Jump to content

stealthkit

Active Members
  • Posts

    75
  • Joined

  • Last visited

  • Days Won

    2

Posts posted by stealthkit

  1. Well I have everything stuffed in the box not but I am getting some weird things. I have the pineapple juice for power...and I am using the hak5 powered usb hub. I have the red plug into the juice from hub. Then the pineapple is plugged in via barrel to usb to hub. I have the black male end plugged into the usb port on the pineapple.

    Once it is booted I plug in the alfa adapter (black one) run the wireless script. I get connected but then it drops.

    I also use a 16g sd sans fit...but I took this out to try to eliminate things.

    please help!

    I heard Jiffy, that you don't use the red on the USB hub. So only use the black usb and plug in to the Pineapple Juice and then use another black into the usb of the Pineapple. You will need to use one of the black usb for your usb stick. For your WIFI, you will use the mini usb connector on the usb hub and plug directly into Alfa. I am not for sure but I believe that is what I read in another post somewhere.

    PS: I know I heard you need to cut a cable in the hub to keep it from back feeding your pineapple. Do a couple of forum searches as I have seen it in the forums. RESEARCH IS GOLDEN. I would track it down for you but I have to get off. Good Luck

  2. I have been testing this for WM and while it works, the user is always redirected to the hook page due to dns spoofing "*" So even when the victum is hooked they are still redirected to the same page every request. It is not WM's fault but just a draw back when using "*" I have been trying to find some time to install some type of a landing page to the pineapple to be able to pass through the internet and or pop up a new tab for browsing. For now I have listed the dns entries as follows *Incase you want to use if you decide to beta test*. Ex: 172.16.42.1 *.facebook.com, 172.16.42.1 *.google.com, 172.16.42.1 *.twitter.com, and 172.16.42.1 *.apple.com). *remove the comas* I would just send WM a PM if you would be willing to test the module. I am not sure but I think I am the only one that tested and more people testing would be better at finding differenet incompatibilities/bugs with different browsers. WM creates these modules for free and they take a lot of work/time. I imagine if you were to help test then it would be able to get to the pineapple bar that much quicker. *Plus you get to play with it*

    FYI make sure to update BeEF... The one installed in Backtrack is really outdated and the update process takes a while. :)

    -Stealthkit

  3. Woops, I was having trouble changing SSIDs and I clicked (I believe) REMOVE CONFIGURATION or something like that, and now, for the Wireless TAB there is nothing. Is there any way to get it back? I tried uninstalling it and re-installing and no go. I currently have firmware 2.4.1 Any help you can give would be GREATLY appreciated.

    thanks.

    I would recommend you update to 2.7 and then you will get your wireless tab back. FYI the login url is for 2.7.0 "http://172.42.16.1:1471". Also remember to read the release notes ;)

  4. It sounds like a power issue... Try to power the pineapple off of wall power and see if you have the same problem happening. USB power only can power 5 V from what I hear and the Pineapple needs 5 Volts to run which dosen't leave any juice to power the USB port with the correct power. I have just heard this being the problem that other people. Different sized USB sticks take a different amount of power and so it can come down to depend on the size and make. I would power the pineapple from the wall or plug into a USB battery. I would also suggest getting a powered USB hub. That way your USB stick will always have the power it needs and you will also have more USB for expansion. This is just what I have heard in other posts, so don't quote me on it. Hope you get it figured out :)

    -Stealthkit

  5. You need to read up about the pineapple and understand what it can do along with what it can't, just for future reference. Pentesting is 90% research and 10% actually implementing the attack/exploit. Karma works based on if the client has ever connected to an open wireless ssid. So that being said, if you have ever connected you phone to a wifi hotspot or someones network without encryption, then you would be vulnerable. Most people have gone to an open ssid but not everyone. No, the passwords will not show up on the pineapple. Wireless uses a handshake, where only part of the password is exposed until it know the other side is authentic then the password is encrypted and check against the client. This is a general idea and not exact because it depends on what encryption is used as to how the machine authenticates.

    *Hint* You could always use "mdk3" and deauthenticate everyone except the mac address of your home wifi and the pineapples mac. This way they are forced to reconnect and since everything is deauthenticating then will go further down the probe list hopefully landing on and open ssid which the pineapple will clone.

