Jump to content

thestudent

Active Members
  • Posts

    30
  • Joined

  • Last visited

Everything posted by thestudent

  1. Thanks, I do need to go back and re-watch some of the old videos...but what I'm really looking for is an in-depth behind the scenes. Something that describes the networking aspects of whats going on packet wise and protocol wise. Thanks everyone.
  2. Let's say that I have a dns spoof running that is redirecting traffic to my facebook.com phishing page. Is it possible once I've grabbed my intended data(username and password) that instead of redirecting to an error page or something like that, that I can use the actual IP address and redirect traffic back to the real website? Or would my dns spoof continuously catch request to that page? I don't think it would because I wouldn't be using a dns server if using the actual IP. Thanks in advance :D .
  3. Hmm..ok. I have a lot of testing to do to figure this thing out...my Mark IV is in the mail, thanks. Can anyone post a link to a "why jasager works" description. I'm sure they out there but I cant find any really good "this is what is actually happening behind the scenes" articles. thanks in advance.
  4. I am new to this also but have some ideas. For you more advanced users, would it be possible to code a "pseudo-authentication" for the Pineapple that would send a client that is secured by WPA or WEP or WPA2 a fake key and when the client responds with the encrypted password...Jasager...say, "yep, that's the right password". After the initial probe, according to 802.11, it is the router that initiates the connection by sending the client a key, the client then responds with a password that is encrypted and then the router will either accept or deny access depending on if the password is correct. Will this be possible?
×
×
  • Create New...