSID was up and I ssh'ed in, changed root password and then set the network up with a different ESSID and encrypted. In case it helps anyone else save some time...
  6. 2 points
    I can't install Module Dependencys (SSLSplitt) I will start and say they are not installed. Rebooted and the same thing. Formated SDCard, does not help.
  7. 2 points
    Hi everyone, After the upgrade to the firmware 2.6.0 my Dwall isn't working anymore. Anyone is having the same problem?
  8. 1 point
    Hi! We're very excited to announce the release of the 2.6.0 Firmware for the WiFi Pineapple TETRA! We've been working hard behind the scenes, listening to the great community feedback and building upon it to iron out reported bugs, add new features and bring updates to everyone's favourite fruity wireless device. Whether it's the updated kernel, fresh packages or improvements to PineAP and Recon - there's something in this firmware for you. Change Logs for 2.6.0: General Update firmware base from OpenWRT 15.05 to OpenWRT 19.07. Update kernel from 3.18.84 to 4.14.133. Ensure all opkg feeds are HTTPS. Update PHP5 to PHP7. Update HostAPd from 2.6 to 2.7. Improve SD Card stability on the WiFi Pineapple NANO. Include support for the MediaTek MT76x2 wireless chipsets. Dashboard Fix an issue where the "SSIDs collected this session" counter wouldn't reset after a reboot. Use more reliable method of obtaining CPU usage. PineAP Fix a rare crash due to memory corruption. Fix an issue where PineAP options would unselect if PineAP was disabled. Fix an issue where PineAP Enterprise would not work if Management AP was disabled. Improve beacon effectiveness by rotating through SSID Pool. Greatly improve memory and CPU consumption. Fix an issue where Raw Frame Injection might hang indefinitely. Add an option to reset the 'SSIDs collected this session' counter on the Dashboard. Recon Ensure that previous scan dates are displayed correctly. Networking Improve Client Mode reliability. Configuration Fix an issue where the user configured timezone would not set correctly. Advanced Fix an issue where the SD Card format may hang indefinitely. Misc Update Cloud C2 Client. Packages Add Kismet Package. Add Kismet Remote Capture Package. Updates to a huge variety of commonly used packages. A special thank you to the community members who provided excellent beta feedback: - adde88 - dragorn - Just_A_User โ™ฅ - The Hak5 Development Team
  9. 1 point
    I don't know about every countries law but if you have contractual permission from the network/company owner i don't see how it can be illegal as to me it seems you would effectively be temporarily employed to test "your own" network. I would be surprised if any country finds that illegal. EDIT - or maybe there are counties where having one in itself breaks local laws. let alone using it. if so let us know.
  10. 1 point
    Press and hold the button before you plug in the power, then let go between 3 to 7 seconds later.
  11. 1 point
    I bought a new 32GB micro-cd card. So I put it into my nano with the newest firmware, and tried to format it using the Web-UI. It just did not work. So I dd-ed the first 1M with zeros, rebooted the Nano, and it worked, as I could see on the UI: /dev/sdcard/sd1 28.1G 44.4M 26.7G 0% /sd Actually I cannot go back to that state to check the difference, and I did not make any notes. All I could see was 2 partitions, and it was on /dev/sda1 and /dev/sda2 Maybe this will help the developers.
  12. 1 point
    But if you NEED to, you might be able to attach a USB keylogger to the port closest to the pigtail and then connect a keyboard to that so it passes through to the system you're connecting it too...
  13. 1 point
    Yes, you read correctly. It is a USB passthrough port. If you wish to add another radio you will need to use the USB host port (furthest from the pigtail). The Signal Owl is not a keylogger.
  14. 1 point
    I assure you, I am not. I do often break things, logically speaking. Flushing the ram helps get some of the conwebs out. You can also wipe the phone through DFU. Itโ€™s akin to sliding an uncompromised operating system under your current OS and uprooting everything with a fresh install. Issues with this though can come from restoring an infected backup (both from the iCloud and physical). If you go this route. I suggest backing up (via copy and paste) photos, contacts and notes/important docs as needed. Disable/delete all icloud backups and reinstall a fresh OS through your computer or the apple store. Then manually reinstall all the apps youโ€™d like. Think of it as a house fire. Purge well and purge often.