    Hope this helps

    -Stealthkit

  6. Well I get 12 or so of those System 5 *Server Backup Solution* hard drive cases every year when they give us the new drives and they come with more cases. They make good gun cases but I was just trying to make something out of them. At least I have some room for expansion... lol In my defense I tried repeatly to upload the pics to this forum and they all failed every time. I didn't think that you needed a login to view those pictures as they are in my public folder on my sky drive. Free space is free space. anyways here ya go

    -Stealthkit

    http://www.picvalley.net/v.php?p=u/1872/645839351109685570013543954533e3EsEMGH1esDWmaqDcs.JPG

    http://www.picvalley.net/v.php?p=u/2034/8339129232743785871354395579FA8BcGgi8D1YCK2YtUve.JPG

  7. Well without seeing the entire config I can't be sure but I think it your problem lies with how you have wired/configured it.... Make sure and configure the stack before configuring the switchports. This is good practice and I outlined the steps below. My diag of you error message is stated below as well.

    6d21h: %CDP-4-NATIVE_VLAN_MISMATCH: Native VLAN mismatch discovered on GigabitEthernet2/0/1 (1), with Switch GigabitEthernet1/0/1 (2).

    4d23h: %CDP-4-NATIVE_VLAN_MISMATCH: Native VLAN mismatch discovered on GigabitEthernet2/0/1 (1), with Switch GigabitEthernet1/0/1 (2). (Switch-2)

    On the back of the 3750 switches there are stacking ports and should have some cables that came with them. That is where you should be stacking the switch. So either you have the switch stacked with the right stacking cables and have switchport 1/0/1 and 2/0/1 plugged into each other or you did not use the stacking cables and are trying to stack the switches together using 1/0/1 and 2/0/1. If you did use the stacking cables then you need to unplug g 1/0/1 - g 2/0/1 between the switches and just use the stacking built into the switch. The stack as I hope you know is seen a 1 logical switch. So the ethernet connection would cause a spanning-tree loop / broadcast storm if spanning-tree is not configured correctly. I hope this makes sense. In short...

    The error is because on switch 1 you have either not configured anything and the switch is defaulting to its native vlan 1. Also the other possibly is the command "switchport trunk native vlan 1" was issued on switch 1 instead of "switchport access vlan 2". Also, I have no idea why those switches are connected via ethernet g 1/0/1 and 2/0/1 if the switches are stacked. If this is how you were trying to stack them STOP and rip that off and look for the stacking cables that came with the switches. Not trying to talk down on you, so sorry if I come off a little harsh. Then again this is just a guess but I feel that this above is most likely the issue. If you have questions let me know.

    First make sure you set the switch numbers in the stack

    #show switch

    #switch 2 renumber 1

    The "switch 2 renumber 1" part is optional if it is not already the way you need it in the rack. Next set the priority of the switches in the stack, so the same router will boot as the master during the stackmaster election.

    #switch 1 priority 15

    #switch 2 priority 14

    #wr

    #reload

    This will get the switches in the stack configured correctly (Well at lease the stack part of the config) If you have a question please let me know. Good Luck :)

    -Stealthkit

  8. Like everyone said before it really depends on the situation and what the job entitles. For example I am a Sr. Network Engineer for a fairly large school district *Support over 34,000 users at 32 different campuses* and oversee basically EVERYTHING. (Routers, Switches, Servers, VOIP, IP Cameras, ASR, ASAs, ACS, Wireless, and the list goes on and on). I make 69K before Uncle Sam gets a hold of it. I live down in Texas and I could actually get paid more if I was to switch jobs / not work for a school district. The same job outside of a school district would be 80K to 90K. I would say that you would be realistically looking at around 42K a year for the company you explained. Certs are good but experience is worth so much more. Again it all depends on what you are doing *Network Engineer/Admin or A+* A friendly warning.... watch out for the little words on the application "Other duties as assigned". ;) Good Luck!

    -Stealthkit

  9. I will give my 2 cents on how I think your college/dorms are set up as I am the Sr. Network Engineer for a large school district. * I think I can relate to the college * My best guess is that they are using some police policies as well a NAC *Network Access Control* device. Most likely you are connected to a layer 3 switch *As stated above* which I can almost guarantee they have split up into separate vlans. This way they are able to apply the police policies *EX. bandwidth restrictions* to the vlan. The NAC device then will use you mac-address and look at what rights you are given and then assign you to the correct vlan. I can not be for sure but if they are all Cisco, then I would say that the NAC that is being used is Cisco's ISE *Cisco Identity Services Engine*. This box is the perfect solution for * You and all the other students* BYOD or Bring Your Own Device. Since you have seen that they are Cisco switches then they will have CDP * Cisco Discovery Protocol * unless they have disabled *Not Likely*. You can download a network walker/spider that can walk CDP and discover their entire network. If they were smart they will have configured ssh on the vty lines. If they did not and used telnet then technically you could sniff the password. The only catch is you would actively have to be waiting for them to connect back to the layer 3 switch. A friendly word of caution as you are getting into the iffy side of things and don't want you thrown out of school if the network admin finds you in their equipment. If they have set up syslog then it will keep a record of everyone that logged in. This is all just a guess remember that. Heck you could be having a ton of collisions if the port is half duplex. It could be a number of things. I recommend that you talk to your network admin, as I am sure he/she will be able to either explain what is going on or be able to fix it. Hell he or she might be able to up your download/upload limit. *If you have one* Hope this helps you as a possible network configuration/explanation.

