Jump to content

Vulture

Active Members
  • Posts

    83
  • Joined

  • Last visited

  • Days Won

    4

Posts posted by Vulture

  1. This has been an issue for awhile, however there are TTLs on the DNS cache so if you are spoofing long enough (usually 5min - 1hr) it will expire and do a new query which DNSpoof should intercept.

    Have you setup an environment and watched wireshark for the DNS responses? Now, there is further issues where some iOS/Android devices have internal datasets of blocks of IPs that a domain can be accepted from. So it is getting much more difficult to spoof the high profile domains like google/apple/facebook due to this collaboration.

    Though, as you said there are always ways around this, it just nothing is going to be automated.

  2. Just want to update this with my comments after receiving the Mark V

    - ZTE 915 is compatible via client wifi bridge or via USB tethering. Follow documentation for other t-mobile devices, no need for any addition WiFi controllers.

    - GPSd works just fine, have not attempted using this with Pineapple Stats infusion

    - Other than on my initial setup I really haven't run into similar issues that I had with the Mark IV where a ceiling would be hit on CPU load and the unit would restart. Wifite runs without issue. ADS-B infusion does consume a lot of CPU as predicted and I would not recommend running anything that also polls the CPU heavily such as SSL Strip or Airodump concurrently.

  3. Working on getting a new infusion online that brings back the Wifite + Site Survey features from the Mark IV I worked on a few years ago. If anyone is using Wifite from the console for now I would recommend using my minor modified version here: https://raw.githubusercontent.com/VultureZZ/wifite/master/wifite.py

    It has a fix so that clients are now properly detected for de-authing and mac cloning.

  4. Hey guys, been awhile... I was active in the Mark IV but am working on a new setup and just want to run it by the Mark V users to make sure it is possible.

    - I have a MiFi type device I want to tether the Mark V to, while still having full capabilities. I have an Alfa AWUS036NH, would it be best to add and configure this device to connect to the tether, or use the USB tethering method (will that even work?) - Unit is ZTE Z915 http://www.zteusa.com/tmobile-hotspot-z915

    - It appears the "Pineapple Stats" infusion is essentially a war driving application, is this true? It appears to have GPS support, can it use a USB GPS device to correlate the data to a location?

    - How capable is the Mark V in terms of memory/cpu. The Mark IV was fairly limiting with how much it could process at a time before it reset itself, has this been mainly resolved? For example could I run "Pineapple Stats", and ADS-B infusions without issue?

    My goal here is to create a lightweight automated WiFi mapping system as I drive around with the ability to view ADS-B data and do pen testing if necessary.

    Thanks guys, hope to start contributing again soon :rolleyes:

  5. Seb, any info on the next version release? I have come back from the dead and it looks like the injection issues have been figured out!

    I tested this out and found that upon the initial connection of the client the first site seems to get the injection but after that no injection occurs. Additionally I noticed the horrible lag indicated above, let me know if there is anything I can assist with.

  6. I let it sit all night last night.... Never installed. I doubt there are that many things that needed to be installed on it.

    Read over velocityserial's comments those are good instructions for getting things to work properly. The issue is with the install script executing the python install script, basically it causes a huge amount of load on the router and results in a reset unless you follow the instructions velocityserial laid out. He is essentially making sure you aren't running any extra services, then also making sure you have enough swap memory as that is a quick way to crash the pineapple.

  7. 2nd Wifi + Ettercap Filters..... yummy

    Just wait to see all the fun that will bring

    Telot is right, just go for another openwrt platform, much cleaner for what you are wanting to do. You don't need all the overhead of Karma to become a pay-for-internet provider. Plus is this a really viable business plan?

    From my experience getting signal in a subway is horrid unless the provider is specifically partnered with the municipality. Oh maybe you are talking about above ground trains...

  8. cool, I would have a feature request :-)

    Would be great if iptable nat rules would be editable.

    Example do only NAT if source is in net x.x.x.x

    e.g.:

    iptables -t nat -A PREROUTING -p tcp -s 172.16.42.0/24 --destination-port 443 -j REDIRECT --to-ports 10000

    Helps to access the port 80 webinterface if only some subnets are redirected :-)

    From my understanding WM has already accounted for the iptables redirect locking out the web GUI.

  9. From what I've read this is the command to use for redirecting traffic to sslstrip.

    iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
    

    But from what I've tried so far I cannot get this to work. It is not stripping SSL from the connections and just in general not working.

    What command are you running for sslstrip? Just sslstrip without any switches?

    You will want to issue the iptables command above, then "sslstrip -w /usb/sslstrip.log" or something to that effect, you will see nothing on the console command for sslstrip it will all be contained in the log file. Then try logging into your bank, it works, you should see:

    "{DATE} {TIME} SECURE POST Data ({WEBSITE}):{DATA STREAM}"

  10. Updating this thread, 2.0.0 is out, has functionality for SSLStrip. Once installed via opkg execute the following:

    ln -s /usb/usr/lib/python2.7 /usr/lib/python2.7

    touch /usb/usr/lib/python2.7/site-packages/zope/__init__.py

  11. To my knowledge there is nothing that can be done to easily accomplish this, basically you need to alter the firewall policy for any client that has already logged into your phishing site.

    I would look at the keylogger module by Whistle Master, once we have ettercap filters working you can achieve what you are looking to do here is a much more stealthym and efficient manner.

  12. I can confirm on 2.0.0 doing a fresh install of the firmware, installing all available modules, then opening the opkg module and installing "sslstrip". Then running sslstrip will produce the above error. To resolve the error execute:

    ln -s /usb/usr/lib/python2.7 /usr/lib/python2.7

    touch /usb/usr/lib/python2.7/site-packages/zope/__init__.py

    This is just to get SSL strip to run, you still will need to execute the iptables command to redirect the traffic to sslstrip's port.

  13. From my understanding Seb is working on logs and modules to by "smart" about how they are sent to the USB drive which will be in a future version. Until then as WM stated it is not recommended to move anything under the /www folder.

  14. Okay, make sure you installed sslstrip to USB through opkg to make sure all the dependencies are there.

    Then execute the following in shell:

    ln -s /usb/usr/lib/python2.7 /usr/lib/python2.7

    touch /usb/usr/lib/python2.7/site-packages/zope/__init__.py

    Should work after that.

  15. Great little script that can be easily modified for each individual, thanx for contributing!

    If anyone has written a script to auto install modules that would be a great incorporation into this script. If not I may write it and post it here to add in. I am going to add this onto my USB. Usually I flash and go into auto-mode on re-installing everything.

  16. I've looked through the script a bit but I'm still quite confused. How exactly do we work this with Site Survey? I ran the script from an SSH session and it just made a bunch of monitors (mon0-mon9) and then I had to force-quit the session. So either it's a configuration mistake on my part (most likely) or I simply don't know how to utilize this script correctly.

    You probably are not running any current captures with Site Survey, the script is bound to mon0 which is assumed when you are using Site Survey. However, the mon.wan0 is the default if you have not down/up the adapters. If you have, it is very odd because there are no calls to airmon-ng in the script. It does not work directly with Site Survey right now, it requires you to start the capture via Site Survey, then using the terminal execute the script against the captured file.

×
×
  • Create New...