  15. 1 point
    After I install a module like nmap on my sd card it then says that the Dependencies are not installed, after I try to install them on the sd card it would say installing however after 20 or 30 seconds it would go back to Not installed. I have factory reset and reboot the nano but still having the same issues. If there is anyone who could help me in the right direction that would be really helpful. Thank you
  16. 1 point
    Hey WPA2, I agree that it can stretch the budget, but it depends on why you want it? If it is to be added to your arsenal as part of your business, then I am sure you can recoup the expenditures. If, on the other hand, it is because you want one rather than need one, well, that is a decision that relies on available finances. For me, it is the former, but having tried edutech on several occasions and no joy (not even for a ducky), it is hard to see where else other than HAK5 shop, you can get one from. Sometimes, just sometimes, they do sneak onto ebay or even Amazon, if that helps you at all๐Ÿ˜Ž
  17. 1 point
  18. 1 point
    It is well worth the money........although the shipping as you say is 'not so good', but there are no other options at this stage. Would love to be a HAK5 distributor.........great products and excellent staff. ๐Ÿ˜Ž
  19. 1 point
    Hi buddy, Great set of questions........who watches the watchmen springs to mind.......Personally, and without going into too much detail, I think you should use an RFID secure wallet for your cards and possibly the card sleeves option as well (known colloquially as the belt and braces system). Yes your phone app is reading your card data and no doubt used by the provider to then target you with tempting offers. It is all part of the cyber marketing exploitation targeting potential customers process. Totally legal as you do not own the cards (the provider does) and the terms and conditions that you read (yeah right, we all do that) will have buried in there somewhere that they can do this. It is obviously something that you need (the card), so I would choose to either keep the card in a safe place (at home) or ditch the app, as you can always check your balances etc., at home on your own computer via SSL etc., but these are just my views. I hope this helps in some small way๐Ÿ˜Ž
  20. 1 point
    get the nano online, then run opkg update && opkg install nmap or if you need to install to sd opkg update && opkg install nmap --dest sd should get you sorted
  21. 1 point
    This a topic for the Pineapple thread. It has been answered multiple times already.
  22. 1 point
    Iโ€™ve thought about weather proofing as well. Iโ€™ve done short jobs with the tetra in an unpadded pelican case with a battery pack. Head wasnโ€™t too big of an issue but there was a good amount of space, in a shaded area. A remote thermometer would help guage that though. I donโ€™t know enough about PoE. Whatโ€™s the power capacities of PoE? You asked about antennas and I would suggest encasing the entire tetra and antennas. Otherwise, seals around the antenna ports would become a point of failure.
  23. 1 point
    oh good glad you found the fix, that would also answer why my cabe for the one plus works.
  24. 1 point
    I forgot the bin bash. Now it works, Thanks Sect10n_9.
  25. 1 point
    its from the upgrade of opnwrt 15.05 to 19.07 Modules need fixed, its a known issue and somebody is working on it
  26. 1 point
    I'll save them a search....pretty damn unlikely without a computer for a start ๐Ÿ˜‚ And why without a computer? Haven't you been granted physical access to the iPhone? ๐Ÿค”
  27. 1 point
    This is a known problem and is being worked on. Modules are created by community and need to be fixed by the devs, if they choose to do so. Foxtrot said he would work on the issue, give him some time.
