-
Posts
412 -
Joined
-
Last visited
-
Days Won
4
Posts posted by mreidiv
-
-
It could be, but I would hope not. A sim card slot would mean a person had to purchase and register a sim card from a mobile carrier (ie AT&T or Verizon). There would no longer be the anonymity of purchasing one at a brick and mortar store with cash and topping it off whenever you need it.
An SD card would get rid of a USB drive and free up the space for a USB modem or another NIC
But, you coud purchase a pay as you go phone with a sim card with cash. and some places sell you a sim card and dont check id. But i see your point.
-
Just a thought but that slot could be a sim slot ....? not an sd slot. It could be a possiability to do away with the external dongles.
-
Video looks to show a DC power wire feeding it.
I know but would be nice.
-
Wondering if the second antenna is just for extra reception, or for a second radio. 2 radios in one case, without the need for an external Alfa? That would be sweet. I did notice that the hakshop recently stopped selling NHA's... very interesting.
And the video seems to show custom packaging... does that infer a custom board this time?
not sure but would be neat if it contained an internal battery. Lol Wishfull thinking
-
Where is the video at?
This should be enough info for you to find it...
https://forums.hak5.org/index.php?/topic/30466-wifi-pineapple-mark-v-teaser/
-
i agree i do not think it is the yun. I was just stating that the hardware would be nice to use. The video shows that the mk5 has two antennas and the lights are in the wrong place.
-
ok tease me...lol
-
this might be a good platform also
http://arduino.cc/en/Main/ArduinoBoardYun?from=Main.ArduinoYUN
-
-
Nope it is me just screwing up again lol ill keep quiet now :(
-
Alfa is the manufacturer, data-alliance is a distributor. Unless they are the same company.
Also, directly from the link above.
"Data Alliance offers this AP with the Hornet-UB board, with Pineapple Mark IV firmware wireless router operating system."
Yes you are correct that the manufacture is alfa and that Data Alliance is the retailer, Kind of rushe into that one i knew better,
But still the hardware is the same but the pineapple firmware is not on the device sold by Data Alliance. -
Thats the mqanufacture of the hardware that the pineapple runs on. It is set up as a standard AP and does not include the features / software the Pineapple does. Also i believe that the bootloader is locked.
-
I bought it here: http://www.hardware-store.dk/index.php?searchStr=USB+3.0+hub+&act=viewCat&Submit=S%F8g
At this link: http://www.hardware-store.dk/usb-3-0-hub/prod_9295.html
There are other models:
http://www.hardware-store.dk/usb-3-0-hub/prod_9294.html
Thanks sure wish i could find one in the US. Ill keep searching.
-
Love that hub/reader shoot me a link to get one i cant find them in the us.
-
Would you mind letting us know what program it was.... Your kind of leaving the topic open. :)
-
I don't know about simulations but here are some tips:
Red Team
Before Start of Play- Who will be the team organizer? The team organizer documents the networks, system names, OS versions, IP addresses, open ports, passwords, and updates configuration changes for everyone to see (such as on a whiteboard); helps to prioritize tasks; ensures that no systems are forgotten; monitors the functioning of the fictional production application(s) and otherwise maintains the “big picture” and a calm head while others are absorbed in the details and chaos of gameplay.
- Exactly which port numbers must be available on which systems for the scorebot? Try DoS attacks on these.
- How will the scorebot confirm that your other target application(s) are still running? Don’t block the scorebot.
- Which target systems are running the most vulnerable operating systems and/or services (such as IIS, RPC, SMB, and/or older unpatched software versions with known exploits)? Important to prioritize.
- What special tools will be available? Nmap, Nessus, Metasploit? Best to ask.
- Does everyone on the team know how to view live ports and established sessions? Does everyone know how to reset a password from the command line? Does everyone know how to escalate privileges on different architectures?
- Compile a list of default passwords (eg. the ones on your system, the opposing team may forget to change these)
- Who are you permitted to ask for help if necessary? What can or can’t they do for you?
When Play Begin
- Full TCP & UDP Portscans
- Perform Service Enumeration and Software Version Enumeration on open ports.
- Interrogate each open port manually with netcat.
- Don't add new accounts, stay stealthy and use compromised accounts.
- Don't upload common files that trip Anti-Virus alerts (e.g cain and able).
- Dump local hashes
- Dump domain hashes
- Dump LSA secrets (windows)
- Dump cached passwords (windows)
- Snarf session tokens (windows)
- Finally, focus on your plan and don’t panic!
Blue Team
Before Start of Play- Who will be the team organizer? The team organizer documents the networks, system names, OS versions, IP addresses, open ports, passwords, and updates configuration changes for everyone to see (such as on a whiteboard); helps to prioritize tasks; ensures that no systems are forgotten; reminds players to periodically check for compromise; monitors the functioning of the fictional production application(s) and otherwise maintains the “big picture” and a calm head while others are absorbed in the details and chaos of gameplay.
- Exactly which port numbers must be available on which systems for the scorebot? Can’t block these.
- How will the scorebot confirm that your other target applications are still running? Don’t block the scorebot.
- Which target systems are running the most vulnerable operating systems and/or services (such as IIS, RPC, SMB, and/or older unpatched software versions with known exploits)? Important to prioritize.
