Jump to content

Ninja Monkey

Active Members
  • Posts

    23
  • Joined

  • Last visited

Recent Profile Visitors

3,012 profile views

Ninja Monkey's Achievements

Newbie

Newbie (1/14)

  1. The firmware is still default from when it came I used the flash utility to replace it, when it finished and it closed I could not contact the router. Theres obviously something I have missed along the way :( edit The one I am trying to flash to is the 2.1.2
  2. I never bought a pineapple it's a new flash on the AP51 router.
  3. I just followed the instructions on http://hak5.org/hack/wifi-pineapple-flashing-guide to flash my router After the reboot on the firmware flash all I get is host is unreachable on ping probes... any ideas ?
  4. It's amazing how little simple things slip your mind when your half asleep and cought offguard a quick netstat -b showed something called freesshd :S apparently my roommate installed it because he needed ssh... yea anyways I slapped him a couple of times... thanks Mr.Protocol edit: I appreciate the link but sorted it now getting timeouts from Linux box > Windows so :) all is well with the world again
  5. It's windows 7 but I was unaware any of the software I am running had SSH connections to them, I dont like to not know really. I'm aware of all ssh clients on my Linux box but never thought of my windows set-ups connections. the whole episode just made me curious.
  6. If I'm connecting to myself in SSH surely I am running something that is accepting a connection ? I was wondering if I could find what is actually accepting the connection.
  7. I was watching the latest episode Hak5 1108 – Hak5 Special: Proxies I decided to try the putty proxy tunnel and was of course prompted to put in a username and password. Needless to say I have no idea what they are I have tried my Win login etc but no luck. Edit: Sorry to clarify, I am connecting to myself here but I dont know what I am connecting too ... if that makes sense lol
  8. I have an onboard chip, an Atheros but I also have an external Alfa card Realtek so I need to build compat-wireless with 2 modules I cannot seem to be able to do this. anyone sure if this is possible ? thanks in advance. I'm running Ubuntu 10.04
  9. Trying to find a compatible router to make a pineapple within the UK since the Pineapple is sold out at the moment n the Hak store. If anyone can help me out I would much a appreciate it since my last Pineapple was..Well eaten by the dog... Regards ;)
  10. Anyone know how to enable the cursor again in terminal, whenever I put up a new tab it vanishes from my old window. -regards
  11. I have changed these entry's to the new ISO but still no luck at all it's very odd.
  12. Thanks, Well my original setup for booting ubuntu from ISO was but when I just swap the ISO to the 10.04 ISO it will not boot. menuentry "Ubuntu Live 9.10 32bit" { loopback loop /boot/iso/ubuntu-9.10-desktop-i386.iso linux (loop)/casper/vmlinuz boot=casper iso-scan/filename=/boot/iso/ubuntu-9.10-desktop-i386.iso noeject noprompt -- initrd (loop)/casper/initrd.lz }
  13. decided to update my Ubuntu on my Grub2 USB but no matter what I try I cannot seem to get the ISO to boot. Any help that can be given is appreciated.
  14. oddly this wont work for me just drops into busybox :S
  15. #!/usr/bin/env python ###################################################### # authWatch.py v. 0.1 (Quick, Dirty and Loud) - by TinMan # Place card in monitor mode and set the channel. # If you want channel hopping, run airodump-ng in # another terminal. Will add channel hopping # in the next version. ###################################################### # # Usage: python authWatch.py # import sys from scapy.all import * interface = sys.argv[1] def sniffReq(p): if p.haslayer(Dot11Deauth): # Look for a deauth packet and print the AP BSSID, Client BSSID and the reason for the deauth. print p.sprintf("Deauth Found from AP [%Dot11.addr2%] Client [%Dot11.addr1%], Reason [%Dot11Deauth.reason%]") # Look for an association request packet and print the Station BSSID, Client BSSID, AP info. if p.haslayer(Dot11AssoReq): print p.sprintf("Association request from Station [%Dot11.addr1%], Client [%Dot11.addr2%], AP [%Dot11Elt.info%]") # Look for an authentication packet and print the Client and AP BSSID if p.haslayer(Dot11Auth): print p.sprintf("Authentication Request from [%Dot11.addr1%] to AP [%Dot11.addr2%]") print p.sprintf("------------------------------------------------------------------------------------------") sniff(iface=interface,prn=sniffReq)
×
×
  • Create New...