Jump to content

Darren Kitchen

Root Admin
  • Content Count

    4,823
  • Joined

  • Days Won

    218

Everything posted by Darren Kitchen

  1. I cannot speak to the kbeflo project you reference as I do not have experience with it - however if you are referencing the Evil Portal module from the WiFi Pineapple repository, I can say that exfiltrating loot from that module to the Cloud C2 server is the same as any other file. Example: C2EXFIL STRING /path/to/log/file payload-name *payload-name is option *STRING indicates that the file is ASCII and may be viewed in the browser. Omit for binaries.
  2. If you run the `date` command on both your WiFi Pineapple and the server running Cloud C2 - are they the same? You also said that you have your WiFi Pineapple connected both to your computer and your LAN via WiFi, yet you are not providing the WiFi Pineapple with Internet access from the computer. Is this computer connected to the WiFi Pineapple via USB-C also the Cloud C2 server? If the WiFi Pineapple disconnects from the Cloud C2 server, does it reconnect after a few minutes? What do the server logs on the Cloud C2 server show after the WiFi Pineapple disconnects? After t
  3. You don't need to reconfigure devices after updating. You just need to assign them to a site. There's a video in the release thread at https://forums.hak5.org/topic/53473-release-hak5-cloud-c2-30x/?do=findComment&comment=333943
  4. Hi! Hak5 is proud to announce the second major annual update to our Command and Control platform — Cloud C2. Version 3.0.0 introduces Teams Edition with support for multiple users and multiple sites — further enabling red teams and pentest firms to conduct collaborative remote operations from anywhere. With granular real-time Role-Based Access Controls and advanced audit logging, administrators are provided comprehensive and historical insight into every aspect of Cloud C2. Moreover, architectural changes pave the way for more frequent releases to take advantage of the rich libr
  5. How are you connected to the MK7 when the slowdown occurs - over USB Ethernet or WiFi?
  6. My apologies for the delay. We're very close on Cloud C2 v3.0, which we expected to be releasing today, however we are still in the QA phase and making UI tweaks which have postponed the launch. We are shooting for October 5th. It's going to be an exciting release with some really cool new features so I'm really grateful for your patience as we put the final touches on this release.
  7. Thanks for the report @drforbin - we can surely take a look at what's going on with the slow down when broadcasting the SSID pool. More details will be required so please post the contents of your SSID pool as well as the debug log which may be found from the help page. With regards to throughput, the MK7 should have about the same wireless client mode speeds as its predecessors. The focus has always been on balancing the hardware for its core functionality (identifying devices vulnerable to rogue ap/performing recon/new campaigns). If higher throughput is necessary for your application c
  8. Yes, it *could* be a problem *if* someone submits a vulnerable module *and* we accept that module to the repository. Considering this isn't the case, and that this is removed from 1.0.1 and onward, and that we are not accepting modules with vulnerabilities - I don't see your hypothetical scenario playing out. Any information that was obtainable before a restriction was added would provide no benefit to an adversary. Again, thank you for the report, and I don't want to split hairs with you because I believe your intention is sound - however I do not believe a CVE is warranted.
  9. Thanks for reporting this, and I understand you're trying to help. I wouldn't go as far as calling this a vulnerability. That's sort of akin to pointing out that the login page is accessible unauthenticated. There's nothing sensitive in the UI directory that's accessible - for example, the json file you mention is an element of progressive web apps. All of the configuration and loot data are stored elsewhere. As you've determined, after you reported this we removed it from 1.0.1. Again, I'm sure you have the best of intentions but, there's no data leak or pivot. Had there been I would absolute
  10. The MK7AC module will have two of its own dual band antennas as it will support 2:2 MIMO.
  11. December 18, 2020 There is a SD card patch that is currently being tested for the WiFi Pineapple NANO to address an issue caused by a malfunction in some automatically generated fstab configurations.
  12. It extends the back of the case with a flush mounting. I'll post the industrial design renderings once we finalize, before it goes into injection molding. In the meantime, if you have an adapter there's 5 GHz support out of the box for compatible chipsets. See https://docs.hak5.org/hc/en-us/articles/360054071133-Compatible-802-11ac-adapters
