Jump to content

mubix

Dedicated Members
  • Posts

    516
  • Joined

  • Last visited

  • Days Won

    3

Posts posted by mubix

  1. Good question, I have often thought about the same thing but never tracked it down. You should still be able to get the keys pressed. :/ I'll check it out and post back if I can figure it out. If you have figured it out since you've posted, please let us know

  2. When I do physical assessments that have WPA/2 enabled wireless networks I would like to have the ability to walk around the facility with a pineapple in my backpack and have it constantly trying to get a handshake in a reliable way. 

    Here are a few requirement requests:

    1. Stability is key. I might only get one walk through to get it done.
    2. Needs to support more than one WPA ESSID (name). If I am targeting a building and they have a Employee and Guest networks I need to be able to get both in one go. See #1
    3. Ability to automatically verify the handshake is valid via Aircrack or other tool
    4. Remove WPA ESSID automatically from the rotation if valid handshake is captured
    5. Shutdown the pineapple if all captured (save battery) optional setting
    6. Constantly be re-scanning the area for best AP to target. (If "BOBWIFI") is no longer in range it shouldn't attack it again
    7. Always target AP with best signal if possible
    8. Prioritize APs with clients if possible
    9. Have an auto-on with loaded AP names so I can just plug in the Pineapple when it's go time and not have to configure anything post-boot.
    10. Have the ability to auto-add APs in the area to a "temp" list while keeping a "target" list.
    11. List of APs with captured/verified handshakes for easy download of cap file
    12. Use both wifi cards if possible for 5ghz (TETRA) as well as 2ghz
    13. Try a few ways to get the handshake, I know there are a few techniques out there but I don't recall them all.

    Thoughts?

    • Upvote 4
  3. I'm soo late to this game but I made a video to describe my feelings about it and help where I can to spread the word:
     
     
     
    We on this list are for the most part already participating in a social group that has support. I'm not saying we don't have problems, but the ones that don't have such support, who aren't part of any groups or you only see at a con or two, but don't speak, don't participate in CTFs or other side events. Those are the ones (usually) in the most danger of feeling isolated. So, if you know people like that, reach out, invite them to be part of your team, group, or talk.
     
    Let us all help to make sure that another life isn't list for avoidable reasons. There are too few of us as it is.
  4. Pictures and screenshots could help with troubleshooting. Right now all we have to go on is this:

    1. You are using a 2GB SD card from an old phone formatted to FAT (I'm assuming this is a microSD
    2. You tried multiple payloads and they didn't work.

    Questions:

    • Are you encoding the payloads?
    • What payloads have you tried?
    • Does it recognize as a keyboard when you plug it in?
    • What operating systems have you tried plugging it into?
    • inject.bin is in the root folder of the SD card right?
  5. @Faelian You need to drop another binary, like a meterpreter binary. Apache automatically de-escalates it's processes/threads down to www-data, which is a built in function of the binary, so even if you SETUID it, it should still act the same giving you only www-data. So in order to gain the persistence, you'd have to put another binary on disk or setuid one that is already there that you can manipulate. Check out this post for more info: https://www.pentestpartners.com/blog/exploiting-suid-executables/

  6. Non root mobile devices, persistent meterpreter!

    this is a challenge, how many ways can you launch a meterpreter. I was thinking about a modified phone charger...

    What would the phone charger do? It's plugged into a wall on one end, and an iPhone on the other (and everything past I believe iOS 7.0, the phone asks if it should trust the "computer" when trying to do anything). Or if you are targeting Android you still have an issue of cable / computer trust.

  7. Please show us how to connect 2 instances of Metasploit together, so for example, I want an instance running on a VPS in the cloud to wait for connections from shell's etc and another running on my laptop and be able control the one in the cloud from my local copy etc so that my local copy retains all the database information and reverse credentials without having my laptop details exposed. I guess i am wanting to use the cloud instance as a remote launch pad does this make any sense??

    Why not just use the cloud instance? Metasploit is all commandline driven anyways. And if you are using the GUI it's the same. Do you just want the database local?

  8. Any ideas on why the droid would show USB not connected, when I connect with the exact same cable to a PC it works just fine.

    This is what I get in dmesg

    [  996.800000] usb 1-1.2: new high-speed USB device number 29 using ehci-platform
    [  996.930000] scsi20 : usb-storage 1-1.2:1.0
    [  997.130000] usbcore: deregistering interface driver usbserial_generic
    [  997.130000] USB Serial deregistering driver generic
    [  997.140000] usbcore: deregistering interface driver usbserial
    [  997.170000] usbcore: registered new interface driver usbserial
    [  997.170000] USB Serial support registered for generic
    [  997.180000] usbcore: registered new interface driver usbserial_generic
    [  997.180000] usbserial: USB Serial Driver core
    [  997.590000] usb 1-1.2: USB disconnect, device number 29
    
  9. Mailvelope is still a good solution on Windows. My only hit on the product was that the developer wasn't using the available encryption in Chrome to encrypt his storage so that an offline attacker couldn't get the keys. And yes your point still holds that if people use a good password then the keys will be useless to the attacker.

×
×
  • Create New...