Jump to content

Mr.miYagi

Active Members
  • Posts

    94
  • Joined

  • Last visited

Everything posted by Mr.miYagi

  1. It could theoretically be, that i dont own this device . But surely i have a permission to the test this on these. No idea on what for a OS it runs. But must be a Asus (MAC AC:22:0B AsustekC) But somethimes my HTC and Sony Phones are going crazy like this one. One has a modded ROM and the sony is on stock.
  2. HI all I have here a extreme example. Normally the client can reconnect. But this time the mkv kicks him off again: Oct 20 09:59:35 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: disassociated Oct 20 09:59:35 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: associated (aid 5) Oct 20 09:59:35 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: authenticated Oct 20 09:59:34 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Oct 20 09:59:32 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: disassociated Oct 20 09:59:32 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: associated (aid 5) Oct 20 09:59:32 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: authenticated Oct 20 09:59:28 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: authenticated Oct 20 09:59:23 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Oct 20 09:59:22 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: disassociated Oct 20 09:59:22 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: associated (aid 5) Oct 20 09:59:22 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: authenticated Oct 20 09:59:20 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: associated (aid 5) Oct 20 09:59:20 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: associated (aid 5) Oct 20 09:59:20 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: authenticated Oct 20 09:59:20 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: authenticated Oct 20 09:59:20 Pineapple daemon.notice hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: did not acknowledge authentication response Oct 20 09:59:19 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Oct 20 09:59:18 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: disassociated Oct 20 09:59:18 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: associated (aid 5) Oct 20 09:59:17 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: authenticated Oct 20 09:59:15 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: authenticated Oct 20 09:59:14 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Oct 20 09:59:13 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: disassociated Oct 20 09:59:13 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: associated (aid 5) Oct 20 09:59:13 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: authenticated Oct 20 09:59:12 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Oct 20 09:59:11 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: disassociated Oct 20 09:59:11 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: associated (aid 5) Oct 20 09:59:11 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: authenticated Oct 20 09:59:09 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Oct 20 09:59:08 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: disassociated Oct 20 09:59:08 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: associated (aid 5) Oct 20 09:59:08 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: authenticated Oct 20 09:59:06 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Oct 20 09:59:05 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: disassociated Oct 20 09:59:05 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: associated (aid 5) Oct 20 09:59:05 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: authenticated Oct 20 09:59:04 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Oct 20 09:59:03 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: disassociated Oct 20 09:59:03 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: associated (aid 5) Oct 20 09:59:02 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: authenticated Oct 20 09:59:00 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: associated (aid 5) Oct 20 09:59:00 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: authenticated Oct 20 09:58:59 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Oct 20 09:58:58 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: disassociated Oct 20 09:58:58 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: associated (aid 5) Oct 20 09:58:58 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: authenticated Oct 20 09:58:57 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Oct 20 09:58:56 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: disassociated Oct 20 09:58:55 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: associated (aid 5) Oct 20 09:58:55 Pineapple daemon.info hostapd: wlan0: STA 08:fd:0e:42:56:0e IEEE 802.11: authenticated Other clints get randomly kicked, and reconnects.
  3. Thanks Seb We had a thread about that. Where Darren statet the same problem on his device: https://forums.hak5.org/index.php?/topic/31047-hostapd-deauthenticated-due-to-inactivity-timer-deauthremove/#entry251626 Now we have a new one: https://forums.hak5.org/index.php?/topic/33901-the-disassociation-problem/#entry252423 I have 3 Mkv5 here. You want some special tests? I let run them over night, and post the logs. I can give you also ssh access.
  4. Hey Seb Where can i ask about the disassociation problem. Tried with a brandnew mk5 and suffers still the same problems...
  5. As far as i know, you need at least 1A output. So maybe you suffer of malfunction because of low power. The shipped power supply is known for getting defective.
  6. I havent reboots, but the mkv are kicking constantly the clients. But it seems to happen, as soon PineAp is activatded. Tested on 3 different mkv's, reflashed without infusions connected to 3g. Since i removed ALL infusions from the the sd. Try to install sslstrip and co. on internal an you will suffer less reboots.
