Jump to content

AussieKlutz

Active Members
  • Content Count

    31
  • Joined

  • Last visited

  • Days Won

    3

About AussieKlutz

  • Rank
    Hak5 Fan

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Hi Guys, I'm creating a OpenVPN tunnel to a vps from my Mark V. Its working fine to access the Mark V from the vps, however I'm having some trouble getting the iptables to apply properly to allow internet traffic to be forwarded over the tunnel. The iptables commands i'm using are: iptables -t nat -A POSTROUTING -s 172.16.42.0/24 -o tun0 -j MASQUERADE iptables -A FORWARD -s 172.16.42.0/24 -o tun0 -j ACCEPT iptables -A FORWARD -d 172.16.42.0/24 -m state --state ESTABLISHED,RELATED -i tun0 -j ACCEPT After I run the commands, then do an iptables-save, they show up but don't affect the traf
  2. Hey guys. I wrote a file browser infusion a while ago but I have misplaced the source code. I upgraded my pineapple and wanted to get my infusion working on the new firmware. Is there anywhere we can get the old infusion versions from? Thanks.
  3. Check it out people.... http://cloud.wifipineapple.com/wiki/doku.php?id=modulecreation
  4. I have started writing up a "current stable" (2.5.0) manual on the wiki, from the book. Please, anyone who can spare 5 minutes, fill in some of the web interface details. I was also planning to include some tutorials for common pineapple configurations.
  5. Hold "CTRL" and scroll down with your mouse wheel to zoom out. I'll look into a fix soon. Should only require adjusting some form elements and a little css...
  6. I havent tried it but you could just do the same thing with your mp3 base64 encoded...
  7. I am using a similar setup. To make windows mimic a pineapple, remember to set your dns server and default gateway to 172.16.42.42 on the PC as well as setting the ip to 172.168.42.1, 255.255.255.0 As far as using the wifi pineapple as the ap, with an ethernet connection to a ddwrt router, operating as guest on a wireless network... First check you are plugged into the PoE LAN port on your pineapple.(I'm using MKIV, but you havent specified) Then check that you only have two entries in your routing table. I had plugged into the WAN/LAN port at one point, and acquired some other routes that
  8. #Neworld I have tried that one. If you write several rules that match your target domain, it is the last rule that returns... EXCEPT when you use a global wildcard. 1.1.1.1 1.com 2.2.2.2 *.1.com 3.3.3.3 *.com 4.4.4.4 *.1.com 5.5.5.5 1.com returns 3.3.3.3 no matter what leapole thats a good workaround, however I think I'll have a go re-implementing dnsspoof anyway. I could add more functionality then.
  9. I suppose I've gotten used to other tools which either: Fall through a rule set until a match is found then quit, or Go through the rules and apply the last one that matches. Dnsspoof seems to do the latter, (created multiple rules for the same domain, and the last ip was returned from nslookup against the pineapple) however it also places global wildcards [172.16.42.1 *] of higher precedence than all other rules, meaning you cannot override a global wildcard. The only method i've found so far to make it work is to make a wildcard for each tld. They dont appear to take precedence over mor
  10. I have been trying to configure dnsspoof to provide one ip on a global wildcard and another for a specific domain. I tried with a config of: 172.16.42.1 * 172.16.42.208 example.com thinking it would fall through. After a bunch of testing and finding dnsspoof.c, it appears that a wildcard overwrites all. I am not very well versed at c++, but I think a new dnsspoof is needed that will provide the ip for the first match only, enable blacklisting on ip's and mac's of clients (so you can still get online) and of domains. What do you guys reckon? Am I missing something? Does a better dnsspoof
×
×
  • Create New...