Jump to content

Sebkinne

Root Admin
  • Posts

    3,978
  • Joined

  • Days Won

    331

Everything posted by Sebkinne

  1. Are you connected to any other network while trying this? Make sure you disconnect from any WiFi or wired connection, and make sure the lan turtle does not have an Ethernet cable plugged in.
  2. You'll find it in the list, it's the very first one available.
  3. There is no module names sshstripe, maybe you mean sslstrip. If you are looking for the Pineapple Bar, it's now called "Modules" and "Manage Modules". You will be able to find this on the left navigation bar. You will need to provide internet to the WiFi Pineapple first. Please also do note create multiple posts on the same subject - a single thread will suffice.
  4. For the next run of TETRAs we have resolved this issue. Thanks for bringing it to our attention.
  5. Unfortunately Hak5 cannot do anything about import taxes or your local customs. Any delay or additional fees are due to local laws and / or local carriers. Our shop is working together with carriers to make this process as smooth as possible, but unfortunately if is often out of our hands.
  6. You can request it from shop@hak5.org if you did not receive it.
  7. You have to push the reset button, and you have to set up the root password / wifi. CLI modules already support Python. There will not be a purely python GUI module though.
  8. Not yet, no. This is something we have plans for though.
  9. The app does not work on all mobile devices and carriers.
  10. While I haven't tried it, https://wiki.openwrt.org/doc/howto/usb.iptunnel should let you do what you want.
  11. Are you connecting to the WPA2 management AP? If so, these are not supposed to show up.
  12. Hi Artuk, Wlan0 is for running the Open AP (hidden by default, used for pulling clients in), and Management AP (the WPA2 one you set up on first boot). Wlan1 is usually used in monitor mode in conjunction with PineAP, Recon, or other modules and tools.
  13. Using the gnome teak tool will allow you to do this.
  14. Have you got the equivalent of Virtualbox's "Guest Additions" installed? That takes care of the scaling pretty nicely.
  15. This is true, which is why it is arguably a good username. The big drawback is that if someone DOES get ahold of your fingerprint, palm print, retinal data, etc it is practically impossible to replace or reset them. You don't all of a sudden grow a new hand just because the other was compromised. This is why this data should only be used as a sort of "username". Lifting prints can be surprisingly easy if you aren't super careful. Having seen the work of a few teams on defeating biometric security, it's doubtful that they'll fight you for the information.
  16. In my opinion Biometrics should not be used for authentication, but for identification. They are a username, not a password. Fingerprint + pin / password? Absolutely.
  17. It should, yeah. I haven't tried it yet. If I get time, I'll compile the packages for our firmware base and push them to the repository.
  18. You can set it up yourself: https://wiki.openwrt.org/doc/howto/usb.iptunnel :)
  19. Actually, we ship a newer version of libpcap, which in my eyes is the right thing to do. Reaver simply doesn't like it and won't run correctly. Having spoken to the reaver devs, they have also abandoned the project as the cleanup is too much hassle, so we never pursued this further. The fix would be compiling reaver with a statically linked version of libpcap (an older version that is verified to work).
  20. We could however implement push notifications in the browser. Our API makes that really easy to do!
  21. Client devices that are idle or not currently generating a lot of traffic will "chirp" a lot less than active devices. Because scanning hops across all specified channels in the given amount of time, it is possible to miss said chirps. Of course, by increasing the scan time, you will increase the frames read on each channel, and therefore be able to discover devices that are less chatty. Scanning both 2.4 and 5Ghz in the same amount of time (say 15 seconds) means you have to scan a LOT more channels in an already small timeframe. We considered forcing 30 seconds for 2.4 and 5Ghz scans, but decided against it, as in a target rich environment even 15 seconds got a lot of results.
  22. The option was merged recently - if clients are detected, they will be down beneath each access point.
  23. As mojo0243 said, the book is not the instruction manual for the device. Help can be found on https://wifipineapple.com/ and on the "Help" tab on the WiFi Pineapple.
  24. That password is for the Management AP, not the one that clients are drawn into.
×
×
  • Create New...