Jump to content


Active Members
  • Posts

  • Joined

  • Last visited

  • Days Won


Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

Isc's Achievements


Newbie (1/14)

  1. Thanks for the info Seb & quick reply. I thought that may have been the case that it was using the hardware identifier as it does in a similar way to make the unique SSIDs.
  2. Seb, great work. Regarding the pine number though not everyone likes having a unique ID stamped internally in their firmware that calls home even for anonymous stats. Can you please also provide details on how to strip out the pine number and (When it is implemented) the call home script / cron job. Will save me time trawling through the system anyhow to find it.
  3. I plan to make this into a pineapple module within the next few days, maybe over the weekend.
  4. Yep, it'll work with WEP and unsecured connections. To connect to a WEP network you have to use iwconfig and enter the password using that command. In the script you'd replace the line wpa_supplicant -B -Dnl80211 -iwlan1 -c/etc/wpa_supplicant.conf[/CODE] [color=#000000]with whatever method you use to connect to your wireless lan.[/color] [color=#000000][b]For WEP[/b], r[/color][color=#000000]eplace the wpa_supplicant line with ... and change the '[/color]your_key_here' to your wep key [CODE] iwconfig wlan1 mode managed key your_key_here iwconfig wlan1 essid "your access point name here" [/CODE] [b]For open networks[/b], replace the wep_supplicant line with [CODE]iwconfig wlan1 essid "your access point name here"[/CODE]
  5. The latest firmware the Pineapple now has a fantastic amazing new feature - built in the drivers for various USB wifi chipsets. Primarily the Ath9k driver from what I can tell so far. In order to use this guide you'll need a supported USB wifi dongle and a MKIV Pineapple. I used a TP-Link WN722N (Also works well with reaver). Before you buy a wifi adaptor please google the model number to determine its chipset. Supported USB Wifi Devices: A small list of devices running Ath9K - http://linuxwireless...oducts/external TP-Link WN722N - $22 - http://www.tp-link.c...model=TL-WN722N ALFA AWUS036NHA Assumptions: You'll be connecting to an existing access point that's running WPA2 encryption & you know the password for the network. Your pineapple is running v2.4 or greater. To begin, connect your wifi adaptor to the pineapple and issue the command iwconfig[/CODE] To confirm you adaptor is compatible there should be an entry for wlan1 in the list. wlan0 is the pineapple's internal wifi adaptor. Next you'll need to create your wpa supplicant configuration file. WPA supplicant is the program used to negotiate WPA2 encryption and the configuration file holds your network password. [CODE]vi /etc/wpa_supplicant.conf[/CODE] Press the i key then paste this text in the file, then save the file by typing these characters :wq [CODE]network={ ssid="Your network name here" psk="Your password here" }[/CODE] To save myself from entering the ip forwarding commands each time I put them in a shell script. Create the script file in your home directory and insert the following code. Follow the step above for inserting text into the vi editor. The script makes some assumptions, such as you haven't changed the ip range for the pineapple wireless lan and that the usb wifi adaptor you plugged in is wlan1. The script will also clear any existing iptables, if you have iptables entries you don't want lost remove the -F and -X lines. [CODE]vi ~/wireless_connect.sh[/CODE] [CODE]#!/bin/sh #Change the Mac address of the usb wifi to something random. ifconfig wlan1 down macchanger -A wlan1 ifconfig wlan1 up #WPA2 - Let's assume we're going to connect to a WPA2 network wpa_supplicant -B -D nl80211 -i wlan1 -c /etc/wpa_supplicant.conf #WEP - Uncomment if you want to conect to a WEP network #iwconfig wlan1 mode managed key your_key_here #iwconfig wlan1 essid "your access point name here" #OPEN - Uncomment if you want to conect to a WEP network #iwconfig wlan1 essid "your access point name here" #Setup ipforwarding via iptables. echo 1 > /proc/sys/net/ipv4/ip_forward #Reset iptables iptables -F iptables -X iptables -A FORWARD -o wlan1 -i br-lan -s -m conntrack --ctstate NEW -jACCEPT iptables -A FORWARD -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT iptables -A POSTROUTING -t nat -j MASQUERADE #Wait for 6 seconds to give enough time for association. sleep 6 #Grab an ip via DHCP udhcpc -i wlan1[/CODE] Change the permissions of your script so you can execute it. [CODE]chmod +x ~/wireless_connect.sh[/CODE] Execute the script and then if all goes well you'll have internet on the pineapple which can be shared out to clients that connect to the Karma/Pineapple SSID. No more needing a USB 3G dongle. [CODE]cd ~ ./wireless_connect.sh[/CODE] [u][b]Troubleshooting[/b][/u] [b]It does not associated with the access point [/b] [indent=1]Bummer. Try running the WPA supplicant connection without the -B flag. The -B mode makes it run as a daemon task in the background.