Jump to content

unixmito

Active Members
  • Posts

    16
  • Joined

  • Last visited

Posts posted by unixmito

  1. Is reaver dead?

    No. Depending on your willingness to invest time, reaver is still very much worth using; or using WPS as a vector altogether. If the attack is dragnetting for easy targets, it would make sense that lockouts would frustrate their efforts. In which case, reaver might be suited to the task.

    In cases where the time investment is a worthwhile prerequisite for ingress, there are options that can be tailored to certain AP's where you avoid a majority of the lockouts. Setting a wide berth with Time outs and interspersing pin attempts will slow down the process, but it will still be a gain in time if compared to a locked-out state of a router.

    The best scenario for an attack is using multiple mobile and concealable devices (like the pineapple) while dedicating each one to a single AP. Although it might take you three days to crack several AP's, their pivot and deploy nature makes them agile tools.

    If you're receiving excessive timeouts, spend time with the tool. Adjust the values until you can proceed without being locked out a majority of the time. You can automate mac rotation with a shell script and cron, which helps against certain AP's that track time outs to MAC addresses. Each brand of device is unique and they each have unque behaviors.

  2. Good question. I have one.. did you read all the posts? The answer is only a few posts above yours. I totally sympathize with your current quandary. But I would feel it redundant and a disservice to you if you don't read through the knowledge already presented.

    I will give you one hint. You need to bridge the wlan0 to wlan1, and the tool for that would be to use Iptables to route out-bound traffic to your internet accessible wifi.

  3. Unfortunately it doesn't. I used the alfa, compile a usbreset program to renitialize the hardware.. went through lsusb out put.. used a Netgear WG11v2 and a TP-Link all with compatible chipsets. None of the decide to show up in any of the config options, nor do they show up as a device under /dev.

    I will probably go to 2.5 if that's what it will take. I mean, they said wifi relay and I want my relay darnit! :o

    Thank you very much for you input! If you find anything else please don't hesitate.

  4. A more interesting question would be how do we convert the rainbow table into something available for pyrit. Why Pyrit? So far, after bench-marking its performance I have found pyrit to be exceedingly adept at being one head above the rest in terms of speed.

    Should I manage to airolib -> cowpatty -> pyrit I'll write a howt to on the subject. If anyone has suggestions, then... pass the bread bro!

  5. In an additional note, certain websites will hash the password before sending by using javascript. I believe that at one point Yahoo used this method of protecting a cleart-text password appearing on the site. To circumvent this, I remember using ettercap to load a filter and remove references to the onsubmit="" javascript event handler.

  6. I recently purchased on recently (only a week ago), and I ran into the same consideration. What I concluded was that at the very least go for the PRO bundle. Besides what the standard package provides, you will receive a 7dBi antenna; a special USB to 12V power cord, And an additional wifi card which will diversify what you can accomplish with the Mark IV on its own (such as simultaneous deauth attacks).

    BUT.. had I had the cash, I would have sprung for the full package, especially for the battery pack that allows you to wardrive unfettered from power constraints (for a time). So, go for broke, by the best package, incidentally the priciest but well worth the investment. As for international shipping, I wouldn't have the slightest clue.

    I hope my personal take on what I received will help you make a purchase.

  7. I hate to dredge up such an old post, but it has to be said that I haven't seen a bit of code to suggest how to properly create a wifi to wifi relay with the pineapple. Yes, I did use the search function, and no after reading about 11 posts nothing definitive. Sure, I can hack together and iptables script, I'd rather not fudge the configuration and have to reset the whole thing should I end up not being able to SSH into the pineapple.

    Thanks.

  8. OpenVa is great place to start with. My advice is, go with a preexisting library that actually does most of the grunt work. Facial recognition is an exceedingly specialized field. Having already tried to roll my own, you're going to wish that you taken applied mathmatics in college (and if you did, kudos).

    Otherwise sounds like a great project. Does Hadoop include facerecognition?

  9. I presume that the community left this topic alone for obvious reasons. The pineapple is mean to act as a device of convenience. It incorporates functions, script, programs that work with laptop already. The point being, all the tools found in Jasager origiinlly began as tools that a laptop could execute.

    Let me ask you this, would you want to haul a laptop around; opening and closing the lid when ever you had to set up an attack, or would you rather contain all the same device in a much smaller form, with efficient power and such... (etc. etc., ad naseum to the credit of its creators).

    And have you tried a simple and cursory search of google, one would find that Karma (or karmetasploit) exists as a project independent to the Wifi Pineapple.

  10. First let me introduce myself, I am known by unixmito (fork() anyone?). I have both an intellectual and professional interest in programming, networking, auditing, etc. Recently, I purchased the Mark IV, and am waiting to receive it today. In lieu of the 4-6 hours I will have to wait for it to arrive I'm doing a variety of research ahead of time.

    First question:

    I understand the platform involved and the basic principals driving the Mark IV; however, despite the few snippets of code i've seen from post to post, It's unclear if there's a distinct methodology used for creating a project (vis a vis gcc or similar compiler). Is there a project skeleton I can follow for compiling custom modules? I've never had the luxury of dealing with open-WRT. In fact, I haven't seen a svn/git repo for any code associated with Jasager and the Mark IV.

    Second Question:

    I am working on a project that uses fuzzing/descriptional entropy to perform latency analysis on TOR nodes. I understand this is rather dated news, and several papers where written up in '09. However, I'm opening up this discussion on my own terms and have even enlisted mathematician Oswaldo Gonzales Gaxiola (Universidad Autonoma de Mexico) to hopefully address this issue once more. Especially since a device such as the Mark IV is poised to deploy such an attack easily and with minimum configuration. My question being an invitation, if any of you would feel motivated to participate in this endeavor, I will gladly accept any help/advice/criticism.

    Third question:

    Is anyone an electrical engineer or have equivalent experience? If so, I have also found an overseas manufacture for poly-crystalline solar cells with a decent high amperage output. I will also be creating another project that will seek to create an affordable of the grid solution. Any help designing the inverter/voltage/amperage regulator circuits would be of tremendous help. I must confess I'm a hobbyist in the area and find myself quite perplexed at times.

    I appreciate those that have gone through and read this entire post. I only resort to such a long winded approach since using the search function doesn't produce any results for: "solar panels," "solar," "entropy," "fuzzing," or "TOR."

    Bibliography

    http://www.math.uni-...ropy/algor.html (Descriptiona Entropy in Logicl)

    https://blog.torproj...ne-cell-enough/ (One node enough to break TOR)

    http://docencia.izt..../miscelanea.pdf (Quantified Harmonic Wave Theory)

×
×
  • Create New...