- What special tools will be available? Process Explorer? WireShark? Tripwire? PowerShell? Best to ask.
- Does everyone on the team know how to view listening ports and established sessions? Does everyone know how to reset a password from the command line? Does everyone know how to kill a process? Does everyone know how to configure IPSec, the Windows Firewall and/or iptables for packet filtering?
- Who are you permitted to ask for help if necessary? What can or can’t they do for you?
When Play Begin
- Block all non-scorebot-required ports on all systems using IPSec/Windows Firewall/iptables.
- Assign a different 15+ character long passphrase to every administrative account on every system.
- Change all default application and service passwords to a different 15+ character passphrase.
- Remove all accounts from all administrative groups on each system except for one.
- Delete or disable all user accounts, including Guest, except for the one administrative account on each system.
- Establish a baseline by saving lists of your current processes, listening ports, services, device drivers, user accounts, and all files (“dir /s /b” or “ls –lARt”) to text files on each machine. If possible, generate a checksum database using a tool like Tripwire (or just md5sum). Use this information to detect compromise.
- Enable useful audit policies, clear all logs, and keep Event Viewer open (Windows) or “tail –f” critical log files (Linux). When you look at a log, if you notice that the only new events are of no security consequence, clear that log to reduce clutter during the games (it’s not real life).
- Continuously watch your list of established sessions, running processes, target applications and logs to try to detect malicious changes. Write scripts or use command history (up-arrow or F7) to help automate this work. Detect changes and respond: kill offensive processes, delete new user accounts, delete new binaries, etc.
- Finally, focus on your plan and don’t panic!
Thanks man Great info.
-
Me and some fellow clasmates are going to enter a red vs blue competition. Can any one suggest and good simulations that we can practice with to help us out.
I am looking for some help as i have never entered a contest like this and am new to security. I know alot of the basics. But any help from anyone that has done this befor would be greatly appreciated.
Thanks
#4
-
Awesome! I will be sure to let you know when it is ready. It is pretty close though. It should only take another day or two I hope!
It doesn't require root :)And you dont work for the NSA lol.
-
I am first on the list! I would love to try this out when you get it ready!
Me too hopefully this will not require root
-
I've heard that the anonymous are going to attack **REMOVED** (don't check it out is like a top 100 of porn sites)
Is that true?
I’m sure this site as well as many others do not condone illegal activity and that is what anonymous does. There ideology may seem right but their methods are in fact illegal.
-
I believe it is the original based on the Fon
-
I posted mine here a whil ago if anyone wants to check it out
https://forums.hak5.org/index.php?/topic/30063-css-30-display/
-
My CSS not the best but it works
.statusBar {
text-align: center;
margin: 0 auto;
padding: 2px;
width: 95%;
border: 3px solid red;
}
.tiles {
text-align: center;
width: 100%;
margin-top: 2%;
height: 90%;
}
.tiles_wrapper {
margin: 0 auto;
overflow-y: auto;
height: 100%;
text-align: center;
}
.tile {
text-align: left;
margin: 1%;
vertical-align: top;
display: inline-block;
width: 22%;
min-width: 250px;
height: 250px;
height: 30%;
overflow: hidden;
border: 3px solid blue;
}
.tile_title {
text-align: center;
text-decoration: underline;
padding-bottom: 5px;
cursor: pointer;
background: green; /*#FC0101*/
}
.tile_expanded {
margin: auto;
text-align: left;
color: white;
background: green;
position: absolute;
right: -50%;
left: -50%;
border: 3px solid green;
width: 93.25%;
height: 85%;
/*padding: 10px;*/
overflow-y: auto;
overflow-x: hidden;
visibility: hidden;
}
.tile_content {
padding: 10px;
}
.tile_content a{
color: yellow;
}
.tile_stretch {
width: 100%;
display: inline-block;
font-size: 0;
line-height: 0;
}
#close {
position: absolute;
top: 0.5em;
right: 0.5em;
text-decoration: none;
color: white;
}
.popup {
visibility: hidden;
position: absolute;
top: 7%;
left: 50%;
min-height: 15em;
width: 50em;
;
border: solid 2px green;
background-color: black;
padding: 1em;
z-index: 99;
}
.entropy {
color: gray;
}
input[type=text], textarea, input[type=password] {
border: 1px;
background-color:black;
color:white;
border-style:dotted;
resize: none;
}
a {
color: yellow;
}
body {
background: black;
color: white;
font-family: monospace;
overflow-x: hidden;
}
::-webkit-scrollbar {
width: 8px;
padding-right: 10px;
visibility: visible;
}
::-webkit-scrollbar-track {
border-radius: 10px;
padding-right: 10px;
visibility: visible;
}
::-webkit-scrollbar-thumb {
border-radius: 10px;
background: green;
padding-right: 10px;
visibility: visible;
} -
If i am understanding you correctly??? You have a 4g swap partition? on a 4g drive ? If so you did it wrong you need a 1 gig swap and 3 gig file partition. That might be your problem.
New Wifi Pineapple (Mark V)?
in WiFi Pineapple Mark IV
Posted · Edited by mreidiv
mac came up as Orient Power Home Network Ltd cant find anything on them
Cant search FCC because of government shutdown