Jump to content


Active Members
  • Content Count

  • Joined

  • Last visited

  • Days Won


About stealthkit

  • Rank
    Hak5 Fan ++

Profile Information

  • Gender
  • Location

Contact Methods

  • Skype

Recent Profile Visitors

1,488 profile views
  1. Make sure not to share you internet to "br-lan" that is a bridge or virtual interface. You will have to share your internet to physical interface "eth0-1" or "wlan0-1" to get the module to work. Also make sure that you turn off sslstrip or anything else that that is cpu intensive. Hopefully this helps :) -Stealthkit
  2. By no means did I mean all open source software is crap. I understand where "Drei" is coming from, as I also work in education. I have to support 35,000 users and not to mention the 3:1 wireless model that I am in the process of implementing. I to have to work with a budget that seems to always be getting smaller. I know that Open-Source is "free" but in reality it is not free. The time you will have to work troubleshooting the issue and that time costs money. *Salary* Not to mention if for some reason you leave the company, no one will know how to work it. At least with Cisco I have one neck
  3. Gotcha ;) Ya Fool.py worked very quickly... Impressed -Stealthkit
  4. BTW WM are the python scripts UpsideDown.py and Fool.py doing basically the same thing? Not complaining just curious as last night was the first time I was able to see the Fool.py script work. Glad to see it working. :) -Stealthkit
  5. You are right... I am not sure why I did not think of it. I will make a note that my brain shuts off after 4am. On a side note I did come up with an idea for a module at 4am. It is basically a spanning-tree exploit/DOS for people who did not set up spanning-tree correctly across their network. I have seen about 2 out 3 networks or so, have spanning-tree emplemented incorrectly. Just enabling spanning-tree on the switchports which it seems a fair amount of people are guilty of doing, will not pertect them against a spanning-tree loop. It would basically let a broadcast storm occur and if they d
  6. If you want live traffic monitoring and a true mitm attack, then you need to look at doing ARP Poisoning. You can do this in Windows and or Linux as all you are doing is creating an anouncement to the router that you are basically now the router. This is done by poisioning the ARP cache to think you are the default gateway and so everything is routed to you which you NAT back to the router. Since you keep asking about live captures I would recommend "easy-creds" in Backtrack 5 r3. Everything is contained in one package just follow each part 1 and so on. It is scripted so you don't have to do i
  7. Haroo, This is what I told you about in your other post. Like Zephyr said after enabling ICS then go back into your NIC interface and reset the static IP address. -Stealthkit
  8. Did you set ICS on the Pineapple? The easiest way would be to use WM's "Network Manager" and click on the ICS tab in the module. Enable at boot and share "Eth0" to "br-lan. If you are going to be using the "MITM" module then "eth0" to "wlan0 or however you want it to be set up. One other thing is check you IP settings again in command prompt. Issue "ipconfig" and just double check. The last guy I fixed needed to turn on Internet Sharing again. Not sure why it turned off but it might be worth a look to see if it is an easy fix. Is your laptop connected to a wireless network because if it lost i
  9. Did you set up your internet sharing on the pineapple?
  10. I am in the market for a 5 gig per second packet shaper for the company I work for. Yes, I know that is a insane amount of bandwidth but I have 32,000 + people that I have to support. Being able to toggle the end users up and down and be able to monitor the ASR is where these things kick major ass. I have talked to BlueShield and they have a nice solution but I would like to find other people that have used a packet shaper in the enterprise setting. Any input would be greatly appreciated. :) Regards, -Stealthkit
  11. Watch out for Cain and Able, as its main purpose is to crack hash keys. I have never tried cracking any hashes with it, I only used the ARP poisoning portion of the software.
  12. Just like "Seb" said, try and go to to access the UI. You will want to be connected to the LAN/POE port on the Pineapple or you need to be connected to the pineapple via wifi to access the web ui. (You need an address 172.16.42.X /24) If that doesn't work then you should re-flash the pineapple and I would suggest plugging the Pineapple into your home's router via ethernet on the WAN ethernet port on the Pineapple. -Stealthkit
  13. Sorry about that... Fixed the hyperlink in my original post ;) -Stealthkit
  14. Just reflash it again and it will be a lot easier. Just SCP the update.bin file over into the /tmp folder on the Pineapple. Issue "sysupgrade -n -v /tmp/upgrade.bin" through your ssh and go grab a beer. Reference the hyperlink below for exact steps. :) http://cloud.wifipineapple.com/index.php?flashing -Stealthkit
  15. You need a powered USB hub and I would suggest downloading WM's Network Manager first via ethernet. Plug in the Alfa USB adapter into the powered USB hub. Go into the "Network Manager" module web interface click on most likly "wlan1" and click start if not already started. Then you should see it populated below again most likly as "wlan1". Select Access Point as the mode and plug in your SSID of your home network. Select WAN as the interface and you can leave channel on Auto unless you know the channel of your home wifi. Select "OPEN" "WEP", "WPA", or "WPA2" depending on your home wifi set up
  • Create New...