Jump to content


Active Members
  • Posts

  • Joined

  • Last visited

  • Days Won


Everything posted by hfam

  1. Lemme know if you want someone to test, i'm in IRC.
  2. Edited: local issue, disregard. :)
  3. edited: local browser issue. Otherwise, except the SSLstrip issue, everything else seems to be working just fine!! Nice job seb and all!
  4. At that point connect to It should prompt you to continue setup
  5. KIND OF?? Hell yeahyeahyeahyeah, yeahyeahyeah yeahyeahyeah...whoahohohohoooooo it is!! :)
  6. I had a feeling that it was something along these lines. For my part, I carefully and intentionally worded my post so I never indicated a "bug", but that something was introduced, and perhaps expected behavior. This was an upgrade after all with improvements at the security level, and I had a suspicion this was the side effect of an improvement pushed in the new update and not unexpected. I'm glad to know what the issue is, fix it up, and get on with it, thanks again for taking such good care of us seb! We love you brother! :)
  7. Could be, but consider this: Target #2 is prompting me to actually log into the network when choosing the Karma SSID, using the same pineapple login page, with root already populated. This is before attempting to open a browser and actually get a redirected request. Even though both ask for auth when opening a site, it seems it's the network asking for authentication, not a faulty redirect because once you log in, the request is redirected and you get the payload. Also, confirmed there are no rogue chars in the spoofhost file. It'll be interesting to find out what's going on though. Can't do anymore fussing with it til tomorrow though. eta: clarity
  8. Thanks for all your hard work seb! Upgrade went fine, but unfortunately it looks like something else was introduced? On Android devices (the same ones that worked yesterday flawlessly with the MKV), in order to access the network, i have to actually log into the pineapple before the payload shows up? Target #1, HTC DNA: Before 1.0.1, Karma and RR worked flawlessly. Now, I can connect to Karma SSID the same way (select it and it connects), but when opening a browser, any page presents me with the Pineapple Login, root is already in the username dialog box. if I login, I then get the RandomRoll payload. Target #2 Kindle HD: Before 1.0.1, Karma and RR worked flawlessly. Now, when I connect to Karma SSID, after the "open network" warning, I get another warning indicating I must log into the network before use. I choose OK, and I am presented with the Pineapple Login Page, root is already in the username dialog box. I choose to cancel, shows me as connected to the Karma SSID, and then I open Firefox. Any attempted page presents me with the Pineapple Login, root is already in the dialog box. If I login, I then get the RandomRoll payload. What changed that would cause this? If it's expected behavior, the target rich environment just became target barren. :( Any help would be greatly appreciated, thanks! eta: clarity
  9. Very sweet, thanks! Been waiting for a complete all break downs list from 1-300 for what seems like forever.
  10. LOLOCOPTERS!!!! I was having a completely shitty day up to now, THAT was what I needed!! Thanks for the huge laugh brother!! :lol:
  11. Spot on! I see one there for $1200 BIN. Damn it, I just dropped a bunch of cash on a new 7 string or I'd add that to my arsenal. In the meantime, I can dream about Kismet on Android :) :)
  12. mmmmmmmmmmmmmm....Flooooooooook God I love Fluke gear
  13. The travel kit battery is 8800mAh
  14. WOW!!! The travel kit arrived today and the extra goodies are awesome, thanks Darren and the entire Hak5 crew!!! LOVE the coins and stickers!! Some lucky bastard is gonna get an AWESOME geocache coin on their next outing, gotta share! :) The NSA stickers are high style!! The travel case looks to be of excellent quality and even better than I'd imagined! Charging the battery right now. Thanks again to the Hak5 crew for taking such good care of us!!
  15. There's a problem for everyone, as indicated in the *other* DNSspoof is broken thread: https://forums.hak5.org/index.php?/topic/30580-dns-spoof-not-spoofing-the-dnses/ ...where Seb indicated "there is a fix on the way".
  16. Thanks seb, I knew you'd bring the code!! :)
  17. Bumpity bump. Seb? Darren? Can either of you weigh in on this issue? It seems there is definitely something amiss with DNSspoof beyond fixing the built-in editor (a la the MKIV issue) to stop inserting ^M at the end of each line when saving an edited .conf file. I'm out of ideas on this one.
  18. You got a bad Anker. I ran the MKIV with my Anker 10000mAh on 12v and it would run for 12 hours, easy. I never ran it down to the bottom, but it would run seemingly endlessly. I'd return that Anker and get a new one.
  19. There is already an entire thread on this issue. Please search the forums before starting another thread: https://forums.hak5.org/index.php?/topic/30580-dns-spoof-not-spoofing-the-dnses/
  20. No worries Darren, thanks for handling it, and good luck!!
  21. I'm not sure how a MKV is going to "mimic" what the NSA does with regard to personal privacy, or how you position a demonstration based on those parameters to relate in any way to what the NSA is doing. A couple of salient points: - I would have to hunt far and wide to find anyone who still actually believes that a warrant is a crucial requirement for data spying and acquisition, your mileage may vary. - The "warrant" is a legal issue and has nothing to do with technical capabilities. The definition of "spying" belies any sort of notion that a "warrant" is required. - The NSA is able to achieve their warrantless spying because they not only have the ability to capture packets on the internet backbones, but the other crucial issue is that they have padded the bank accounts of private sector tech giants millions and millions of OUR taxpayer dollars, in secret, so they will provide the ability to violate your privacy through back doors, and unmitigated access to decrypted data. Microsoft, Apple, Skype, YouTube, Box, Twitter, Google...you name it, the NSA has paid them off with OUR money, in secret...and these companies took the money, in secret...and let them in the back door, giving the NSA complete, unmitigated access to the data AND the identifying data, in secret...so they can save it all and pin whatever the witch hunt du jour is at the FedGov on you, your friends, neighbors, and loved ones at their leisure. Every one of these corporations happily obliged the NSA in their quest to violate your 4th amendment rights. I suppose at an almost unrelated level you can attempt to show...something...regarding the issue of eavesdropping on what most assume is a private data stream, but I assure you that PRISM doesn't incorporate SSLStrip, pineapples, or warrants, to achieve their goal of making sure they can prove everyone is a criminal. It would be very hard to equate the two aside from the base issue of obtaining data in secret. Good luck on your presentation though :)
  22. Darren indicated in another thread there was a last minute delay with the supplier, and thought they'd go out on the 25th. I too am awaiting the shipment, same deal. I'm sure everything is under control. :)
  23. That *is* evil! ;) Sounds like something is flaky anyhow. I didn't use any wild cards in my entries and at least the redirect happened, so maybe there's a clue there, but yeah, looking forward to seb solving the mystery for sure. :)
  • Create New...