Jump to content

Mr-Protocol

Root Admin
  • Posts

    4,227
  • Joined

  • Days Won

    91

Everything posted by Mr-Protocol

  1. Plug the USB into your computer and run dmesg to make sure it is being detected. It should give you an IP address. If you are on windows, check Device Manager to make sure the driver loaded properly. https://lanturtle.com/wiki/#!index.md
  2. When you plug in the LAN Turtle to your computer, it will detect as an Ethernet adapter. It should have an IP address assigned to it via DHCP from the LAN Turtle. Either ifconfig or ipconfig depending on your OS will show IP settings. I would suggest learning computer networking basics before diving too deep into what the LAN Turtle can do. It may save some headaches in the future.
  3. Try to SSH into it when plugged into USB on your computer. Your computer should get a DHCP address from the LAN turtle.
  4. Sorry for the late response. I have been traveling for work. After the recovery mode firmware flash, you indeed have to re-enable DHCP on your computer for the LAN Turtle Ethernet interface. It appears you have already figured that out.
  5. I'm not sure what you mean by map. The bin file is the only file you need. If you don't get an IP address of 192.168.1.X from the LAN turtle while using Recovery mode instructions, set the IP address of the adapter that it detects as to a 192.168.1.2 255.255.255.0.
  6. If you are trying to use the reset button to get it into recovery mode. Follow the instructions: Factory Reset / "Unbricking" In the extreme case that a LAN Turtle has become permenantly inaccessible or inoperative, there is a quick method for recovery using a special web interface. Download the latest factory image from https://downloads.lanturtle.com/turtle-2-factory.bin Carefully open the LAN Turtle case by removing the two screws underneath the sticker on the bottom While holding the button on the bottom of the LAN Turtle, plug the device into a computer After 3 seconds let go of the button and wait an additional 30 seconds to receive an IP address from the LAN Turtle If you do not receive an IP address in the 192.168.x range from the LAN Turtle within a minute, statically assign the LAN Turtle's interface to 192.168.1.2 (netmask 255.255.255.0) Browse to the LAN Turtle firmware recovery web interface at http://192.168.1.1 Follow the on screen prompts to upload and flash the factory image downloaded in step 1 When the flash is complete the LAN Turtle will reboot and will be accessible again from 172.16.84.1 with the default username root and password sh3llz Those instructions will get you to a point where you can update if needed. I'm not sure if the factory image is fully up to date. Information on WinSCP can be found here. Basically it uses SSH credentials to secure copy files (SCP). https://winscp.net/eng/docs/start
  7. If you just want to update it and it's working properly before that. Use the turtle-2.bin that was downloaded using the "UPGRADE" link. Manually Upgrading LAN Turtle firmware may be updated"over the air" by choosing Check for Updates from the Config menu. If an Internet providing Ethernet connection is not available, updates may be flashed to the device manually using the following process: Download the latest UPDATE file from https://downloads.lanturtle.com/ Verify that the MD5 checksums match Manually SCP the file to the LAN Turtle in /tmp (ex: scp turtle-2.bin root@172.16.84.1:/tmp/) From the LAN Turtle, exit shell to the bash prompt and issue: sysupgrade -n /tmp/turtle-2.bin Wait about 5 minutes for the LAN Turtle to flash the firmware and reboot
  8. I am confused on what you are doing. The MD5 is just to verify the server side MD5 hash with your downloaded one to make sure the file is not corrupt before flashing. The MD5 should match. View https://downloads.lanturtle.com/ for the latest firmware upgrade download and MD5 hash. Compare the MD5 hash on the site to the file you downloaded. Then follow the manual upgrading instructions here: https://lanturtle.com/wiki/#!index.md Plug in the LANTurtle to your computer's USB that has the upgrade firmware and allow Windows to install the driver and get an IP from the LANTurtle. Then proceed with using SCP (WinSCP tool is free for Windows) and following the above link instructions. Make sure you DO NOT UNPLUG THE LANTURTLE while this is happening. If you do, it's a paper weight. Give it plenty of time to flash.
  9. The issue with being able to SSH to the LAN turtle after an update is with the known hosts file on your computer. It will vary depending on what OS you are on. Linux stores it typically in ~/.ssh/known_hosts and it should give you a command line option to remove specifically that one when it says they don't match. As far as manually upgrading: https://lanturtle.com/wiki/#!index.md
  10. It should require a driver if you are plugging into a computer for USB Ethernet. I have seen some systems where the driver, for whatever reason, will not auto-install. Also make sure you are using data cables as some cables may be power only. Is this in reference to a NANO or Tetra so this can be moved to the appropriate section?
