Jump to content

dark_pyrro

Dedicated Members
  • Posts

    2,618
  • Joined

  • Last visited

  • Days Won

    198

Posts posted by dark_pyrro

  1. Did you change the password to something of your own or is the Squirrel supposed to have the "out-of-the-box" password? If the latter, then none of the one you mention is the correct one. It's not Hak5squirrel (with uppercase "H") or hack5squirrel (with an added lowercase "c"). It's hak5squirrel - all lowercase.

    If you set a password of your own or can't get the original password to work, then I'd suggest a factory reset or firmware recovery to start from scratch. It will delete anything that you might have stored on the PS though, so keep that in mind.

  2. No one else, except Hak5, have access to the Pineapple Enterprise since it's not released to market yet.

    I haven't got any link to a specific video. I just seem to remember that I've seen something that is similar to what you describe, although it's not exactly the same since what you are trying to describe shouldn't work without additional actions.

  3. Every tool has its purpose. In any way, you have to refer to that video to be able to see it all in its context and get the full picture of the methodology used. I have seen a lot of videos over the years about the Pineapple, but can't recall anything that is similar to what you are describing. That doesn't mean it's not out there though, I may have missed watching some or just don't remember. The only thing that vaguely rings a bell is that Kody did some video (Null Byte), but that didn't involve a Pineapple as I remember it off the top of my head.

    • Thanks 1
  4. Well, your choice.... either select the dk.json everytime or do the work and change the JSEncoder file. Can't see that it would be much of an issue "maintaining" it. The language file will be the same and the JSEncoder is soon to be 4 years old, so the change rate of that file/solution isn't a problem really.

  5. Not sure what you refer to when saying "WPA key". If you mean the handshake, it should not be possible to reuse/replay. You need to get hold of the actual psk. But if you can do that in some way, then it's possible to verify if anything obtained from social engineered users is the actual passphrase.

    Regarding the management AP, this should be possible to control more in detail with the upcoming 2.0.0 firmware. It's still in beta and the feature to control access to the management interface is experimental.

    • Thanks 1
  6. The Evil WPA AP is used to try to capture handshakes from STA/clients that are making connect attempts to that AP/ESSID. You won't get the psk/password for the true AP, but you might be able to obtain handshakes that can be used later on to try to crack it and get the plain text psk for that network.

    One way of "demoing" it

    - Set up an AP using (for example) WPA2-PSK CCMP
    - Connect a STA/client to that AP (only set up this specific AP on that device just to make the test/demo a bit easier)
    - Do a recon scan using the Pineapple (if you don't want to add the information needed to the Evil AP manually)
    - Click on the AP in the recon scan results
    - Click "Clone WPA/2 AP" (disable the Evil AP at this point)
    - Shutdown the "true" AP
    - Enable the Evil AP on the Pineapple (that now should be set up to emulate the "true" AP)
    - Try to connect to the Evil AP using the same device that previously was connected to the "true" AP
    - See if any handshakes are captured on the Pineapple
    - Download the capture files to some PC with Hashcat and/or aircrack-ng (running Kali Linux for example)
    - Since you know the psk for this test/demo setup, try to crack it using hashcat (or aircrack-ng) and a wordlist containing the psk in order to verify that the captured handshake is valid

    • Like 1
  7. You can just use

    wget https://github.com/SgtFoose/Evil-Portals/archive/refs/heads/main.zip -O /root/portals/portals.zip

    Then unzip the downloaded file (unzip needs to be installed if on a fresh Pineapple)

    After that, move the portals to their correct position in the file system since the unpacking procedure won't put them where they should be.

    Do some cleanup if desired

    • Thanks 1
  8. I read the "Usage" section on the GitHub repo; an alternative way is to download the portals directly from the Pineapple instead of using some intermediate computer to download and then scp/sftp the files to the Pineapple. It's easier just to use wget and unzip. It's possible to script as well if desired.

  9. It has worked for me on 1.1.1 for as long as I've been on that firmware, now also when running the 2.0.0 beta. Can't see why it should be necessary to downgrade. Are you using the Lenovo Ethernet NIC on the Pineapple Type A USB port? What chipset is it using?

  10. Well, beta releases tends to be buggy. It's part of the "package".

    At least when the first beta was released there was a package missing that made the EP module behave bad (or not at all); libblobmsg-json

    Problems are still showing though since there are something related to encryption that I haven't seen before when using EP on older firmware. Haven't been digging any deeper into that though.

  11. Well, you haven't got the correct directory structure. The "payloads" directory isn't even there. The Bunny expects the intended structure to be available in order to execute properly. You can't make up your own directory structure and expect it to work.

  12. I guess the users in this thread won't answer you since it's over 9 years old and users in it haven't been active for years either.

    What zombie are you using?

    What parts of the nmap documentation have you read? -Pn says "Host discovery disabled" because that is what that option does; disables host discovery. It doesn't "ping" but considers all hosts/IP addresses as "up"/alive.

×
×
  • Create New...