  7. Hi Seb Maybe i never looked at this, but i noticed that when i start dogma and beacon response, the pineapple start to deauthenticate clients. Even the device that are using the web interface, so its not really a timeout. Saw others have this problem. And as far asi tested, it happens only with dogma/beaconer. Karma alone works. https://forums.hak5.org/index.php?/topic/31047-hostapd-deauthenticated-due-to-inactivity-timer-deauthremove/ Oct 13 13:19:24 Pineapple daemon.info hostapd: wlan0: STA 00:ee:bd:9f:cb:ec IEEE 802.11: authenticatedOct 13 13:19:20 Pineapple daemon.notice hostapd: wlan0: STA 00:ee:bd:9f:cb:ec IEEE 802.11: did not acknowledge authentication responseOct 13 13:19:15 Pineapple daemon.notice hostapd: wlan0: STA 00:ee:bd:9f:cb:ec IEEE 802.11: did not acknowledge authentication responseOct 13 13:19:14 Pineapple daemon.info hostapd: wlan0: STA 00:ee:bd:9f:cb:ec IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)Oct 13 13:19:13 Pineapple daemon.info hostapd: wlan0: STA 00:ee:bd:9f:cb:ec IEEE 802.11: disassociatedOct 13 13:19:13 Pineapple daemon.info hostapd: wlan0: STA 00:ee:bd:9f:cb:ec IEEE 802.11: associated (aid 5)Oct 13 13:19:13 Pineapple daemon.info hostapd: wlan0: STA 00:ee:bd:9f:cb:ec IEEE 802.11: authenticatedOct 13 13:19:11 Pineapple daemon.info hostapd: wlan0: STA 00:ee:bd:9f:cb:ec IEEE 802.11: associated (aid 5)Oct 13 13:19:11 Pineapple daemon.info hostapd: wlan0: STA 00:ee:bd:9f:cb:ec IEEE 802.11: authenticatedOct 13 13:19:09 Pineapple daemon.info hostapd: wlan0: STA 00:ee:bd:9f:cb:ec IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)Oct 13 13:19:08 Pineapple daemon.info hostapd: wlan0: STA 00:ee:bd:9f:cb:ec IEEE 802.11: disassociatedOct 13 13:19:08 Pineapple daemon.info hostapd: wlan0: STA 00:ee:bd:9f:cb:ec IEEE 802.11: authenticatedOct 13 13:19:07 Pineapple daemon.info hostapd: wlan0: STA 00:ee:bd:9f:cb:ec IEEE 802.11: authenticated
  8. I added the lines: killall hostapd echo "ap_max_inactivity=99999" >> /var/run/hostapd-phy0.conf /usr/sbin/hostapd -P /var/run/wifi-phy0.pid -B /var/run/hostapd-phy0.conf With no success. The AP is still kicking and reassoc. the clients. Some ideas? Sep 29 15:28:52 Pineapple daemon.info hostapd: wlan0: STA 44:74:6c:3f:xx:xx IEEE 802.11: associated (aid 1) Sep 29 15:28:52 Pineapple daemon.info hostapd: wlan0: STA 44:74:6c:3f:xx:xx IEEE 802.11: authenticated Sep 29 15:28:05 Pineapple daemon.info hostapd: wlan0: STA 44:74:6c:3f:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Sep 29 15:28:04 Pineapple daemon.info hostapd: wlan0: STA 44:74:6c:3f:xx:xx IEEE 802.11: disassociated Sep 29 15:28:04 Pineapple daemon.info hostapd: wlan0: STA 44:74:6c:3f:xx:xx IEEE 802.11: associated (aid 1) Sep 29 15:28:04 Pineapple daemon.info hostapd: wlan0: STA 44:74:6c:3f:xx:xx IEEE 802.11: authenticated Sep 29 15:28:01 Pineapple daemon.info hostapd: wlan0: STA 44:74:6c:3f:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Sep 29 15:28:00 Pineapple daemon.info hostapd: wlan0: STA 44:74:6c:3f:xx:xx IEEE 802.11: disassociated
  9. I have the same Problem here. Didn't try one of the hacks posted here. Someone can confirm that it works?
  10. Same here: hostapd: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Pineapple was running fine since weeks dayly. After a 24h run, it keeps deauth clients after a short period.
  11. Thanks a lot! ssh -i /root/.ssh/id_rsa -N -T -R 1471:localhost:1471 -R 3322:localhost:22 tunneluser@miyagipi.org -p 3333 This command worked well for ssh and http. And im not sure, but i think not using the "standard" ports, sometime is more secure...
