Jump to content

Lord C

Active Members
  • Posts

    80
  • Joined

  • Last visited

About Lord C

  • Birthday 10/29/1985

Contact Methods

  • Website URL
    http://www.calvinrobinson.co.uk/

Profile Information

  • Gender
    Male
  • Location
    London
  • Interests
    ---

Recent Profile Visitors

2,485 profile views

Lord C's Achievements

Newbie

Newbie (1/14)

  1. I don't. Any advice mate? Not capturing SSIDs, not de-authing, not allowing associations. Filters are on Deny Mode. Everything enabled in PineAP. Was working fine before the upgrade. I I'm certainly not the only one:
  2. Same problem here, but changing filters to deny hasn't solved it. Tried resetting to factory settings, no luck.
  3. Brilliant, thanks. (Someone might want to update the Blog) [Update] PineAP Daemon no longer seems to be functioning, even when switched on. I can no longer capture SSIDs to the pool automatically (manually works), and beacon response / broadcast SSID are doing nothing when turned on. In fact, I can't connect to the WiFi even with an open SSID or via a Management AP. This update has been less than successful for me. Was working fine on 1.1.3
  4. Hi guys, I might be being an absolute newb here, but I cannot get my Nano to beacon APs and attract clients. Had no problem with the old Fonera Pineapple + Karma, back in the day. I've connected the Nano with wp6, it has Internet access (the news bulletin loads). I can do a scan with Recan, add the SSIDs to the pool. In PineAP I switched the daemon to enable and checked the boxes (allow associations, beacon response, capture ssids and broadcast ssid pool etc.). No clients connect. I've tried testing with my mobile phones. I can de-auth them, but they always re-connect to their original WiFi and not the Pineapple. I've tried enabling the other radio and setting an SSID, clients can see and connect to that. This is how I've tested Modules. Any ideas why I can't broadcast ssids and hijack connections? I've followed the YouTube vids (setup and primer). Also tried resetting the Nano to default.
  5. Having a similar problem here. Can deauth clients but not attract them to connect to PineAP.
  6. Yeah, the Nano + stickers were there. I know, right
  7. I recently bought a Nano and some stickers, and found this random street CD in the envelope:
  8. I don't think it matters what DNS you choose to use, you can't bypass your ISP. If you don't want them to know you're tethering, you'll need to send fake web browser user agent IDs, to trick them into thinking the connection is coming from your phone.
  9. There are similar solutions with no soldering required, so you don't have to single-purpose your Zero.
  10. Grabbed a Zero W to try this out. Works a treat, for remotely activating ducky scripts!
  11. Hi guys, I've been playing around trying to create a Bluetooth version of Rubber Ducky working. Not sure how useful that would be, but I'm in the very early stages. Have been experimenting with this beauty: BBC micro:bit Most 11/12 year olds in the UK will have received one of these in school last year. The BBC ran a programme that allowed schools to apply for free micro:bits for all of Year 7 (6th grade). There's a friendly online interface to program them in Python, but you can actually compile C++ for these badboys. They're available for under £15 / $18: http://microbit.org/resellers/, hence making good little gadgets to mess around with for a BT Rubber Ducky. The micro:bit has a few pins available, a USB port, a small bluetooth antenna, it's very small and can be battery powered (or USB powered). On the front there are 15 LED lights and two buttons to play with: You can program the micro:bit to connect via Bluetooth, with little security (no PIN or anything). Then you can use the two buttons to send commands to the computer or smartphone. At the moment, I'm only able to send ASCII commands, so I've been mapping out the special commands in an ASCII/latin table. I haven't yet figured out how to use the Windows key, but I have managed to take a screenshot ("\x8C") and save a file with the name pwned ("\x99,s,pwned,\n"). Sample file available here, just drag and drop it onto your micro:bit, connect to 'ducky' via BT, the left button will take screenshots, the right button will save files. Code is available here, hopefully others will be able to assist with this experiment :).
  12. The trinity helped worked great - thanks. I'd love to be able to use the boot menu though. Any way around that yet?
  13. Nice write-up Ax0n, thanks.
  14. Thanks people. I'll give Hamachi a try, but I have my doubts about it connecting. If it doesn't I'll have to go with a reverse conn.
  15. I knew about cloning MAC addresses, but I never thought of doing it for this purpose. Nice one IceBerg
×
×
  • Create New...