Jump to content

SystemCrash86

Active Members
  • Posts

    254
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by SystemCrash86

  1. Yes it is a mark 2, thanks i will try flashing the mark 3 firmware. Wasn't there a wp3.sh script to run it in linux, where would i find it becasue like i said this is a little out of date?
  2. Hey guys, I have a wifi pineapple mark iv brought from the hakshop and all is well and seems to work. But i have an older version of the pineapple mark 2 (you know that one in the white casing they used to sell in the hakshop) Well its just sat there gathering dust and i want to reflash the mark 2 firmware on it to give it a fresh clean install since its not been used in ages. I know how to do it but on the tutorial i am missing two files that i can't find any where: webif_0.3-4709_mips.ipk haserl_0.9.24-1_mips.ipk Does any one know where to get these files from as some of the links i have tried dont seem to work anymore. I do know that this is alittle out of date, but i have the mark 2 just sitting there and i thought why not
  3. By using the information provided in this thread, thanks to everyone who answered my question i was able to change my airdrop-ng rules to: a/router providing internet|computer connected to internet a/wifi pineapple bssid|any d/any|any Before i was also adding in my alfa adaptor to the allow rules but then realised i didnt need to becasue all that would be doing was sending deauth requests using airdrop-ng. Then the issue with the pineapple address, on the bottom of the device it says one address but running airodump-ng it says another so i put the one seen in airodump-ng. On the pineapple the mac address ends in 69:D0 and in airodump-ng the bssid ends in 69:D2. After running constantly for about say 45 min i loose connection on the pineapple, i mean i can't reveal my public ip address or download any modules and i get the error "error connection, please check your internet connection". Yet i can still open up a browser and surf the web. I am still unsure about this
  4. Update After some tweaking i managed to get my setup to work somewhat. I have my laptop running Backtrack 5r3 with all the updates connected to a pineapple mark 4 via eth0 and using my laptops internal wireless card to connect to my home router in this case its wlan0. Thats working good and i have a somewhat stable connection**** Then i plug in my Alfa Awus036h wireless adaptor and turn on monitor mode which i use for airodump-ng and airdrop-ng after tweaking the rules file which i had previously had problems with. Then i ran airdrop-ng without any errors but everytime it ran it would make my computer freeze up so i had to add a -s sleep to the airdrop-ng command to slow it down and it ran without a hitch. I know this worked because i still had my connection to the internet which wasn't being disconnected by airdrop-ng and i got more clients on the pineapple. ***** However on a side note, after a while i find that the pineapple can no longer access the internet. I know this becasue i tried to "reveal my public IP" and download more modules for the device but i get "error connection, please check your internet connection". I am unable to explain this because i can ping sites including websites, computers and even the pineapple itself and i can open up a browser and surf the web so i am alittle confused as to what is going on. All help is very much appreciated
  5. Thanks, i tried that and for some reason it disconnected me, i must have mis-typed something. Thanks again for all your help. I was just watching the youtube video of the airport challange and i couldn't explain Darrens airdrop-ng deauth rules becasue he allowed everything to the pineapple but thats it. So i was just curious about that.
  6. Thanks, When i was watching Darren's Airport challenge he showed us the rules he made for airdrop-ng so that all clients would disconnect from the access point they were connected to and reconnect to the wifi pineapple. His rules were as follows: a/bssid of wifi pineapple|any d/any|any Now my question is, where is the pineapple getting its internet from? Because its not in the airdrop-ng rules that he set up which means that everyone is connecting to the pineapple but they dont have internet access. What would be the rules for airdrop-ng to include internet access to the clients who are connecting? I have a pineapple, a home router providing internet access and alfa Awus036h adaptor and when i tried airdrop-ng i lost connection so i would like to know what the airdrop-ng rule file should look like inorder to make this work
  7. Update It worked, the reason it didnt work was because backtrack 5 had disconnected me from the internet without and notification, once i re-established connection everything when fine. I really am sorry to have wasted all your precious time as that was definately not my intention But thanks for all your help i really appreciated it and once again i really am sorry
  8. Yes i did, that was what i tried 45 minutes later and all i get is "The connection timed out" "Server at 172.16.42.1:1471 is taking too long to respond" and the previous tab is not refreshing for over 2 hours now. Any ideas? Stopping the page now or doing anything to it might brick my device Please help
  9. I am having the same issue. I got my pineapple with firmware 2.4.1 and am currently upgrading to version 2.7.0 but after 2 hours i am still waiting for the page to refresh. What do i do? If i stop in the middle of the procedure will i risk bricking my device?