    Cheers

    -Stealthkit

  10. I will post a picture of mine that I built from scratch, when I get off work. I used a shock proof backup hard drive case. Luckily there was a good amount of foam that was already inside the case and cutting the foam allowed for everything to fit perfect. I would make sure to drill a hole for air as it can get really hot if it is completely sealed off. I am actually thinking about wiring the box up (LAN, WAN) ports and installing a wall plate on the box with 2 Ethernet jacks. (One LAN and One WAN) So I don't have to keep pulling Ethernet through the exhaust hole that I drilled. Anyways, I will post some pics later tonight for ya.

    -Stealthkit

  11. did you issue the "mkswap /dev/sda1" command and reboot, so you will have the swap space? I know this was the problem I had a while ago because the pineapple dosen't have enough ram to support everything and will hang and or reboot because of this. I also re did my partitions on my flash drive, so it was fresh. It fixed everything and now it dosen't reboot on my a crazy amount of times like it did before. Sure I still get the occasinal reboot but then again I was running Karma, DNSSpoof, Logchecker, URLSnarf, SSLStrip, and was also running reaver in an ssh shell. *** That is way to much to run on the pineapple at one given time *** Hope this helps :)

    -Stealthkit

  12. I like the idea... I am going to throw out an idea that I have had for a while, since you are going pretty close to that route. My idea would be creating either a real proxy or what looks like to be a proxy popup window *Cisco's Ironport* module. I have 2 of them in my network and since they are LDAP supported, that means that you have to use your domain username and passoword. For example when you get on my network it prompts you for your creditials as soon as you open a web browser. So it should not be that hard to harvest the creditials right afterwards. I would do this but I am not sure how to redirect to a pop up per say. I would say as long as the pop up looked like a real proxy login page then that is really all you would have to configure. Well along with the spoofing and the redirect. Just thought I would throw that out there incase someone wanted a fairly simple module I think. I just wish I had the extra time to get on it.

    -Stealthkit

  13. I also have USB with swap mounted and writable but sslstrip fails to install to it or to the internal memory. infusion module is installed but sslstrip itself wont install.

    Just ssh into the pineapple and issue an "opkg update" and then "opkg install sslstrip –dest usb ". This will install it on your usb drive and allow the module to work incase there is a bug or work being done on the module. Have fun :)

    -Stealthkit

  14. However,

    I lose my wired connection to the pineapple when I connect to my wireless router, any ideas?

    If you are using the network connection manager in ubuntu, it will only bring up one logical interface at a time. That could be wired or wireless... You could use the "ifconfig" commands and the "iwconfig" commands to bring both up. Without knowing all of you interface names, I can't be exact. Basically it would be something like "ifconfig eth0 up" for the ethernet connection. The wireless is trickier when using some time of encryption (wep / wpa / wpa2). I suggest googling and looking up commands ifconfig and iwconfig which are both very useful. Make sure to set up the wifi adapters config first. ( "iwconfig wlan0 essid "example" "iwconfig wlan0 mode managed" *Just Examples* ) Before issuing the "ifconfig wlan0 up" command. If you forget a command just type "--help" behind the command for the syntax. ("ifconfig --help" or "iwconfig --help" ). Hope this helps... if not for Ubuntu and you are doing this in Windows 7 let me know. Anyways Happy Hacking and don't pentest a network that is not yours without an "ok" from the network admin * Friendly advice from a network admin *. ;)

    -Stealthkit

  15. gmgfarrand / I have noticed after having the same problem in the beginning that there is a little space in front of the collon ":". An example would be (MD5: 7e5aee35609aa2d5561e58384dda8cf3). Make sure to include that space when you are selecting the MD5. Hope this helps...

    Cheers

×
×
  • Create New...