  12. On the most examples here, on the wiki etc. its explained with this method, so i dont want to reinvent the wheel and i keep trying that way. Also it exits a infusion with support, and it seems to work. On my local network i can acces my Pineapple on port 22 and my Raspberry on 3333 with ssh., So it seems to work. With my PIneapple attached on 3g i can reach my Router/Raspberry too. Pineapple 3g Router RaspberryPi ssh port 3333 ---------------->port forward 3333,1471 to 192.168.0.16 ----------------->192.168.0.16 ssh -p 3333 root@80.218.xx.xx This works. Now i want to login to the RaspberryPi and connect back to the Pineapple and forward the web UI, like described in many threads and wikis: https://forums.hak5.org/index.php?/topic/31135-tutorial-relay-server-setup-remote-management/ https://forums.hak5.org/index.php?/topic/27305-reverse-ssh-tunnel-pineapple-webinterface-forwarding/ https://help.ubuntu.com/community/SSH/OpenSSH/PortForwarding etc. I would love to use the Infusion but would be also happy with a command... Settings used in the Infusion: Host: root@80.218.xx.xx Port:1471 Listen Port:1471 It shows connected. Then i can ssh in the raspberry and again ssh to localhost:1471 with no luck.... command used: ssh root@host -L 1471:localhost:1471
  13. Hi all After watching the episodes from Hak5 and chriswhat i still dont get my reverse ssl shell working... Can somebody help out? On my PIneapple (3g connection) i use: ssh -p 3333 root@80.218.xx.xx 1471:localhost:1471 On my home router 80.218.xx.xx i opended the ports 3333 and 1471 to a raspberryPi with raspian loaded. On my Raspian i added the Pinapple as trusted device, so it connects without password promt. I changed the standart ssh port to 3333. After the pineapple connects i use this on my Pi: ssh -p 1471 root@localhost and gets: socket: Address family not supported by protocol ssh: connect to host localhost port 1471: Address family not supported by protocol I have some mixup i think....
  14. Its not a infusion, but i reflashed the pineapple with the same results. No way to get out of the pineapple after setting iptable rules.
  15. Hi all Before the upgrade on 2.xx i was intercepting imaps connections with following lines: echo 1 > /proc/sys/net/ipv4/ip_forward iptables -t nat -A PREROUTING -p tcp --destination-port 993 -j REDIRECT --to-ports 666 iptables -t nat -A PREROUTING -p tcp --destination-port 995 -j REDIRECT --to-ports 666 Sslsniff -c /sd/certs/wildcard -p 666 Now after the upgrade sslsniff starts and seems to get the connection, but spits put this error: root@Pineapple:~# sslsniff -c /sd/sslsniff-master/leafcert.pem -p 666 sslsniff 0.5 [sHA1 Mode] initialized and listening on 666... ASSERT - c getpeername failed.: Transport endpoint is not connected I don't remember that i used other settings to get it running. All other services are running fine. Some idea?
  16. Thx Darren. At least a explanation. So i hope the Mark VI will have some other chipset, with more power... I love the pineapple because of the size. Messing with bigger/directional antennas is a no go for me. Thank you and Seb for all your work. The Mark V is a great piece of hardware and software exept this 18dBm limit. But let see what the new firmware brings to us.
  17. Hey Seb Sorry i dont wanna stress you... But its the 3. day. Did i missed the answer?
  18. Hey i had this Idea long time ago ;) Airbase seems to work better with android and Iphone Devices. But nobody could help.... https://forums.hak5.org/index.php?/topic/33031-airbase-ng-works-an-newer-devices/ https://forums.hak5.org/index.php?/topic/32942-karma-alternative-more-clients/#entry246141 https://forums.hak5.org/index.php?/topic/32349-set-the-correct-routes-for-at0-bounty-for-solution/#entry241646 I use airbase-ng -E /root/essids -P -C 30 -c 11 wlan1 ifconfig at0 up brctl addif at0 AP is showing. But Clients dont connect/get a IP. I think is something whit ip forwarding..
  19. Yes im asking why wlan0 cant go up to 24dBm as advertised and as many from us reached out of the box. Sebkinne statet that "it can be" a false readout from SW. But the last answer from Darren was: Just noticed this. Will get confirmation from hardware and get back here ASAP. Sorry for the delay. So for me isnt official till now that we cant. Would be nice to hear if there is a workaround, or we have some very poor powered radios in our pineapples...