  10. Using karmetasploit is the same as using the Jasager on the WiFi pineapple, right? You use karma in karmetasploit to respond to all probes as soon as WiFi is turned on. The fake access point provided by airbase-ng from the aircrack-ng suite. Is that right? If so I have a question about using airdrop-ng, also from the aircrack-ng suite at the same time as using karmetasploit. My set up is Backtrack 5r3, Alfa Awus036h as my usb wireless card and my laptops internal WiFi card and my own Desktop PC in this case playing the “victim” Both wireless card support packet injection. Everything is up-to-date. In setting everything up I have loaded up Backtrack and connected my internal WiFi card to my own internet access point so I have internet access. I then connect my Alfa Awus036h and set it up as my fake access point which will be used by Karmetasploit. Everything works, using my Desktop PC I am able to connect the fake access point (provided by airbase-ng on Alfa wireless card) and use the internet because my other wireless card is connected to my internet hub. But I would like to use airdrop-ng but I am having some trouble setting up the rules to force my PC to connect to my fake ap. In the allowed rules do I put the bssid of my fake ap so they can connect to it but also do I have to use the bssid of my wireless router so everyone can get internet access. Do I use one or both bssids? How would that look like? I am doing all this from my backtrack machine so when using airdrop I don’t want to lose my connectivity which is providing the internet to the fake ap. I saw Darren using the WiFi pineapple on the “Airport WiFi Challenge” using Jasager and airdrop-ng together. Just wondering how he got them to play nice together - using Jasager (Karma + fake ap) and airdrop-ng while still maintaining internet access
  11. Yeah i tried airmon-zc and i still get the same result. I always use airmon-zc because of my wireless chipset anyway and everything was working until i apt-get upgrade in backtrack 5r2 and it updated aircrack suite and now it wont work, especially putting my card into moniror mode and using airdrop-ng.
  12. I use backtrack 5r2 and i did apt-get upgrade and recieved a new aircrack upgrade. However this new upgrade doesnt work. When i use airmon-ng to place my card into monitor mode i get a response saying that my device is busy and when i try and use airdrop-ng and try and use my monitor interface it tells me that that interface does not exist. Everything worked fine before the update. Has anyone had similar issues with the latest version of aircrack. Does anyone have a solution?
  13. I got this new android phone and I am very new to android and it turns out I need to root this phone and I don’t know how to do it with this model. Vodafone Smart 2 Alcatel V860 Firmware Version 2.3.7 Build Number 01015 I need root to delete some of the factory apps and make space but the program I found to do it is called “SuperOneClick v2.3.3” and every time I run it the program keeps crashing half way through. There is a video on youtube, the URL is and this is my model phone and I follow the video exactly but when I get to the recovery menu mine is different. I am supposed to get options and menus but instead all I get every time is “All data will be lost, continue?” and that same message is repeated in different languages until you get to the bottom where there is a green tick and a red cross. The green tick wipes my phone back to its factory settings effectively erasing all my data and the red cross boots my phone like before, so nothing has changed.Any help is greatly appreciated.
  14. Yes its all on the same network - my network, with a backtrack machine and a windows xp virtual machine. How would i get the vnc working then? In the social engineering toolkit after you chose java applet attack and clone the website it gives you a list of payloads and option 3 is the vnc one. I pick that one with no errors and on the virtual machine i get the metasploit courtesy powershell and on my backtrack machine i get some information like the payload is being sent and it hangs at: [*] Starting local TCP relay on 127.0.0.1:5900... nothing else happens. I do have a screenshot but apparently the picture is too large to attach. Have i got to do something else on the backtrack machine to enable vnc or something? Every tutorial i have seen shows the vnc window pop up automatically in the backtrack machine but mine doesnt. Did i miss a step?
  15. In the Social Engineering Toolkit i clone a website and pick the java applet attack and chose option 3 the vnc payload. Everything works perfect with no errors at all, I have screenshot but the picture is too big to be uploaded but it shows - my backtrack 5 r2 machine and my windows xp virtual machine i get the courtesy shell on my xp machine and in backtrack it tells me that: [*] Starting local TCP relay on 127.0.0.1:5900... and thats it - it just hangs there, nothing else happens. I dont know what else to do. All the tutorials i googled and watched on youtube all show this with the vnc server popping up and starting automatically. Did i miss something? All idea's are very much appreciated. If anyone knows a way for me too add the screenshot then i can actually show you what is happening
  16. Its the one that came with Backtrack 5 r2, i do msfupdate all the time. Are you telling me thats not the latest version?
