Jump to content

Darren Kitchen

Root Admin
  • Content Count

    4,826
  • Joined

  • Days Won

    223

Everything posted by Darren Kitchen

  1. What output do you get from the UART port when connecting by Serial? That would be really helpful in diagnosing the issue. It's possible the device is not in the bootloader. If you connect by serial, you will have the option to enter the bootloader by key press rather than holding the button.
  2. Yes. By default the open AP is hidden. You can change this from the Networking page:
  3. I use my WiFi Pineapple TETRA with my Mac all the time. It's simple. Power on the device using the included AC adapter. Plug in a USB cable between your Mac and the WiFi Pineapple TETRA ETH1 port You may need to install the Realtek drivers from https://www.realtek.com/en/component/zoo/category/network-interface-controllers-10-100-1000m-gigabit-ethernet-usb-3-0-software Browse to http://172.16.42.1:1471 Since the WiFi Pineapple TETRA has its own operating system and is managed by standards like SSH, Serial or HTTP - it's in effect OS agnostic. The method for us
  4. I recommend contacting support: https://support.hak5.org/
  5. You shouldn't need to configure a static IP address if you use the USB Ethernet port. That port is configured with a DHCP server to offer an IP address upon request. This is the default for most modern operating systems. You won't need to open ports on your firewall or anything like that. When connecting the ETH1 port on the WiFi Pineapple TETRA to your computer by USB, it will enumerate as a Realtek USB Ethernet adapter. Driver installation should be automatic, however if it is not they can be found from https://docs.hak5.org/hc/en-us/articles/360010555833-Ethernet-on-the-WiFi-Pinea
  6. These may be good places to start: https://zerotier.atlassian.net/wiki/spaces/SD/pages/7438339/Layer+2+Bridging+with+LEDE+OpenWRT https://github.com/mwarning/zerotier-openwrt/wiki
  7. I was able to reproduce the issue with WiFi Pineapple TETRA firmware 2.6.2 and Cloud C2 v2.2.0 with a very large PineAP pool. Since then I upgraded the WiFi Pineapple TETRA to firmware 2.7.0 and haven't been able to reproduce the issue: Can you post the contents of /tmp/cc-client-error.log ? Also - can you post your PineAP settings? Are you collecting SSIDs to the pool? Broadcasting the pool? Doing beacon response? Are there SSIDs in the pool - and if so, how many? Is Allow Associations enabled for clients?
  8. Glad to hear you got it sorted. I knew it wasn't the pineapple that was causing the issue. I was annoyed by recent changes in Kali, which lead the ICS updates in the documentation specific to the most recent versions. I posted a video explaining the process doe Kali 2020. It's really annoying to have Network Manager override iptables configurations set by root in the terminal. I wish more operating systems would stop trying to be so "helpful" and get out of the users way. Good to know Parrot is one such OS.
  9. We were working on our infrastructure yesterday which caused a brief outage. Apologies for the inconvenience.
  10. Ensure that your fstab looks like the below. It can be edited from the Advanced page. config global option anon_swap '0' option anon_mount '0' option auto_swap '1' option auto_mount '1' option delay_root '5' option check_fs '0' config mount option target '/sd' option device '/dev/sdcard/sd1' option fstype 'auto' option options 'rw,sync' option enabled '1' Then make sure your MicroSD card has only a single, unnamed partition and is formatted EXT4.
  11. Welcome to hacking - anything is possible. That said, the Key Croc isn't going to do this out of the box and I'd be hard pressed to give you a good answer on how exactly right now. I've seen some research in the field of capturing voltage variances over a USB hub which, with a lot of math, could yield some helpful results... But let's just go with a simple 'no' for the moment.
  12. I recommend checking that the target for your cross compiler is the MT7628DAN MIPS SoC.
  13. @Don Joe the tput command used in sharkjack.sh is to be executed on the host computer – not the Shark Jack itself.
  14. @Aaron Outhier the nmap log is from QA at time of manufacture. The Shark Jack will get warm, but not HOT. As mentioned in the important safety information and warnings from the documentation: https://docs.hak5.org/hc/en-us/articles/360034129974-Important-Safety-Information-and-Warnings It should only take 5-10 minutes max to fully charge. It does get warm while charging. Disconnect when the charging has completed. During operation, it may get warm but not hot. If this behavior continues please reach out to us. https://shop.hak5.org/contact
  15. @Aaron Outhier that web server was introduced in the latest firmware and is only present in arming mode. It's a convenient way to see loot and update payloads.
  16. @40trieslater here are my thoughts based on your posts: After a factory reset, the system is restored from a backup partition however the udisk may be untouched – so this probably explains the discrepancy with your udisk/version.txt The control keys you are seeing indicates that your keyboard is not a generic HID keyboard, but rather a "fancy" composite device containing multiple HID devices (usually for multimedia controls, RGB LED controls, etc). We have also seen this behavior with bluetooth keyboards that happen to have USB functionality (for charging) like the Apple Magic keyboa
  17. This has now been addressed in firmware 1.3 – see the post at
  18. Try the QUACK HOLD command, but that might do it. I'll give it a shot soon. See the section on HOLD and RELEASE at https://docs.hak5.org/hc/en-us/articles/360047381354-QUACK-and-Ducky-Script-2-0 Essentially you'd want to determine the scan code from the language json and pass it to QUACK HOLD. It looks like COMMAND-r from the us.json is 12,00,15 – so the command would be: QUACK HOLD 12,00,15 QUACK DELAY 5000 QUACK RELEASE That would hold COMMAND-r for 5 seconds.
  19. Thank you all for the incredible feedback on the Key Croc – especially the 1.3 beta. We knew in development that we were on to something game changing, so to hear the enthusiasm from you all directly is truly rewarding. The amount of creativity shown in such a short period of time since initial release is encouraging. We hope that with this Key Croc firmware 1.3 we can further that creativity. As always we welcome your feedback here on the forums and of course on our Discord channel. Thanks for your support and happy hacking! Huge thanks to our team – @Korben for his work on thi
  20. It could be that the drivers aren't installed. They usually install automatically. What does device manager say?
  21. When you say stream, you're talking video rather than screenshots? If so - it may be achieved with ffmpeg: https://trac.ffmpeg.org/wiki/StreamingGuide
  22. I see how that wording is confusing. The intention was not to mislead. I will update it to make it more clear. The sales page states that video captures save mpeg files in various bitrates. When we finish up the currently in progress feature release of the Key Croc, we will investigate adding the C2EXFIL option for video files with an update. Live video streaming could be setup today using ffmpeg, which may be installed from apt on the device. There is a root shell accessible via serial. That said, this setup would require an RTMP server in order to receive the video signal. That's o
  23. This is by design. We can look into adding it in a future version.
  24. @fogmaster21 I recommend using the official javascript encoder from https://shop.hak5.org/pages/ducky-encoder If you manually specify a language file (json) and pick the us.json linked at https://github.com/hak5/bashbunny-payloads/tree/master/languages You will find that the following command will produce the appropriate scan code to inject the combination you want. CTRL-ALT e From the language file: "CTRL-ALT": "05,00,00", "e": "00,00,08", So this will produce the scan code 05,00,08 I hope that helps.
  25. Interesting. I had a similar problem on Kali Linux 2020.2. It seems that interface enumeration may have changed. Replacing line 75 to the following solved the problem for me: IFACE=$(route | grep 172.16.24.0 | awk '{print $8}')
×
×
  • Create New...