Jump to content

Dazzle

Active Members
  • Posts

    49
  • Joined

  • Last visited

  • Days Won

    1

Posts posted by Dazzle

  1. The above will only apply if the network that the laptop was connected to was unencrypted.

    In that case the Pineapple will broadcast the same SSID and whoever responds to the probe request first will get the client, I think it's all about the speed of the response and although proximity does play a role it is not certain that it will respond faster when it's closer

    If the network was encrypted the only way to prevent them from connecting to that network would be to keep a deauth running constantly so they (or their PC) are forced to look for a different AP (hopefully they'll sent out probe requests for an unencrypted AP so they'll connect to your Pineapple through Karma)

  2. You could try to mount the ftp server so you can access it like any other directory.

    You should be able to to that using something like http://curlftpfs.sourceforge.net/

    I haven't tested this with the Pineapple Kernel so I have no idea whether it actually works, but it's worth a try

    Maybe I'm overthinking it and your command might work just as well

    For your error about curl missing, have you tried installing it? (apt-get install curl)

    Regards,

  3. Here is why ip forwarding gets disabled, so adding -u should solve your problem:

    -u, --unoffensive Every time ettercap starts, it disables ip forwarding in the kernel and begins to forward packets itself. This option prevent to do that, so the responsibility of ip forwarding is left to the kernel.
    This options is useful if you want to run multiple ettercap instances. You will have one instance (the one without the -u option) forwarding the packets, and all the other instances doing their work without forwarding them. Otherwise you will get packet duplicates.
    It also disables the internal creation of the sessions for each connection. It increases performances, but you will not be able to modify packets on the fly.
    If you want to use a mitm attack you have to use a separate instance.
    You have to use this option if the interface is unconfigured (without an ip address.)
    This is also useful if you want to run ettercap on the gateway. It will not disable the forwarding and the gateway will correctly route the packets.
  4. You have to code manually anyway, the bartender will not code for you.

    Though, it will include things such as building in the CSS etc at a later stage. Way later.

    This module allows you to manage, and pack your infusions. You would be surprised by the number of small mistakes one can make that will render the modules useless.

    The Bartender just puts your code into the format it should be ;)

    Thanks for clearing that up, I'll look into it when I get the chance

    Great work!

  5. I've always used WBFS, I thought it had an ok interface and I was able to see game covers etc.

    Also at the time the USB loader I used didn't support Fat32, so I've never used it actually don;t know about the loading times, maybe it has more difficulty reading from a Fat32 disk? Not exactly sure on that one so you should test it out if you get the chance :)

    Good luck

  6. NT Offline password is a great tool indeed, I used it on Hiren's BootCD, maybe you can download and burn Hiren's BootCd, that way you've got NT Offline password live Infiltrator suggested and aslo a lot of different tools that will come in handy ;)

  7. I agree, it's probably even better to use a USB powered hub than this since this will require more power from the pineapple.

    A 3G expansion board would be great, but probably pretty expensive to manufacture.

    I don't think we'll be able to think of anything what can't be done with USB already actually :mellow:

  8. Thank you sir..sir i think you all are know about kon-boot software i download and install it to my pen drive ,,first time computer boot from the pen drive it say "COULD NOT FOUND KERNEL IMAGE:MENU.C32" and then i download it from internet and copy it to pen drive and boot again, now it boot and boot and boot nothing happen ,it comes BOOTING-UP and restart again ...and again...what is the reason for this and what is the solution???

    If you would like to get a password for a user on windows you can probably best use Ophcrack.

    Ophcrack will actually crack the password hash, where kon-boot will just remove the password.

    What exactly would you like to do?

  9. I had set auto start on for sslstrip and it locked me out too.

    To change the uHTTPd port nano the file '/etc/config/uhttpd'

    change the 7th line "list listen_http 0.0.0.0:80" to whichever port you'd like to use like this;

    "list listen_http 0.0.0.0:1337"

    then run '/etc/init.d/uhttpd restart' to restart the server

    Good luck,

    Dazzle

  10. Well it isn't really a page, you just get a login prompt in the terminal,

    Its the same one you get when telnetting to the device, and in the terminal it says adminu:admin adminp:password.

    While actually the username is root and the password is 80546334

    I got to that login prompt by using UART > USB but it's the same as telnet. Don't know what ALFA is thinking with their firmware, it's a buggy firmware and there's no documentation or updates for it.

    Sorry for the confusion ;)

  11. Don't think there's a way to reset it without Serial, because I read something about the reset button not working properly.

    To open your MK IV just take off the 2 feet on the side of the USB port, unscrew those 2 screws and then it kinda pivots on the other end

    Good luck,

    Dazzle

×
×
  • Create New...