Jump to content

NotTheFed

Active Members
  • Posts

    32
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

NotTheFed's Achievements

Newbie

Newbie (1/14)

  1. it is hardcoded in the module .js file: $scope.refreshLivePreview = function () { window.frames['livePreviewIframe'].src = "http://172.16.42.1"; At least the preview is. NTF
  2. There was a mention in some post that the Tetra in client mode has some features that do not work correctly. Not sure where I saw that. NTF
  3. so.. I was thinking that if a db was installed to the usb, then you could customize the various scripts. examples: *every new association is logged, and MAC\IP device name\type added to a row in the db. *DNS spoof gets modified to check the data in the db FIRST. IF set to 'one time' then only redirect if it is the first time. IF device type (bb, iphone, android, ect) redirect one time to a malicious page (iphone.php, ect..) with specific exploits. (copy contacts, sms,photos, ect to USB) IF browser type (info from dnsfpoof or urlsnarf?) IE, Safari, ect.. then different phish pages are shown..ect *nmap.php script to use the DB to determine OS, and open ports. That would feed an autopwn script. With a DB.. you could autopwn devices (once or periodically based on last pwnage) OR do nothing since you have them already. You could have a table in the DB that has updated exploit information per target version. granted.. this would require multiple mods to various tools.. but could really take the mark4 to a new level of offensive auto attack. just dreaming.. NTF
  4. 10.8.0 Darwin Kernel Version 10.8.0 using built in wireless. NTF
  5. I have a similar setup. internet via en1 (wireless - with dhcp from wap\router) connected the mark4 to the ethernet (not macair, just macbook pro) via the POE on the mark4 and en0 I MANUALLY set the ip for the en0 interface to be 172.16.42.42. I then setup sharing (via network settings) to bridge the two. works great. en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 ether 00:16:cb:8b:95:52 inet 192.168.2.1 netmask 0xffffff00 broadcast 192.168.2.255 inet6 fe80::216:cbff:fe8b:9552%en0 prefixlen 64 scopeid 0x4 inet 172.16.42.42 netmask 0xffffff00 broadcast 172.16.42.255 media: autoselect (100baseTX <full-duplex,flow-control>) status: active en1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 ether 00:14:51:ed:cf:38 inet6 fe80::214:51ff:feed:cf38%en1 prefixlen 64 scopeid 0x5 inet 192.168.1.104 netmask 0xffffff00 broadcast 192.168.1.255 media: autoselect status: active
  6. what would be really cool.. is a menu add to start\stop sslstrip like the other key services of the mark 4. One that would set all the IPtable settings needed, ect. NTF
  7. yes.. I see that as well.. sometimes it effects the code, often it does not. the editor is leave a hard return from the best I can see. I routinely remove them. I get these when editing on the MAC and moving the files over to the M1V NTF
  8. installed works ... awesome. thanks. NTF
  9. very nice pics... what battery and cable are you using? NTF
  10. by default if you have not moved them.. /www/pineapple/logs/urlsnarf.log NTF
  11. You can download it from here: https://github.com/sebkinne/wifipineapple then jus scp it over to the device. NTF
  12. Ok.. right out of the box looks great. Comes with a TON of adapters. Plus it has the correct barrel cable needed. http://www.doevil.com/pinebat2.jpg very thin compared to the incredicharge, but a bit bigger foot print. Hard to tell in the pic, but is about half the height of the pineapple. (very flat) bottom line, works. 12v 4a direct, PLUS the additional USB if needed for another device.16000mAh capacity. this one will surely run the pineapple with any modem. **update** so a test run with this.. without a modem (just the usb drive)....and it looks like the battery pack stopped after 2 hours. I wonder if it thought the device was full charged? unplug, plugged back in... pineapple started up. Might not be enough draw from just the pineapple\usb to keep it running. NTF
  13. it is possible if the realsite you wish has child domains.. http://forums.hak5.org/index.php?showtopic=25892&st=0 look into that... I have many pages that work. SOME times the DNS spoof loops if the target refers back to the parent domain for content..ect NTF
  14. google (video) for wifi pineapple phish you will find a few tutuorial types of videos. NTF
  15. what client are you using? if windows...find an dl winscp that should work for you. if Mac.. I like FUGU. NTF
×
×
  • Create New...