  28. 1 point
    Hi Bigbiz, Not sure where to start with this post..........oh well, here goes....... I followed your 7 steps to success and I cannot beige that it actually worked!! ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅNot that I didn't believe you, it was more of whether I believed in myself.....and that is the honest truth. Upon reflection and comparing all the advice I had received from other sources, I realise where I wasted 48 hrs and was going wrong. How to get it all wrong: First of all do NOT believe that simply installing the said Kali NetHunter App Store will get you anywhere fast (by the way, as you didn't mention the store I decided not to do that on this occasion, I did on at least 5 other occasions). Secondly, flashing kernels and the like........what a waste of time that is.........get the phone rooted and crack on.......๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ Thirdly, Installing SuperSu simply crashes and when it is granted all of the permissions known to man, it tells you that your device is not rooted properly.........deleted it and decided to try Root Checker ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ and behold it stated what I already knew........device is rooted...... And last but by no means least.........unzipping the Kali file using Magisk Manager when one should be TWRP......... So, I can only thank you Bigbiz.........for finally letting me see the light and using your wisdom to assist me........especially appreciated as I didn't have to sit for another 6 + hours of useless YOUTUBE videos claiming they have the answer, when clearly 99% do not.๐Ÿ˜ˆ Thanks again Bigbiz ๐Ÿ™
  29. 1 point
    Nice........well done for posting and pointing the temporary solution
  30. 1 point
    I agree, having some sort of management option is a must with this device. I am curious if it could be set up with a WiFi or Bluetooth chip in the usable USB slot but I'm worried about storage space for the "Loot" or how many times it has failed during boot for me even after 1 day. I know we are on firmware 1.0.0 but it really seems to have issues during boot. It seems like every other boot attempt either fails or corrupts the current "Payload". I've taken to leaving the USB stick plugged in as the only way to ensure a clean boot. once its online it can be removed and reinserted if necessary. It does seem to auto mount the sda1 without issue. My next experiment will be having it C2 connect to a domain outside of its network. Though from an engagement standpoint this would be dangerous as it would leave a traceable connection. I just want to be sure that it can be pointed in that direction and if i can set a custom port to use. on the receiving end i will use a custom port number as well and see if it can be hopped across multiple connections. Think Seedbox, in an offsite location where i can connect and download at will, a sort of logging server. For a BlueTeam device this might be an interesting "Canarie". i could leave it onsite at locations that have experienced issues or is at risk. Have it uploading a constant NMAP or other tools and set alerts on the logging server to alert me when certain conditions are connected. This is already something that can be done with other devices but i like the low power use and the Stealth aspects of this device. Its small, light, and can easily be mistaken for a USB hub. I have already use a Pineapple Nano for this in a few circumstances but this would be an interesting addition, assuming the bugs can be worked out.
  31. 1 point
    So it's the antennas that raise suspicion, not the big pineapple logo with Hak5 badge on it, assuming you have a tactical bag? Disguise the antenna or add an extension cable so you can run the antenna along a seam instead of directly attached to the unit. Or stick other tall objects out the corners like a ruler or a flashlight to disguise the antenna?
  32. 1 point
    Right, now, let us have a brief discussion MangoNing, as I am a rather relaxed chap and the fact that I try and help people, does not give anyone the right to take advantage of my good nature (as it gives me the raging hump)! Based on the fact that I have been reliably informed that posting the item you are after would potentially land you in prison, I will not be aiding and abetting nor condoning facilitating that possible outcome. Please do not try and entice other people on this forum with your illegal requests........as they too are likely to get the hump. Have a good day๐Ÿ˜ˆ
  33. 1 point
    you seem to have 2 seperate issues. 1. your storage is not full, the ROM is and thats perfectly normal. your actual storage (overlay) is 21% used with the remainder free. 2. you seem to have an sd/ mounted but as it has no swap file it seems it is not set up 100% correctly so is worthy of further investigation.
  34. 1 point
    Upgrade files are for upgrading only, the factory version is for flashing when in recovery mode. That is possibly why you can no longer get to recovery mode. Its worth reading the documentation before doing a firmware recovery for the first time https://docs.hak5.org/hc/en-us/articles/360010471774-Firmware-Recovery or ask in discord/forums/IRC before flashing.
  35. 1 point
    I just fought through this too. First make sure you have easy access to the device since you have to see the back of the device to coordinate the button push while at the same time look at the front of the device to determine which of the 5 blinking speeds is occurring - <rant> apparently they ran out of RGB LEDs and thought a light flashing at various speeds on the opposite side of the device than where you're looking/working was the best solution given the lack of RGB hardware. </rant>. This first point of note is that the 3-second mode selection phase is not within 3 seconds of boot, but rather during a 3-second period when the red light blinks the fastest during the boot (2-digit millisecond-off intervals, not 3-digit millisecond-off intervals. or 32nd-note intervals vs eigth-note intervals). This period happens several seconds into the boot process after the OS has loaded and is ready to accept user input. The second point is to not hold the button in, but make sure it a firm, short press, after which you should see the recurring double-blink indicator.