  17. root@bt:/opt/metasploit/msf3/modules/auxiliary/dos/wifi# ls -l /opt/metasploit/msf3/modules/auxiliary/dos/wifi/fakeap.rb -rw-r--r-- 1 root root 2469 2012-02-22 04:17 /opt/metasploit/msf3/modules/auxiliary/dos/wifi/fakeap.rb root@bt:/opt/metasploit/msf3/modules/auxiliary/dos/wifi#
  18. In order to use the WiFi modules, the lorcon2 extension must be installed: # cd /pentest/svn # svn co http://802.11ninja.n...vn/lorcon/trunk lorcon2 # cd lorcon2 # ./configure --prefix=/usr && make && make install # cd /pentest/svn/framework3/external/ruby-lorcon2 # ruby extconf.rb # make && make install The install is successful but I am still unable to use the WiFi modules. Did I miss a step because every where I have found are the same instructions as stated above and as you can see from the output below it doesn't work. =[ metasploit v4.3.0-dev [core:4.3 api:1.0] + -- --=[ 821 exploits - 461 auxiliary - 141 post + -- --=[ 250 payloads - 27 encoders - 8 nops =[ svn r15057 updated today (2012.04.03) msf > use auxiliary/dos/wifi/fakeap msf auxiliary(fakeap) > run [*] The Lorcon2 module is not available: no such file to load -- Lorcon2 [-] Auxiliary failed: RuntimeError Lorcon2 not available [-] Call stack: [-] /opt/metasploit/msf3/lib/msf/core/exploit/lorcon2.rb:66:in `open_wifi' [-] /opt/metasploit/msf3/modules/auxiliary/dos/wifi/fakeap.rb:44:in `run' [*] Auxiliary module execution completed msf auxiliary(fakeap) > I hope you can help and shed some light on what I may have done wrong here. This is the current version of Backtrack 5 r2, i have apt-get update, apt-get upgrade and apt-get dist-upgrade. I have svn updated everything as well but still no answer. Apparently i need an older version of lorcon to make this work but after googling i can't find and site which tells me how to get an old version of lorcon and to make it work with metasploit. Can anyone tell me how this is done?
  19. Has anyone else encountered problems with Lorcon with Metasploit using Backtrack 5 r2, or is it just me? Anytime i try and use and of the wifi modules included in metasploit i get alot of lorcon errors
  20. root@bt:~# airmon-zc This script is intended to replace airmon-ng and is functionally based on it. Please test and report bugs to Zero_Chaos on freenode in #aircrack-ng Linux bt 3.2.6 #1 SMP Fri Feb 17 10:40:05 EST 2012 i686 GNU/Linux K indicates driver is from 3.2.6 V indicates driver comes directly from the vendor, almost certainly a bad thing S indicates driver comes from the staging tree, these drivers are meant for reference not actual use, BEWARE ? indicates we do not know where the driver comes from... report this X[PHY]Interface Driver[stack]-FirmwareRev Chipset Extended Info K[phy0]wlan0 rt2800pci[mac80211]-0.34 Ralink corp. RT3090 Wireless 802.11n 1T/1R PCIe root@bt:~# The driver is mac80211. I have had no problems with lorcon before and as far a i can see my card is compatible with lorcon
  21. I am unable to use the Wi-Fi modules in metasploit despite the following instructions to install Lorcon2: In order to use the WiFi modules, the lorcon2 extension must be installed: # cd /pentest/svn # svn co http://802.11ninja.net/svn/lorcon/trunk lorcon2 # cd lorcon2 # ./configure --prefix=/usr && make && make install # cd /pentest/svn/framework3/external/ruby-lorcon2 # ruby extconf.rb # make && make install The install is successful but I am still unable to use the WiFi modules. Did I miss a step because every where I have found are the same instructions as stated above and as you can see from the output below it doesn't work. =[ metasploit v4.3.0-dev [core:4.3 api:1.0] + -- --=[ 821 exploits - 461 auxiliary - 141 post + -- --=[ 250 payloads - 27 encoders - 8 nops =[ svn r15057 updated today (2012.04.03) msf > use auxiliary/dos/wifi/fakeap msf auxiliary(fakeap) > run [*] The Lorcon2 module is not available: no such file to load -- Lorcon2 [-] Auxiliary failed: RuntimeError Lorcon2 not available [-] Call stack: [-] /opt/metasploit/msf3/lib/msf/core/exploit/lorcon2.rb:66:in `open_wifi' [-] /opt/metasploit/msf3/modules/auxiliary/dos/wifi/fakeap.rb:44:in `run' [*] Auxiliary module execution completed msf auxiliary(fakeap) > I hope you can help and shed some light on what I may have done wrong here. This is the current version of Backtrack 5 r2, i have apt-get update, apt-get upgrade and apt-get dist-upgrade. I have svn updated everything as well but still no answer. Apparently i need an older version of lorcon to make this work but after googling i can't find and site which tells me how to get an old version of lorcon and to make it work with metasploit. Can anyone tell me how this is done?
  22. ahh ok well i tried everything i can think of so help would be greatly appreciated. Hope you get your working again
  23. When using the EasyFlash Flashing Tool i chose the windows download from http://forums.hak5.org/index.php?showannouncement=6 - would this be why my pineapple works in windows but not in backtrack? Should i have chosen the linux link instead to make it work with my backtrack?
  24. A video would be very good right about now So using the information provided how would you fill in the wp3.sh script because i have tried it various different ways and still no connection root@bt:/pentest/wireless/wp3script# ./wp3.sh Input Pineapple Netmask [or ENTER for 255.255.255.0]: ?? Input Pineapple Network [or ENTER for 172.16.42.0/24]: ?? Input Interface between PC and Pineapple [or ENTER for eth0]: eth0 Input Interface between PC and Internet [or ENTER for wlan0]: wlan0 Input Internet Gateway [or ENTER for 192.168.1.254]: ?? Input IP Address of Host PC [or ENTER for 172.16.42.42]: ?? Input IP Address of Pineapple [or ENTER for 172.16.42.1]: ?? it seems simple but evidently i have done something wrong
×
×
  • Create New...