Jump to content


Active Members
  • Content Count

  • Joined

  • Last visited

  • Days Won


About Isc

  • Rank
    Hak5 Fan

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Thanks for the info Seb & quick reply. I thought that may have been the case that it was using the hardware identifier as it does in a similar way to make the unique SSIDs.
  2. Seb, great work. Regarding the pine number though not everyone likes having a unique ID stamped internally in their firmware that calls home even for anonymous stats. Can you please also provide details on how to strip out the pine number and (When it is implemented) the call home script / cron job. Will save me time trawling through the system anyhow to find it.
  3. I plan to make this into a pineapple module within the next few days, maybe over the weekend.
  4. Yep, it'll work with WEP and unsecured connections. To connect to a WEP network you have to use iwconfig and enter the password using that command. In the script you'd replace the line wpa_supplicant -B -Dnl80211 -iwlan1 -c/etc/wpa_supplicant.conf[/CODE] [color=#000000]with whatever method you use to connect to your wireless lan.[/color] [color=#000000][b]For WEP[/b], r[/color][color=#000000]eplace the wpa_supplicant line with ... and change the '[/color]your_key_here' to your wep key [CODE] iwconfig wlan1 mode managed key your_key_here iwconfig wlan1 essid "your access point name here" [/
  5. The latest firmware the Pineapple now has a fantastic amazing new feature - built in the drivers for various USB wifi chipsets. Primarily the Ath9k driver from what I can tell so far. In order to use this guide you'll need a supported USB wifi dongle and a MKIV Pineapple. I used a TP-Link WN722N (Also works well with reaver). Before you buy a wifi adaptor please google the model number to determine its chipset. Supported USB Wifi Devices: A small list of devices running Ath9K - http://linuxwireless...oducts/external TP-Link WN722N - $22 - http://www.tp-link.c...model=TL-WN722N ALFA AWUS0
  6. No need to insteall dhclient or other packages. The pineapple has udhcpc installed which you can use to get a dhcp ip address on any interface adaptor. udhcpc -i <interface> This will work fine for accessing the internet once you've got an ip on the pineapple itself, but wont be any good for having clients connected to the pineapple's wifi accesspoint until you setup ipv4 packet forwarding. I'm going to post info on doing that tonight.
  7. Unixmito, I just got working a few nights back via iptables IPv4 packet forwarding from a second USB wireless adaptor. This allows me to associate the second USB wifi with an existing internet enabled access point and then have clients on the pineapple access the internet via this connection. Think of the 3G internet sharing, except with wireless instead. I'm sure you could tweek the pineapple's configuration to instead of running Hostapd having it be an accesspoint you could have the internal wlan0 associate with your own access point then it would essentially be a wifi range extending bridg
  8. I can confirm the TP-Link TL-WN722N works very well. It uses the Atheros AR9271 driver and appears as Wlan1 on the latest firmware. This adaptor also works well with reaver so it's win/win.
  9. If you're running version 1.0.2, in the advanced tab of the pineapple you'll find a button that says "Reset to factory defaults". Clicking that button in this instance will unset any strange changes you've made so you can start again. If not you can reflash the pineapple (And upgrade it to 1.0.2 at the same time) and it will reset it to factory defaults. To flash it simply follow one of the guides on this forum for the MKIV hardware. Best of luck.
  10. I'm actually working on this at the moment. When using dnspoof I've been able to inject code into pages live but dnspoof messes up image loading. Hoping to have that sorted out tonight and I'll post it up when it's ready.
  11. http://www.securitytube.net/video/962 this will give you a quick example. In the example the packets were captured using airodump and then decrypted with airdecap. This is assuming that to use airdecap you know the WEP password or the WPA password of the target network.
  12. Ask Seb to be added into the repo as a contributor or fork off a branch and commit some changes :) Though this can be daunting if you haven't used Git before (Git, also know as GODDAMN-IT when it refuses to merge :P )
  • Create New...