  36. 1 point
    Hi SteveMatrix. Take a look at the thread called "anyone else having issues getting signal owl to work?". For me, the reply from Wes actually describes the process of putting the Owl into arming mode. Basically, plug it in and wait longer than one might expect. For me, as soon as I plug it in there is a very brief flash from the red LED, then it goes blank for 10 seconds, then it flashes moderately quickly for about 5 seconds, then it speeds up a bit for about 10 more seconds, then it goes solid red for about 25 seconds, then it will flash very quickly for about 3 seconds. This is the point where you need to poke something into the button on the back of the device. At this point, if you get the timing right, you will see kind of a double flash repeating and you will see the Owl_#### SSID appear about 30 seconds after. I hope that this helps.
  37. 1 point
    Did you maybe flash an upgrade file to the recovery page? and not a recovery version? https://downloads.hak5.org/api/devices/wifipineappletetra/firmwares/recovery Worth a check. If you can get back into recovery, flash the factory verson and if you are not already, use the 12V2A spply to rule out power issues.
  38. 1 point
    I updated my bashbunny to the latest firmware with the bunnyupdater and copy-pasted the Jackalope into switch one. Then I signed out and plugged the BashBunny into my PC with switch1, but after a few seconds, it always starts blinking red. I added my password to the wordlist and I added my Username to the Userlist. Idk what I'm doing wrong. My Windows Language is swiss german, but my Keyboard is en-US, so it should work. I also changed the login screen to en-US but it still doesn't work. Any ideas?
  39. 1 point
    Yep..Jtyle6 is correct......delete your own thread.........https://forums.hak5.org/profile/65192-ethi1ca4l/..................๐Ÿ˜Ž
  40. 1 point
    Hi Foxtrot & Darren Kitchen Awesome product๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ guys, which just add to the arsenal. Cannot wait to get mine and deploy! Enjoy DefCon Nevada, hopefully see you there next year. Cheers ๐Ÿ˜Ž
  41. 1 point
    Okay, you can grab screenshots and video. Okay. Here is the thing...can this thing do playback? Now that would be cool. Imagine being able to cover your hack with a generic replacement view..kinda like the spies do with the static feed to video cameras of facilities they are breaking into. Why would you want that? Well, to hide your hack if you are emulating their screen like through VNC or what not. Hide what the BB is doing. Just some ideas. Would be cool if BB could communicate back to it to initiate screen hide. If the device than pickup screen queues to do stuff then that would be cool too. I am just trying to squeeze out ideas for this thing that will entice me to get one.
  42. 1 point
    The Screen Crab by Hak5 is a stealthy video man-in-the-middle. This covert inline screen grabber sits between HDMI devices - like a computer and monitor, or console and television - to quietly capture screenshots. It's perfect for sysadmins, pentesters and anyone wanting to record what's on a screen. Out of the box it saves screenshots to a MicroSD card every few seconds. And by editing a simple text file you can configure every option, including capturing full motion video. Planting the Screen Crab is easy. Just plug it in, power by USB, pop in a card and get instant feedback from the multi-color LED. Coupled with a large MicroSD card - you can discreetly save nearly a year's worth of data. And with the Screen Crab, remote monitoring is built right in. Connect it to the Internet over WiFi and exfiltrate those screenshots, or watch the video signal live from anywhere online with Hak5's Cloud C2. Screen Crab - covert inline screen grabs. SHOP: https://shop.hak5.org/products/screen-crab DOCUMENTATION: https://docs.hak5.org/hc/en-us/categories/360002117873-Screen-Crab
  43. 1 point
    They are really listening, although some say they are not. They work hard on topics that need fixing and if anyone thinks they could work harder or after then they may be telling an untruth. Hak5 is a great forum and the team really know their products๐Ÿ˜Ž
  44. 1 point
    To build on the Kismet packages note in the change log above: We've built and released two packages for your WiFi Pineapples to ease install of Kismet. Instead of following long guides, you can now grab it via opkg (Make sure your WiFi Pineapple has internet!): opkg update opkg install kismet-hak5 The kismet package is big, so I recommend either installing it to the SD card on your NANO or using a WiFi Pineapple TETRA. For saving space, we've also packaged the remote capture tools, so that you can use your NANO or TETRA to connect to a Kismet instance that you've set up: opkg update opkg install kismet-remotecap-hak5
  45. 1 point
    Hi Guys, After rooting and then unrooting and then rooting the nexus 6p again๐Ÿค“, I thought I would try the QR scan on the OS Kali NetHunter website and it worked with ease. I am going to (later today) try and install each of the apps to see if they work on root and without the need for F-Droid. I did install the Magisk Master as well. That should allow for the use of other services on the device without any clashes. I shall let you know how I progress ๐Ÿ˜Š Cheers ๐Ÿ˜Ž
  46. 1 point
    Please give some context to this or I'll lock it as being too vague and looking a lot like spam.
