Jump to content

Vulture

Active Members
  • Posts

    83
  • Joined

  • Last visited

  • Days Won

    4

Everything posted by Vulture

  1. There is another thread replied to recently by Mr-Protocol detailing why encrypted networks don't work.
  2. Let me know how yours works I keep getting drops evey 10-20 min which seem to be from some sort of lockup on the USB command that binds the adapter. I will post some details later but it has been very hit or miss. Also the speed is pretty bad but this is mainly for remote access not for ICS.
  3. These are super easy to setup guys, just follow these steps: 1) Pull up the page you need 2) Save the page 3) Open the page in a txt editor and remove all of the scripts that aren't necessary for the landing page 3) Download all resources on the page (images, css, etc) and put them into a folder ie "netflix" with the main page saved as netflix.html 4) Edit the main page and where you see the <form> tags for logging in, just change the POST method to error.php and set the username and password "name" attribute to name and pass respectively. 5) Your done! I will be releasing an updated phishing package in the near future containing an easy harvesting method, the one thing I am trying to figure out is how to redirect them to the real site after they have entered the credentials on the fake site. The issue I am having here is that this will probably need to effect iptables because we do not want dnsspoof to be redirecting them for just this single domain we are dealing with.
  4. Whistle Master, I noticed this is using the repository based off of the 3.2.9 kernel, do you know if there is one for our kernel available? I was unable to locate it. Reason I ask is I am attempting to install kmod-rt2800-usb
  5. This shouldn't be too difficult though. Basically aircrack provides this capability for WEP networks and the ability to capture the handshakes of WPA/WPA2 networks. What I would see is a module for capturing IVs (WEP) and Handshakes (WPA)then sending them to a remote host for processing. You then have Reaver which exploits a vulnerability is WPS for WPA/WPA2 networks which is very effective just time consuming. You should read over the documentation for aircrack and reaver to get a full understanding of what they are doing. Reaver from my understanding is installed on the Pineapple but does not function yet. I can not confirm the working status but I know it is installed.
  6. Oh yes it does :) Mine keeps mounting as /dev/sda1 (I have a single Ext4 partition on the micro-sd). Just edit /etc/fstab and change the /usb mount to /dev/sda1 and it will mount to /usb If you don't want to restart just issue "mount -a" after you make sure /usb is not mounted to a USB stick. Working on USB Alfa AWUS036NH support now, so we can have the ability to have multiple wireless connections....
  7. I will update the git repository if possible tomorrow, but here is the issue: pineapple/3g/3g.sh Line 59 should read: *1410:6002* | *1410:5031*) echo "Novatel MC760 (Virgin Mobile) detected. Attempting mode switch" Line 78 has an error: sleep 3; insmod usbserial vendor=-x1410 product=0x6002 should be: sleep 3; insmod usbserial vendor=0x1410 product=0x6002 The first is an enhancement really, it fixes the MC760 cards for when they have a micro-sd card in them and plugged into the primary usb port. The second prevents the MC760 virgin mobile device from functioning and is just a minor mistype. Looking forward to adding to this community, it seems to be expanding rather quickly.
  8. Received my pineapple today and was trying to get the MC760 USB device to work. Looking through the forums I have verified the following: 1) The device is activated and working on a windows PC 2) The device has been attempted both directly plugged in, and via a powered USB hub 3) The pineapple is connected to the wall When connecting the USB device directly to the pineapple lsusb reports the address as "Bus 001 Device 017: ID 1410:6002 Novatel Wireless" when plugged in via the powered USB hub I get "Bus 001 Device 015: ID 1410:5031 Novatel Wirelss" The 3g.sh script appears to only be configured to work when the device is reading ID 1410:5031. When running connected to the USB hub and I run 3g.sh through the terminal I get the following: root@Pineapple:/www/pineapple/3g# ./3g.sh Searching for attached 3G Modems 1d6b:0002 0451:2046 1410:5031 Novatel MC760 (Virgin Mobile) detected. Attempting mode switch Looking for target devices ... No devices in target mode or class found Looking for default devices ... Found devices in default mode, class or configuration (1) Accessing device 019 on bus 001 ... Getting the current device configuration ... OK, got current device configuration (0) Using first interface: 0x00 Using endpoints 0x08 (out) and 0x87 (in) Inquiring device details; driver will be detached ... Looking for active driver ... No driver found. Either detached before or never attached Could not claim interface (error -2). Skipping device inquiry USB description data (for identification) ------------------------- Manufacturer: Novatel Wireless Inc. Product: Serial No.: PROTECTED ------------------------- Looking for active driver ... No driver found. Either detached before or never attached Setting up communication with interface 0 Could not claim interface (error -2). Skipping message sending Checking for mode switch (max. 20 times, once per second) ... Searching for target devices ... Searching for target devices ... Searching for target devices ... Searching for target devices ... Searching for target devices ... Searching for target devices ... Searching for target devices ... Searching for target devices ... Searching for target devices ... Searching for target devices ... Searching for target devices ... Searching for target devices ... Searching for target devices ... Searching for target devices ... Searching for target devices ... Searching for target devices ... Searching for target devices ... Searching for target devices ... Searching for target devices ... Searching for target devices ... No new devices in target mode or class found Mode switch has failed. Bye. rmmod: can't unload 'usbserial': unknown symbol in module, or unknown parameter insmod: can't insert 'usbserial': Invalid argument ./3g.sh: line 113: /etc/init.d/firewall: not found ./3g.sh: line 113: /etc/init.d/firewall: not found I see two lines that may be causing the issue: Looking for target devices ... No devices in target mode or class found AND Manufacturer: Novatel Wireless Inc. Product: Serial No.: PROTECTED The Product appears to be missing, is this normal on the MC760?
×
×
  • Create New...