Jump to content

newbi3

Pineapple Moderators
  • Posts

    1,022
  • Joined

  • Last visited

  • Days Won

    61

Everything posted by newbi3

  1. For your usecase it sounds like you want a Basic Portal which will show the same captive portal page to everyone always. Targeted Portals allow you to change the page that is returned to the user based on different conditions that you set in the rules editor. For example, you may have a target that you know might connect to 2 different SSIDs based (lets say `Corporate Wifi` and `Coffee Shop`) and based on this you want to show a page that relates to the SSID. You would create two rules in the targeted rule editor for SSIDs and route them to two different destinations (we'll call them corporate.php and coffee.php). Now when a client connects to the Pineapple thinking its `Corporate Wifi` they will be shown the `corporate.php` page. If the connect thinking its `Coffee Shop` they will be shown the `coffee.php` page.
  2. This should be fixed in the 1.0.1 Beta 4 firmware. Sorry about that.
  3. Would you mind sharing the portal with me? You can DM it to me. I never actually tested portals from the previous pineapple so something might be broken. I'll try to help you migrate it so I can write some documentation on what to do going forward.
  4. Did you create this portal new on the mk7 or is it from an older version created on the nano/tetra? I'll take a deeper look into this weekend. Which version of the firmware are you on? Also can you please include the output of the module log file? You can find it at /tmp/modules/evilportal.log
  5. This should now be fixed in firmware version 1.0.1 Beta 3 and newer. If anyone has issues going forward please report it.
  6. I'm assuming this is a custom made portal since you are submitting credentials. My guess is the portal's backend code isn't handling the authorization flow correctly.
  7. The goal of the Evil Portal module is to provide a captive portal platform with a few bells and whistles, not necessarily to create pre-made templates for every use case. If this is something you need I highly encourage you to build it. If there are any specific questions you have about how to do something with Evil Portal I'm happy to help.
  8. This module isn't really meant to be left running while you're not looking at it. If you need to do a packet capture that records the data it collects I recommend using tcpdump.
  9. Hello, we are looking into this and will have a fix asap. Have you tried the temporary solution in this thread?
  10. The modules are typically developed by 3rd party developers. Developers need to port over the modules from the Nano/Tetra to the Mk7. This will take some time since developers have to get the hardware and then start writing code. Feel free to create any modules you want to as well! https://docs.hak5.org/hc/en-us/sections/360008923634-Development More documentation and tutorials are in the works from what I hear.
  11. Sure can. Permanent clients are clients that will always be allowed to connect to the pineapple without ever having to go through the captive portal. Its good to make 172.16.42.42 a permanent client because this is often used as the host address of a compumter when doing wired client mode. Allowed Clients are clients that are currently allowed to have internet access. Clients can get on this list by either being a permanent client or by signing on through a captive portal. This list is reset every time Evil Portal is started/stopped.
  12. Glad to hear! This isn't is a permit solution but will work fine for now. We might pull this url out into a text file or make editable through the web interface in a future version of the firmware.
  13. Seems like something might be going on with your internet connection then. Are you able to get to http://example.com in your web browser? A temporary fix for your issue - just to get you up and running - is to edit this file: `/usr/lib/pineapple/pineapple/helpers/network_helpers.py` Change `http://www.example.com` in the following line to `http://www.google.com` def check_for_internet(url: str = 'http://www.example.com', timout: int = 1, logger: Optional[Logger] = None) -> bool:
  14. Can you hit example.com specifically? This is what the module is using to try to determine if there is an internet connection. If that does work then create a file on your pineapple called `internet_check.py` and paste this in it from pineapple.helpers import network_helpers print(network_helpers.check_for_internet()) save it then run `python3 ./internet_check.py` If its able to connect it should print True otherwise it will print False. If it does say false, edit the second line to look like this: print(network_helpers.check_for_internet(timout=5)) (Make sure you don't spell `timeout` correctly.. I just noticed a typo I made in the library lol) Run the script again: `python3 ./internet_check.py` If that still says False, then for some reason the pineapple is having an issue resolving example.com. Change the line to look like this and try again: print(network_helpers.check_for_internet(url='http://www.google.com', timout=5))
  15. Looks like this might be a DNS issue. Are you able to `ping example.com` from your pineapple?
  16. Can you post the output from the EvilPortal log? `cat /tmp/modules/evilportal.log`
  17. Hey @astinomia this is probably happening because your pineapples clock hasnt been synced yet causing there to be certificate errors when trying to install dependencies. To check this, if you can open up the terminal and run `opkg update`. If that succeeds then you should be good to installing the dependencies. If it fails you can either wait for ntp to sync up your clock (should be every few minutes) or manually make it sync by running `/etc/init.d/ntpd stop && /etc/init.d/ntpd start` Let me know if this solves your problem
  18. Description This module is a web front end for mdk4. It allows you to easily preform wireless attacks and manage history. Features Manage dependencies Preform attacks with mdk4 Easily apply options to your attacks View and download attack history
  19. Description HTTPeek displays all images, urls, cookies, and post data sent in plaintext by clients connected to the Wifi Pineapple. Features Display images, urls, cookies, and post data on a web page. Start/Stop capturing Start/Stop live updating
  20. Description This module is a web front end for tcpdump. It allows you to easily start packet captures and keep track of historical pcaps. Features Manage dependencies Preform pcaps with tcpdump Easily apply options to your captures View and download capture history
  21. Description This module is a web front end for nmap. It allows you to easily perform port scans and manage scan history. Features Manage dependencies Preform nmap scans Easily apply options to your nmap scans View and download scan history
×
×
  • Create New...