  11. I would guess that the Jetpack is meant to tether as a client like a laptop. Try using an OTG cable and see how that works.
  12. It depends on your use case. A Tetra may be a bit expensive for a drop device, and it is a bit larger than the Mark 5. If you don't require 5Ghz, maybe the NANO would be a better fit. As to a lock, it does not have a slot for kensington style lock.
  13. It looks like it may be an SMA antenna that might have gotten mixed in. Contact the hakshop with your order number. On dirait qu'il peut être une antenne SMA qui aurait obtenu mélangé. Contacter l'hakshop avec votre numéro de commande.
  14. Due to the abuse of the reputation system, I have disabled it for now.
  15. Most programs do not encrypt while in memory. That applies to passwords. The SAM file is encoded and not in plain text. Look into the mimikatz tool that is made to pull plain text passwords from memory. It beats pass the hash or cracking them. https://www.offensive-security.com/metasploit-unleashed/mimikatz/
  16. If you want the clients on WiFi to connect through your Kali Linux machine, you don't need the RJ 45 from the Pineapple Tetra to the BOX SFR. You will setup Internet Connection Sharing on your Linux machine using the script from http://www.wifipineapple.com/wp6.sh Si vous voulez que les clients sur WiFi pour se connecter via votre machine Kali Linux, vous n'avez pas besoin RJ 45 de l'ananas Tetra à la BOX SFR. Vous configuration Partage de connexion Internet sur votre machine Linux en utilisant le script de http://www.wifipineapple.com/wp6.sh
  17. I will do my best to assist. This may be hard with translation, but I will try. The problem is when enabling the landing page, it disconnects you from the Tetra? Je ferai de mon mieux pour aider. Cela peut être difficile avec la traduction, mais je vais essayer. Le problème est quand permettre à la page de destination, il vous déconnecte du Tetra? --------------------------------------------------------------------------------------------------------------------------- I ran a test on my Tetra by turning on the landing page. I put in a simple J'ai effectué un test sur mon Tetra en tournant sur la page de destination. Je mets dans un simple <html>test</html> and my phone said it i needed to sign in to the network. I clicked the notification and it took me to my landing page and was trying to access a http://connectivitycheck.gstatic.com/ which I am not 100% sure how it's used. Even though the phone says I have no Internet, HTTPS sites will still load if connection sharing is working on the Tetra. et mon téléphone a dit qu'il i nécessaire pour vous connecter au réseau. Je clique sur la notification et il m'a fallu à ma page d'atterrissage et ai essayé d'accéder à un http://connectivitycheck.gstatic.com/ que je ne suis pas 100% sûr de savoir comment il est utilisé. Même si le téléphone dit que je n'ai pas Internet, les sites HTTPS seront toujours charger si le partage de connexion fonctionne sur le Tetra. With Airplane mode on and connected to the Tetra with landing page. Avec le mode Avion et connecté à la Tetra avec la page d'atterrissage.
  18. Locking this due to the out of control nature. If negative comments and attitude continue, more action may be required from staff. This applies forum wide. The forum is for sharing of ideas, learning, etc in a positive format with like minded people.
  19. Here is some reading: https://en.wikipedia.org/wiki/Beacon_frame https://en.wikipedia.org/wiki/Wired_Equivalent_Privacy https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access
  20. No because Occupineapple only broadcasts beacons. Also all handshakes are unique.
  21. An easy thing to check, go into the PineAP settings and make sure the check for "Allow Associations" is enabled.
  22. The exclamation point is any network without security enabled. If the clients don't connect to your pineapple, they may not be close enough or are configuring to the "Secure" network priority over the open networks.
  23. If you are looking to sniff for plain text credentials from websites, just run the Dwall module. There is no need to ARP poison if the clients are already connected on to the WiFi Pineapple. Here is the test I ran on my TETRA using the site freesound.org since they use plain text. You can also install the urlsnarf module, install the dependencies, SSH to the WiFi Pineapple, and run dsniff since a module is not created for it at present. More Info: https://www.monkey.org/~dugsong/dsniff/ You can also use tcpdump (watch the screen or...), save it to a file, load the file in Wireshark on your local machine. Regards.
  24. Straight Talk blocks tethering. Verizon does NOT block tethering. T-Mobile does NOT block tethering. I don't have any other Nexus phones on other carriers to test.
×
×
  • Create New...