Jump to content

legion

Active Members
  • Posts

    40
  • Joined

  • Last visited

Posts posted by legion

  1. Either it's down hard or they're doing routine maintenance as the page says. I'm glad I came here, I couldn't get my pineapple to go out and get infusions. I assumed it was a network error I created....

    I thought the same thing too! I was going to re-flash so I tried to get there to find the exact command to do it via ssh.

  2. Could we make a firmware thread and have it stickied at the top of the forum? That way it is the first thing you see on the page, instead of having to sift through several threads to find the latest one.

    As always, thank you all for your hard work. It is VERY much appreciated.

  3. I have a dilemma. I am playing around with arp poisoning with squid to flip images and other senseless stuff. The problem is it does not work on ssl sites.

    I want to run all the arp poisoned traffic though sslstrip first and then though squid before its returned to the victims browser. I currently have all port 80 traffic redirected to port 3128 for squid. However I can't seam to figure out how to send all traffic though sslstrip first. I was reading a little about chaining proxy’s but kind of got lost.

    Or maybe I am completely off base and this will not work.

    Any ideas?

    IMHO, drop the proxy and read up on ettercap.

  4. Hi Thanks for the response. I tried 3 different power supplies and same result.

    Before I start to pull the thing apart is there a guide to how to open the device, Can not see any screws and I can only manage to pop on corner open. Feel like I am going to snap the cover if I pull to hard.

    Pull the rubber "feet" off of the bottom. It should be the end with the WAN/LAN/USB lights. There will be just 2 screws that you will need to pull out to crack it open.

  5. This is a question that I have as well. For example I have a rooted Samgsung galaxy s2 and I can set it up to tether from a wireless network, or from 4G, thus removing the need to purchase a dongle.

    I just started messing with it today, but the only thing I feel confident in doing right now is a few of the non-persisting networking commands.

    Haven't got it working yet. It would be nice if I could use DHCP :/

    What about USB tethering?

    **EDIT**

    After some research you need to install the following package. The problem is you need to upgrade the kernel for it to work :-(

    kmod-usb-net-ipheth - 3.3.6-1 - Kernel support for Apple iPhone USB Ethernet driver

  6. What am I doing wrong?

    root@Pineapple:~# iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
    root@Pineapple:~# sslstrip -w sslstrip.log
    /usb/usr/lib/python2.6/site-packages/twisted/internet/_sslverify.py:4: DeprecationWarning: the md5 module is deprecated; use hashlib instead
    Traceback (most recent call last):
      File "/usb/usr/bin/sslstrip", line 30, in <module>
        from sslstrip.StrippingProxy import StrippingProxy
    ImportError: No module named sslstrip.StrippingProxy
    root@Pineapple:~# 
    
    

    **EDIT**

    Got it running by executing:

    
    python /usb/sslstrip/sslstrip.py -a -k -f
    
    

  7. From what I've read this is the command to use for redirecting traffic to sslstrip.

    iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
    

    But from what I've tried so far I cannot get this to work. It is not stripping SSL from the connections and just in general not working.

    That will only redirect HTTP traffic, not ssl traffic.

    Here's a piece of the script that I ran in BT for MITM wireless attacks:

    iptables --flush
    iptables --table nat --flush
    iptables --delete-chain
    iptables --table nat --delete-chain
    iptables -P FORWARD ACCEPT
    iptables -t nat -A POSTROUTING -o $IFACE -j MASQUERADE
    iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports 10000
    iptables -t nat -A PREROUTING -p tcp --destination-port 443 -j REDIRECT --to-ports 10000

    *EDIT*

    Here's the full script:

    http://pastebin.com/Dyh9C6EB

  8. ....

    This is just to get SSL strip to run, you still will need to execute the iptables command to redirect the traffic to sslstrip's port.

    Will this work?

    iptables -t nat -A PREROUTING -p tcp --dport 80 -j DNAT --to-destination 127.0.0.1:10000
    iptables -t nat -A PREROUTING -p tcp --dport 443 -j DNAT --to-destination 127.0.0.1:10000

  9. Nevermind, i figured it out.

    While the Mark IV firmware is based on OpenWRT, i gathered my guts and flashed my Mark IV hardware based device with the OpenWRT webinterface and SUCCESS! :D

    So wireme YES you can flash a OpenWRT device with the webinterface, but make sure you have Mark IV hardware as shown in the image from my previous post.

    I can confirm this works also!

×
×
  • Create New...