-
Posts
2,733 -
Joined
-
Last visited
-
Days Won
204
Content Type
Profiles
Forums
Gallery
Events
Posts posted by dark_pyrro
-
-
What type of device(s) are you trying to connect to the openAP/Evil Portal?
-
I guess you got your answers on Discord regarding this
-
7 hours ago, bunnybasher said:
And I did switch but it was on my phone
I'm pretty sure that won't work on an iPhone
7 hours ago, bunnybasher said:so I decided to use a windows computer and this script, which I believe is completely right
No, it's not right at all since the payload comments says...
7 hours ago, bunnybasher said:# Target: GNU/Linux operating systems with systemd
-
If it's still under warranty, I would suggest to submit a support ticket.
-
No, you can connect the Mk1 Squirrel to C2 as well. At least I have, and the files needed to connect is in the latest firmware (such as cc-client, C2CONNECT, C2EXFIL, etc.).
The closest to a list that I've seen over the years is in the C2 docs
https://docs.hak5.org/cloud-c2/getting-started/adding-devices
-
In what way did you verify that the Nano has internet access? In what way does it have internet access (WiFi, ICS via USB/Ethernet)?
Are you located in a country that allows access to Google services?
-
I'll ask the same question again from another thread
-
I assume that you are aware that this payload will not work on Windows (you probably switched from Windows to Mac for the latest post above). If it's a Mac, I would probably try to use some other VID/PID since Apple devices most often are rather picky when it comes to what's being attached to them.
GET SWITCH_POSITION is also missing which will make the use of the ${SWITCH_POSITION} variable/constant fail.
9 hours ago, bunnybasher said:I tried to use this script right off hak5 (script below)
Link/source to that payload?
-
4 hours ago, Choi said:
can you help me start with my Pineapple Tetra or any tutorial videos on starting up with Pineapple Tetra
Official docs
https://docs.hak5.org/wifi-pineapple-6th-gen-nano-tetra
Old/deprecated docs
https://wiki.wifipineapple.com/#!index.md
A video that shows some basic workflow (the Nano is used, but it's the same UI as the Tetra, not the latest fw used in the video though - 2.5 vs. 2.7)
https://www.youtube.com/watch?v=CcnCbxoUWps
The Tetra also has its very own section on the forums
- 1
-
It all depends on what your goal is and the time frame. I would probably not change a thing when it comes to me specifically, but I've been working with IT for well over 30 years now. There's nothing wrong jumping straight into the CyberSec pool, but for me, a broad experience is a very good platform to stand on. When saying that, I mean that you know things about basic computing (hardware, operating systems), networking, programming/scripting, etc. etc. and not just from a security perspective.
It's a big field to cover though, I would say with confidence that no one can cover it all in every single aspect. That's not possible regardless how experienced you are. So, if you haven't chosen the path to travel you can ask yourself where most customers/users are. I would say "Microsoft". So, learning Windows (client OS and Server), Active Directory, PowerShell scripting, the online Microsoft architecture (365, and not the apps but all things behind it) along with networking can be a starting point that will keep you busy for some years to come if you want to get good at it. Also, you could start with the cybersec perspective of it all, but I would probably start as a PC admin (or such). Since it's pretty difficult to recruit people when it comes to CyberSec (to a SOC or such), I tend to look for admins since they most often are very skilled when it comes to knowledge about the object that is being protected, i.e. they know how the engine runs and it's often pretty easy to add the "security mindset" (many of them are already interested in that area).
There are of course a lot of other areas that are equally valid, I'm just suggesting.
-
It all depends on the context (Android version and manufacturer and UI and app, perhaps also what device you are using to inject the keystrokes). Just connect an ordinary keyboard to the Android device and press the corresponding keys and see what happens.
-
When did you buy the Squirrel and from where? Hak5 official shop?
-
Did you check the LaZassword payload?
-
Make sure the browser doesn't force https, it needs to be http
Also check the things listed here
https://docs.hak5.org/packet-squirrel-mark-ii/setup/setting-up-the-packet-squirrel#connecting
-
There's no need to create multiple threads about the same thing...
-
On 9/13/2024 at 12:44 PM, Elcliffo said:
Cant master rest i have tried every instruction on the web but nothing
The only relevant instruction on the web regarding resetting the Squirrel is the official docs
https://docs.hak5.org/packet-squirrel-mark-ii/troubleshooting/factory-reset
-
"somewhere" is most likely the official documentation (which always should be the 1st hand source for knowledge when it comes to the Squirrel)
https://docs.hak5.org/packet-squirrel-mark-ii/getting-started/web-ui
Execute it as a part of a payload, or ssh into the Squirrel and run the command
-
I answered in your other thread about the same thing.
-
Probably failing because the author of that payload hasn't adjusted it for the Bunny. You need to QUACK things on the Bunny. Also, the payload needs to be named payload.txt to make it execute. It's all in the Bunny documentation.
-
Tried /etc/config/network ? Or use macchanger
-
What part of the official documentation don't you understand when it comes to setting up C2?
-
You have most likely installed the Evil Portal module which makes nginx run and occupy port 80 on the Pineapple.
-
Create a directory on the pineapple
Put some html files that are relevant for the engagement there
Start a Python http server on port 80 on the Pineapple
Enter spoofed URLs that points to 172.16.42.1 in the DNSSpoof module
-
Which mode is the Squirrel in? Attack mode or arming mode?
Password hack
in WiFi Pineapple NANO
Posted
You're not going to get help doing illegal stuff here. Try elsewhere. Not even Nano related...