  20. @m40295 Of you follow the link you will see they are talkin about radio1/wlan1 and high throughput/ connection speed. Here we are asking why WLAN0 reach only 18dBm, after initially 24dBm. And its also advertised on the website and from Darren. And in the episode metioned before, Darren approve the 24dBi and its written black on white that the adapter can reach that. So im reading something wrong, or your link has nothing to do with that.
  21. Hi Darren and co. It would be nice to hear something official about that. In the Episode "how-to-build-a-wifi-link" you describe that the wlan0 can go up to 24dbm. And this is in the description: What's really nice with the WiFi Pineapple Mark V is that these commands can be put together as a boot mode using the DIP switches. What's more since the Mark V has two radios on one board we're able to have the best of both worlds. Our Radio0 can be set to 24 dBm and attached to a 24 dBi gain antenna for the point-to-point link, while our Radio1 interface can be set to 30 dBm with a 6 dBi gain antenna for point-to-multipoint. So it would be nice to hear why so many peoples are not able to reach this. Thanks
  22. Hi As far as i know, the pineapple wil see also probes for WPA/WPA2 requests. But KARMA and co. cant emulate the AP since it haven't the key. So i assume and hope your home AP is WPA2 protected. No chance for the pinapple to emulate them. Try this: Connect your laptop to a open AP (you can create one on your Phone or Pineapple for example) Turn the AP off and turn KARMA on. Now KARMA should make the magic.
  23. Hi guys Tried to find the answer here many times but without luck. This ist my last shot. I know that the wlan1 is not intended for that, but PRO's: Wlan1 can go up to 30dBm while wlan0 is locked on 18dbm Airbase-ng gets more clients as Karma (iphones, androids) procedure: i edited wlan1 from "manaed" to "monitor" /etc/configuration/wireless i start airbase-ng: airbase-ng -E /listofessids -P -C 30 -c 11 wlan1 (creates the interface at0) And till here all works. Phones are seeing the AP, Airbase assiociate the phone with the AP. But dnsmask arent seeing the phone. As i understand with the pineapple configuration, dnsmasq are serving dhcp to all interfaces in the "lan" domain. logs: phone -> wlan0: hostapd shows association, dnsmasq gives ip to br-lan phone -> at0: airbase shows association. dnsmask is doing nothing In /etc/configuration/wireless i can only define on which domain phy1/wlan1 is ->lan But since at0 is "emulated" by airmon-ng i cant set the domain in /etc/configuration/wireless. Also by adding at0 to the br-lan bridge it doesent help. dnsmasq are not "seeing" the devices on at0 Maybe thats not the error, if someone has an idea, plz share it. the script looks like this. You can try it and see the difference :) pineapplekarma start airbase-ng -E /root/essids -P -C 30 -c 11 wlan1 ifconfig at0 up brctl addif at0 PS: A workaround is to start airbase-ng with the mac from the wla0. So the phone can see the AP of at0, but connects to wla0 where dhcp works What i else tried: add at0 to a new interface in /e/c/network edited in /e/c/dhcp that the new interface get dhcp maybe i messed up, but it didnt work Ifconfig at0 xxx.xxx.xxx.xxx netmask 255.255.255.0 (i entered different IP's 172.16.42.1/2/100) And hell yea, im desperate :)
  24. Hi all Since the ar9331 chipset seems locked @18dBm, and newer devices doesent are affected from pineapple KARMA im trying to get em with another tool. I aready had a setup an my laptop, but i messed it up and i dont get it running again... My idea on the Pineapple is quite simple: - With airbase-ng i get more client than over KARMA (also Iphonies, and androids) - The wlan1 chipset can go up to 30dBm - We can jam with the wlan0 I already tried to get it working on the pineapple. But i dont get a IP for my clients, or no internet. Someone has a idea? Here my old post: https://forums.hak5.org/index.php?/topic/32341-ics-to-at0/ Here my steps: airmon-ng start wlan1 airbase-ng -E /root/essids -P -C 30 -c 9 mon0 iptables -t nat -a POSTROUTING -o 3g-wan2 -j MASQUERADE ifconfig at0 up 172.16.42.2 netmask 255.255.255.0 ifconfig at0 mtu 1400 But dnsmasq dont assign a IP to the clients. It would be a good workaround for the por txrate from wlan0 and to get the anti-KARMA devices. (PS if you have a solution, you still can claim the bounty ;)
×
×
  • Create New...