  13. I believe I speak for the entire team when I say how excited we are to finally share with you the hard work that has gone into making the most refined, polished, and precision-fit WiFi Pineapple to date. I can say with confidence that the Mark VII introduces the most intuitive WiFi Pineapple experience. That is because, in addition to vastly improving the hardware and PineAP engine capabilities, all pain-points from previous generations were considered when developing the 7th generation. From initial setup and provisioning to PineAP configuration, reconnaissance, engagement automatio
  14. Support for the Mark VI generation will conclude when the devices reach the end of their 5-year lifecycle. Until then, they will continue to receive critical bug fixes—as they have with over 50 firmware upgrades to date. Module submissions will stay open, so developers may continue to enhance the platform. The Hak5 infrastructure will continue to host community modules for over-the-air downloads. Should industry-wide changes occur impacting our ability to securely offer module downloads (such as the TLS updates which rendered OTA module downloads infeasible for Mark IV devices) then side-
  15. That's so cool! I love these little bits of trivia. Thanks for sharing 🙂
  16. Username1031 – I understand you're upset. I'll try to shed some light on the situation. The notice isn't a pop-up, it's a large red note at checkout. See the screenshot below: I understand from your posts this wasn't apparent to you. I felt like this was an up-front and clear notice - however if you have ideas on how I could improve on making these notices should an item go into backorder again (rarely happens) I'd be keen on hearing your suggestions. I want to be as clear and up-front as possible when it comes to these situations, because the last thing I want is a custom
  17. You are close in your understanding of the roles each radio plays. wlan0 runs the access point(s) (the "Allow Associations" checkbox) - though it's come a long way since the initial karma patches to hostapd digininja did back in 2007. wlan1 is responsible for monitor and frame injection functions, which are used by PineAP for Broadcast SSID Pool and Beacon Response, as well as Recon for Deauth and survey. There's a lot more going on - but that's the high level overview. I've found many IoT devices are eager to connect by simply allowing associations, while others are only
  18. Kali Linux 2020 includes a network manager that is aggressive about managing network interfaces. It will take over settings specifically set from a root shell, including that of wp6.sh. It's only if you follow the instructions from the linked page that you can get it to behave. Personally I disable network-manager all together, as I know what I'm doing in the shell and it tends to just get in the way.
  19. Click Add Device in Cloud C2, give the device a name and choose WiFi Pineapple from the device type list. Then download the provisioning file by clicking the Setup button. Copy that file, device.config, to the WiFi Pineapple in /etc/ Typically the command "scp device.config root@172.16.42.1:/etc/" does the trick. There's more info in the Cloud C2 documentation at https://docs.hak5.org
  20. Jugru - Good luck with the paper, and please share it with us when it's complete. In discussing this exact topic with others in the industry that are adopting the zero trust model, it's clear that - as always - the humans are the weakest link. It's for this reason that modules like Evil Portal, which are able to spin up a captive portal, are so valuable. By mimicking not only a preferred network, but a recognized landing page, credentials and other PII can be captured. Mobile devices are especially vulnerable to this attack because many, like Samsung for instance, do not display a U
  21. @JohnXovox thanks for reminding me that the setup video incorrectly recommends using USB for power. That video is very old and needs to be updated. Insufficient power is the #1 cause for issues with the device (aside from general misunderstandings of how filters & ICS work). I'll update the documentation. We pride ourselves on our ability to provide a robust platform that's effective out of the box, while also allowing for third party development. Some of the most exciting features have come from the community through their module contributions. That said, it is impossible for our sma
  22. What output do you get from the UART port when connecting by Serial? That would be really helpful in diagnosing the issue. It's possible the device is not in the bootloader. If you connect by serial, you will have the option to enter the bootloader by key press rather than holding the button.
  23. Yes. By default the open AP is hidden. You can change this from the Networking page:
  24. I use my WiFi Pineapple TETRA with my Mac all the time. It's simple. Power on the device using the included AC adapter. Plug in a USB cable between your Mac and the WiFi Pineapple TETRA ETH1 port You may need to install the Realtek drivers from https://www.realtek.com/en/component/zoo/category/network-interface-controllers-10-100-1000m-gigabit-ethernet-usb-3-0-software Browse to http://172.16.42.1:1471 Since the WiFi Pineapple TETRA has its own operating system and is managed by standards like SSH, Serial or HTTP - it's in effect OS agnostic. The method for us
×
×
  • Create New...