Jump to content

newbi3

Pineapple Moderators
  • Posts

    1,022
  • Joined

  • Last visited

  • Days Won

    62

Everything posted by newbi3

  1. Do you have a serial cable to connect it to your laptop?
  2. //If Submit Button Is Clicked Do the Following if ($_POST['Login']){ $myFile = "log.txt"; $fh = fopen($myFile, "w+") or die("can't open file"); $stringData = $_POST['username'] . ":"; echo fwrite($fh, $stringData); $stringData = $_POST['password'] . "\n"; echo fwrite($fh, $stringData); fclose($fh); } This would be a lot cleaner: if (isset($_POST['username'])) { file_put_contents("log.txt", $_POST['username'] . ' : ' . $_POST['password'], FILE_APPEND); } I didn't test it but it should work. Also I should point out that it appears that you are trying to do some phishing here.. phishing is against the forum rules so this will probably get locked. I'll leave my example up just for educational purposes but I do not condone phishing and if you use my code for that I'm not responsible.
  3. you can use "command+m" to minimize the screen
  4. After reading that black hat link I'm seeing black and white lines everywhere. </unrelated>
  5. 1984 Freakanomics A book on realativity Love and Math I've read black hat python, its a good book. I'd also recommend getting some python socket programming books to read along side it.
  6. When you user submits the login form you should make an ajax request back to the server to store the data and then give them a message on the page that says "wrong username or password" and then have them enter it again and then send that back to the server to write it to a file and if they are the same username and password as previously entered then authorize them otherwise have them enter the username and password again. Its only a good 20 lines of a code.
  7. I teach computer programming, what I tell my students to do when they ask me for a good personal project is to automate something that they do when they turn on their computer such as open their web browser and go a facebook or find an API for something like a weather service or googles geo location APIs and build a program that utilizes it.
  8. The pineapple is an evil twin attack on steroids. If you want to ask for a wifi password then just install Evil Portal and create a nice looking portal for them to enter their wifi password.
  9. Tetra and Nano modules are often the same code base so if you have the code for a module thats available for the Nano its the same code thats running on the Tetra as well. Or if you have a Tetra you can look in /pineapple/modules and find everything you want there.
  10. My desktop is finally starting to die on me and its time to replace it. I've been out of the hardware game for a while now and I don't know what the best Linux supported graphics cards are. I need a card or cards that can push at least 5 1080p monitors and be powerful enough to play Star Citizen when that finally comes out. Good Linux drivers and supporting 5 monitors is the most important thing though. My budget is $500 total. I was looking at getting 2 of the Sapphire Radeon NITRO R9 380X 4GB but I can't find much about the linux performance for that card. If you're a developer running linux, what card(s) do you have in your desktop?
  11. Not sure what happened above but I can't delete the quote boxes or add new content. Anyways the replies have gone off topic. Please refrain from attacking people personally in your replies. If you don't like someone thats fine but no reason to attack them.
  12. If you're just going to get one to get one I'd recommend the Nano but if you're going to get one for professional reasons you should go with the Tetra. I have both and I develop all of my modules on the tetra because its smaller and more convenient. Also I always carry the Nano with me because of its form factor while the Tetra sits on my desk unless I need the power it offers. Really it comes down to what your budget is and if you want something you can fit in your pocket vs in a backpack.
  13. Sorry, for some reason I thought the default mode for the file_put_contents function was appending. Use this line of code instead: file_put_contents('/root/emails.log', "{$this->request->email}\n", FILE_APPEND);
  14. If you mean connecting to your home network then yes. And you're doing it mostly right but here is what I assume the problem is: the apps that you are using to control the devices use some discovery protocol like UPnP and since the turtle is on the 172.something.x.x network and the amazon echo and stuff are on a different network (192.168.x.x network probably) these UPnP requests aren't being routed to the 192.168 network from through the turtle. To fix this you will want to create a VPN server running on your 192.168.x.x network and portforward it so you can access it remotely then the app should be able to discover the devices on your network. Again this is speculation but I'm pretty sure its whats going on.
  15. This is going to be a very controversial topic as I am sure many people have a very strong opinion on it based upon where they live and situations that they have been in but I would like to get opinions from people around the world and not just in the United States about refugees coming into their countries. My opinion: Unfortunately in the United States we have politicians using their power to spread propaganda based on nothing but fear that the United States should not accept any muslim refugees even if they were screened before hand. In my view all this is doing is saying to these people fleeing for their lives to go back where they came from where they will face the choice of being forced to join ISIS or watch their families get beheaded. These politicians are using events like the Paris and Brussels attacks to spread their ideas and people seem to be eating it up. From the research I have conducted NONE of the people involved in either of those attacks where in the respected country posing as a refugee but in fact they were all citizens of the countries that they attacked meaning, statistically, that if those countries didn't let in refugees they would have not been any safer. Doing more research of my own I haven't been able to find any cases where a terrorist came into the country posing as a refuge (and if there is something out there I missed I'd love to read it). Also I don't want to be on the side of history that led to the murders of potentially thousands (if not millions) of innocent people. With my opinion stated I would like to hear what other peoples opinions are on this topic. Also like I said before this is controversial and an intelligent discussion would be nice to have. So please, be respectful of peoples opinions and don't attack them personally.
  16. I use sublime text with the sftp plugin. It makes it super easy to work on your code locally and then upload to your pineapple to test with hot keys.
  17. Hey Starphisher, I was in the same boat as you, when i was working on my degree I got a job as the only security expert on staff at an organization. I learned pretty quickly that to be good at your job you needed to know the network like the back of your hand. You should know all of the infrastructure and how it works, also make sure it is updated regularly. Since you're just getting started I would suggest that you build a replica of their network in your own lab setting with some virtual machines so that you can have practice setting it up and gain knowledge on how it works. You should also know if your vendors have regular patch cycles like, Microsoft's patch tuesday, and then stay up-to-date on patching your machines. I work as a developer now so I've been out of the IT side of things for a few years so I'm sure that someone else will have much more useful advice for you than I do. Once you get the hang of it and know your environment you will become more comfortable with, don't let it overwhelm you.
  18. newbi3

    Python or?

    I would argue for Python but like digininja said people will say to learn their favorite or preferred language.
  19. Hey Sam luckily for you there was just a "Lets Code" for the Wifi Pineapple showing you how to get started creating modules.
  20. Well as the developer of Evil Portal I feel obligated to say that I do not condone anything that Evil Portal is used for accept for legitimate things and if you do anything illegal with it I am not responsible and its all on you. With that said as long as you are not forcing or encouraging people to use your wireless network and they connect to it 100% by choice AND agree to your terms I think it would be fine. However I am not a lawyer and don't take any of this as legal advice and again I am not responsible for your actions and I can't be held accountable. I recommend just not spying on people thats kind of creepy.
  21. thats pretty cute. In all seriousness though its pretty cool now just need to cut out a hole for the led
  22. C# and Java are very close languages. Right out of highschool I got a job programming in C# having never written a line of C# before but coming from Java it was super easy.
  23. Momentum isn't slowing down - it has stayed about the same. The mkV has a ton of modules developed by only a handful of people over the course of a couple years it takes time for us to move them over and I'm sure most, if not all, of the module developers have full time jobs that are not the pineapple.
×
×
  • Create New...