[/indent] [indent=1]wpa_supplicant -Dnl80211 -iwlan1 -c/etc/wpa_supplicant.conf[/indent] [indent=1]Check the errors that are output for a hint as to what's going wrong. If it complains about the wireless driver change the text 'nl80211' (This is the driver that worked for my TP-Link USB stick) to wext.[/indent] [b]It does not get an ip via DHCP[/b] [indent=1]Did you check that wpa_supplicant could associate with the access point? If it does associate correctly then perhaps there is no DHCP server running on that network. Try setting an ip address manually for the wlan1 adaptor.[/indent] [indent=1]ifconfig wlan1[/indent] [b]Karma wont start after running the above steps[/b] [indent=1]I had this issue running version 2.4.1. Upgrading to 2.5.0 corrected this issue. Unsure what the cause was, perhaps it was some other development of my own interfering.[/indent] [b]How do I test to see if it's working?[/b] [indent=1]ping google.com Did it reply with a ping? It's working, if not damn something has gone wrong.[/indent]
  6. No need to insteall dhclient or other packages. The pineapple has udhcpc installed which you can use to get a dhcp ip address on any interface adaptor. udhcpc -i <interface> This will work fine for accessing the internet once you've got an ip on the pineapple itself, but wont be any good for having clients connected to the pineapple's wifi accesspoint until you setup ipv4 packet forwarding. I'm going to post info on doing that tonight.
  7. Unixmito, I just got working a few nights back via iptables IPv4 packet forwarding from a second USB wireless adaptor. This allows me to associate the second USB wifi with an existing internet enabled access point and then have clients on the pineapple access the internet via this connection. Think of the 3G internet sharing, except with wireless instead. I'm sure you could tweek the pineapple's configuration to instead of running Hostapd having it be an accesspoint you could have the internal wlan0 associate with your own access point then it would essentially be a wifi range extending bridge. I'll post up some directions a little later tonight (another 8 hours time) along with a quick shell script to get it going. Once thing I noticed though is after running my script I wasn't able to bring up Karma, though I'll see if I can get that going tonight. Maybe by starting Karma first. I hope to whip the script into a pineapple infusion once I've got some spare time. Internet on Wireless AP -> Pineapple USB wifi -> Pineapple -> Pineapple AP now has internet access.
  8. I can confirm the TP-Link TL-WN722N works very well. It uses the Atheros AR9271 driver and appears as Wlan1 on the latest firmware. This adaptor also works well with reaver so it's win/win.
  9. If you're running version 1.0.2, in the advanced tab of the pineapple you'll find a button that says "Reset to factory defaults". Clicking that button in this instance will unset any strange changes you've made so you can start again. If not you can reflash the pineapple (And upgrade it to 1.0.2 at the same time) and it will reset it to factory defaults. To flash it simply follow one of the guides on this forum for the MKIV hardware. Best of luck.
  10. I'm actually working on this at the moment. When using dnspoof I've been able to inject code into pages live but dnspoof messes up image loading. Hoping to have that sorted out tonight and I'll post it up when it's ready.
  11. http://www.securitytube.net/video/962 this will give you a quick example. In the example the packets were captured using airodump and then decrypted with airdecap. This is assuming that to use airdecap you know the WEP password or the WPA password of the target network.
  12. Ask Seb to be added into the repo as a contributor or fork off a branch and commit some changes :) Though this can be daunting if you haven't used Git before (Git, also know as GODDAMN-IT when it refuses to merge :P )
  • Create New...