Jump to content

Darren Kitchen

Root Admin
  • Posts

    4,887
  • Joined

  • Days Won

    248

Everything posted by Darren Kitchen

  1. They should be available from Edutech Ireland in the next few days. http://edutech-hakshop.myshopify.com/collections/frontpage/products/lan-turtle?variant=3957238661
  2. You're right - it would be a nice feature. Given the LAN Turtle is actually built on the same SoC as the WiFi Pineapple, it's absolutely possible. Right now it isn't an enabled feature due to costs and certification but if it's a requested enough feature I'm game to see what's possible. Perhaps it could lead to an out of band or side channel data exfiltration attack :)
  3. 0bda:8152 - Realtek Semiconductor Corp.
  4. I wish! I just cut the loading time from the video. Movie magic!
  5. Sorry Seb was sick and we postponed. I thought I had made the announcement here. We're rescheduling. I'll post an update soon. Sorry for that!
  6. We've received a lot of awesome feedback from the upcoming course and will absolutely take this into consideration. Thanks!
  7. Hi there! We've emailed you about the address verification. There was a problem with the attachment in your last email. I'm sure we'll get it sorted. Unfortunately we're not always available by phone - but we'll get back to you by email within 1 business day. I'm sure your husband will love the pineapple :) Cheers!
  8. =) Thanks to you guys for keeping it so fun and interesting!
  9. Yikes! Or just contact us - shop@hak5.org - and we'll get you sorted. ...though if you do have photos of the bad solder connection I can bring this up with our manufacturer. That shouldn't be happening!
  10. No - that's against FCC regulations. There is no built in capability for an automated nor sustained deauth attack. The function in recon mode is provided for authorized penetration testing and is not intended for this use case. You could run the open source airdrop-ng script from aircrack-ng.org on your laptop, but again what you're attempting isn't recognized here.
  11. overwraith, you should have heard back from shop@hak5.org within 1-2 business days. Can you forward your email to my Gmail directly? I'd like to see why this wasn't seen. Aardwolf@Gmail please. Thanks!
  12. I'm actually working on it now but it may come out first as a CLI config infusion first.
  13. Let's please not entertain any sort of vigilante action, DDOS included. Alibaba is a large and well respected company in China with a reputation for upholding intellectual property rights. I don't know the specifics of their laws, but I assume something like safe harbor may apply. We've been aware of this for a few weeks. Unfortunately it has taken some time to get our IPR paperwork sorted. We've finally been verified by Alibaba as the original rights holder and are pending take-down requests. Battery wise, they can get away with putting one in it more easily because they don't even have to attempt passing any sort of regulations. We jump through some major hoops to keep things on the up-and-up. 3G wise they just mean it has a USB port. We've had interesting dealings with IPR in the past. Search Apple Inc v Hak5 LLC even... If we can make it through getting sued by Apple, surely we can best a counterfeit knockoff. If I haven't said this recently - know that from the bottom of our hearts Seb and Sara and Shannon and Paul and myself love you all deeply for giving us the freedom to live our dreams making cool stuff. Stay tuned for some ridiculously cool new and innovating stuff from us (no hints, but not Pineapple related). Thanks!
  14. TL:DR; It's reporting 12 due to an older 802.11b chip config, but the chip is locked at 18 regardless of what the system reports. First and foremost, when we receive concerns from the community, we take them very seriously. It's your input over the years that has led the focus of the WiFi Pineapple for generations. We've investigated the matter of some MK5 units reporting 12 dBm txpower for wlan0 and confirmed it with the manufacturer. The report from our manufacturer indicates that one of the testing and calibration stations made a regulatory configuration for a small number of MK5 units delivered in November and December of 2014. This change affects the CCK (Complementary Code Keying) configuration of the older 802.11 B protocol, and not the OFDM calibration of 802.11 G and N protocols used by the MK5. While this configuration results in the system reporting a lower wlan0 txpower than in actual use, the system is in fact transmitting at the full 18 dBm txpower. Extensively testing of affected and unaffected units has been carried out by the entire Hak5 team across the world (as Darren and Seb are currently on Hack Across Europe) and we have verified that the reported configuration is *only cosmetic*. The RF performance of all MK5 units tested are nearly identical. A huge thanks to Shannon, Sara, Paul at the warehouse, Rkiver at HakShop EU and our manufacturer for thoroughly investigating and testing the MK5. We're are continuing to monitor the situation and are investigating the possibility of patching in a future firmware. Thanks for your continued support. We greatly appreciate all of the input that has shaped the future of the WiFi Pineapple ecosystem, and the WiFi landscape at large. :) --Darren & Seb
  15. Thank you, thank you. That was a 15 minute Photoshop job. It means a lot to me that you enjoy. I mean, don't get me wrong - Seb worked really hard on the software too - but hey, we all know why we're really here
×
×
  • Create New...