  47. 1 point
    This is probably common knowledge for most people here but thought it could be useful Apply for a license from HAK5 C2 Get a Public IP such as (64.15.17.23) for your server Get a public domain and point the dns record such as "cave.domain.com" to the IP 64.15.17.23 Allow the DNS propagation to take plus I usually wait around 24 hours as Let's Encrypt DNS seems to be delayed a bit Ensure your servers firewall inbound rules allow "http (80) and https (443)" Launch the C2 Servers on your box such as: ./c2_community_linux64 -hostname "cave.domain.com" -https Take note of the setup token. This will be used to validate the setup. This will start the server and generate the configuration details and let's encrypt certificate within the database. Go to https://cave.domain.com Apply the setup token and the license key to the setup wizard and follow the steps. Notes: If you stop the server and relaunch it the "setup token" will not re-appear so be sure to write this down. It is required during setup. If you can't remember the setup token, stop the C2 Server and delete the c2.db file and start from step #6. You can copy the device.config into the respected device's /etc/ folder , once rebooting the device it should re-connect to your C2 Cloud Network.
  48. 1 point
    Script to capture PMKID with hcxdumptool First button press lights the yellow LED and starts listening for PMKIDs Second button press stops listening, turns off the LED and moves the captured file to /root/random.pcapng #!/bin/bash file="/tmp/handshake" capture="`head -30 /dev/urandom | tr -dc "0123456789" | head -c3`" if [ -f "$file" ] then killall hcxdumptool led YELLOW off rm -rf /tmp/handshake hcxpcaptool -z test.16800 test.pcapng > test.conlog mv test.pcapng /root/$capture.pcapng mv test.16800 /root/$capture.16800 mv test.conlog /root/$capture.conlog mv test.log /root/$capture.log else touch /tmp/handshake led YELLOW on hcxdumptool -o test.pcapng -t 2 -i wlan1mon --enable_status=3 --disable_deauthentications --disable_disassociations > test.log & fi
  49. 1 point
    As far as I know the wiki never came online. There is a reasonable amount of documentation here though https://www.hak5.org/gear/packet-squirrel/docs
  50. 1 point
    I'm not going to get rid of having antennas connected...but since these are providing diversity, I should be able to put a 2.4ghz yagi on one port to sniff around with and one for 5ghz on the other port. If I just look for 2.4 APs, the yagi for that band should be selected and if I look for 5 ghz, the other should be selected. I may have to play a bit. I'm also looking at a HackRF ONE so I can snoop on more. I currently have two different MAC addresses that show as "Hidden" on 5 ghz. I'm trying to find out what they are. One is very strong and could possibly be the AP for my cameras...the other, I'm not sure. And now I find that my electric meter is using RF in the 2.4 area....kinda interested in that. With the SDR, I can use it as a poor man's spectrum analyzer and look at some of these wayward items. Really, I'm not nuts, there is a method to my madness....thanks for the comments and info...I'll put that in the Pineapple book to remind me.
×
×
  • Create New...