Jump to content

UnDeFiNeD

Active Members
  • Posts

    48
  • Joined

  • Last visited

Everything posted by UnDeFiNeD

  1. No, you need to be in range of the target clients. It works by spoofing the ap's mac and sending deauth packets, if you arent in range of your target, they wont receive the packets. EDIT: just reread your post, (mdk3 mon0 m -t "her routers mac address") I dont know what the m option does, I thought you typed d, but I assume from the way you explained it that you are deauthenticating the clients
  2. Lol just watched The Ben Heck Show episode 24 and at the end he mentioned that next time hes going to take on Darren in the "LAN c computer case challenge battle to the death royale" :P Sounds fun...
  3. Not alot, I have actually used it as a DoS tool before ;) I have done 5 successfully using Cain and Able. Of course digip's answer is much better than mine, just throwing in my experiences...
  4. True, I was thinking that doing so would allow you to get people who never associated with and remembered the coffeeshops net, but if you are sitting right there with the other customers, the fon should out power the coffee net anyways so once they connected and remembered, the fon would then let jasager do its thing right? Plus changing it manually IS lame... :P
  5. Got a question for you, this will point all facebook.com subdirectories to the correct page? It looks like you take the host up till the slash but will your config settings allow for (for example) http://www.facebook.com/careers/?ref=pf to point to the correct phishing page? I havent figured out how to get around the fact that the fon tries to look locally for the /careers/?ref=pf page... I will try your way out when I get home, you obviously spent more than the 2 minutes that I took looking for a fix lol...
  6. You need to find a good spot to do it. For example a local coffee shop, where everyone is looking for an open network (simply changing the default ssid of the pineapple to the coffeeshops net might even be enough to get people hitting your pages).
  7. Not between the 2 options but its a HUGE difference from when I first received the pineapple...
  8. Lol I found a really good one, but a bit expensive... http://forums.hak5.org/index.php?showtopic=20548&view=findpost&p=182465 thats 12+ hours of pineapple goodness on a single charge :P
  9. http://forums.hak5.org/index.php?showtopic=20548&view=findpost&p=182465 ;)
  10. Huh? Are you talking about the pineapple? Jasager is software that runs on the pineapple...
  11. Ah yes, thanks guys, I did forget to mention brute forcing. I guess when he said "crack" I assumed he meant "decrypt" or something similar. Sorry for being a noob :)
  12. I believe hashes cant be cracked, I think they need to be checked against a list of known hashes... So if the hash isnt on those sites, you won't have any luck. May be wrong though, someone can correct me if im wrong :)
  13. Lol, theres a topic about this literally right below this one... http://forums.hak5.org/index.php?showtopic=20637
  14. I used to use something like this, when I first got the pineapple, it would have TERRIBLE range and so in the jasager file after auto starting jasager in /etc/init.d/jasager I added the line iwconfig ath0 txpower auto but I am going to try your way.
  15. For anyone interested: http://www.amazon.com/i-Sound-Portable-iPhone-Blackberry-Silver/dp/B00439G3WS I bought that, resoldered the plug connector from the battery pack to a USB cable and tested... it has lasted 12 hours on a full charge with 2 bars out of 4 left on the battery, I say that is a success! I hadn't been using it much due to limited battery life of 4 AA batteries, but now I have no reason not to use it :) (Plus I now have a decent backup usb power battery which is great since my droidx + hulu = 3 hour battery life :P )
  16. Awesome! Thanks for the release. I was about to start looking into more complicated stuff, this helps :)
  17. They actually arent that complicated, the simplest ones are just pocket cams/spy pen cameras. The camera records the pin while the skimmer records the card swipe as audio for decoding later. The most elaborate ones actually put a fake keypad over the real one and get super detailed, including bluetooth/texting the number to the theif.
  18. Nice, you should have gotten into ATM skimmers. Those are pretty cool.
  19. In windows 7, yes. If the client is looking for a saved secure network, the client will not autoconnect to jassager even though it changes it's ssid to that of the probe request, it is still an insecure network (open), it will not auto connect. However, I believe earlier service packs of XP will auto connect (not positive though)
  20. In windows, with secured networks, the check box for auto connect is checked by default and is activated when you press connect. However I don't believe unsecure networks are checked by default (so you would have to manually check it), and might not even have the checkbox available in windows 7 (not sure since I tend to teather to my phone when on the go...)
  21. Well I bought a teensy the other day and have been messing with it. I wanted to send the computer's name and the current user to my server so could log it (I plan to use it to mess with my friends at school so i need to know). Heres what I ended up using (server side just takes a get request, adds the IP and date then logs it) It may be messy, I dont know batch that well so that was thrown together from tidbits I learned and probably not that efficient (but it works)... If anyone knows any better ways, let me know :)
  22. Hmm, I think jasager can only mimic the name of the network, not the encryption level. That is what I found through my experimentation, but someone with more experience might know otherwise. Basically your Windows computer has a list of preferred networks. The only order it goes by is the last network you set to autoconnect is searched for first, then if it cant find that one, it probes for the one before that, then the one before that and so on. It will use that order unless you set up your preferred networks manually.
×
×
  • Create New...