Jump to content

WakeUpWolfgang

Active Members
  • Posts

    12
  • Joined

  • Last visited

Everything posted by WakeUpWolfgang

  1. Yes I did have a spelling mistake. If we do use the pineapple I wont be the coder for it. I was just looking for some documentation so I could read up on it before I started to play with it. And that is a simplified list of things we want it to do to give as an example. There is more that I am not aloud to say so there for I am done posting on this thread before I say something that I will regret.
  2. yes that is how it is. Mabe I have not use that cable much and the tab is still rather fresh and will not bend as easy. The plugs did bend when I tried the cat6 so I completely agree with you.
  3. I use the term hack very loosely. We might do something like a rickroll and edit the dns entries and stuff like that. But once the hacker gets off of our network it will undo everything on their computer. And we will block the mac of that computer(I know it is easily spoofed). the list of what it will do 1. mounter the use of all of the users that are using our wifi. 2. if it thinks some one is trying to hack us it will notify the IT department. 3. the IT department will look at the use of the person in question and decides if they are trying to hack us. 4. if the IT department decides that the person in question is trying to hack us implement the script 5. once the hacker gets off our network the hack stops and removes its self That is a very simple overview of what it will do but as you see it will not edit any files or view any files or gather any information. Once they get off of the network the script will stop working and it will remove its self from the computer
  4. I know that is why I am not going to post the script. But I was just giving him an idea of one way how he can do it with SNORT. That is all of the details I am willing to give out about this. That "IF" is saying we might or might not use it and if we don't use it I still wont be able to post it. If we dont use it and I get to keep the pineapple I can make my own scripts and they are my scripts I can post my own if I choose. There is alot of rules about me making my own like it cant contain any code from their scripts etc.
  5. I tried it again and my cat6 works now. BUT cat6 and cat5 ends are not the same. Yes they are both rj45 but the cat6 end has to be modified slightly the inside of a cat6 is a bit bigger for the extra shielding in it. The same goes with CAT7 ends but they are all rj45 ends.
  6. I would bet a lot of people would but I am not going to be making this for myself but my company that I work for. IF we do deiced to use the script it will become property of the company and I would not be able to post it online for security/legal reasons. If you do want to do something like that there is other methods of going this. You could use an Intrusion Detection Systems(IDS) such as SNORT and have it tell you what IP it is. There is many ways at doing this but I am going some research to find out the best way for my company. If we dont go with the pineapple I get to have it since I paid for it and they will reimburse me if we do use it.
  7. In my network bag I always carry a 8 foot CAT6 cable. I grabbed that first since I had it on me and I was going to use it on my pineapple MK4. I found out that the CAT6 cable would not fit in the pineapple. I am wondering if it is just mine or if all are like this.
  8. #1 You could brick your phone and some phones cannot be unbricked. If your phone brakes and you want to send it to to get fixed you will have to unroot it before sending it in or you might get hit with a fine or theiy will not not it. #2 I use http://forum.xda-developers.com/ whenever I am rooting a device. browse their forum if anywhere has instructions on how to root your phone it will be them #3 Most malware/virus for the android I have seen came from the "sexy girls" apps and apps that you download from the internet and not the market. Hope this helps
  9. I know about 99.9% of the users will be everyday users I will write a script that will only target users who fit a profile that I make. Once the user fits the profile I will be contacted to look at their activty and if we deem them as a blackhat I will have the pineapple start messing with that user. But right now it is only an idea so before we implement it I am testing your product to see if it can do what we are looking for.
  10. When I say "hacking them back" I mean something like rerouting the DNS to the loopback or to a rickroll. Just something that will get them frustrated I am not going to be stealing information just going to make the blackhat hackers frustrated with hacking the network and get some good laughs at the blackhats.
  11. I am in IT (network administrator) and I am planing on using this to find hackers on my network and then hack them back. :D but I did not know how easy it is to use the pineapple.
  12. I ordered mt first pineapple it is going to get here in about 3 hours. I am ok with linux I can do most things on linux but I would like to know. What should I do first with the Pineapple IV, and what documents should I read I have been browsing the forums but I dont know what information I should look at.
×
×
  • Create New...