-
Posts
786 -
Joined
-
Last visited
-
Days Won
15
Posts posted by thesugarat
-
-
They are in the Mark 5 in the Pineapple Bar Tab. Have you not looked through all the tabs and options yet?
-
hey guys while looking around thought some of you would like it
That looks nice but is it interactive? By that I mean if you execute a script does it show you in real time the outputs? If it doesn't then it's just a fancier version of the execute program built into the firmware.
-
I wasn't judging you or commenting on any legalities... That's your business. I was really just trying to understand your setup. I'm not trying to insult you but you left out those details that would let me rule out you being such a noob you're riding around on a bus with a pineapple that's not providing internet but expecting folks that browse to get to websites... Make sense? As daniboy92 suggested, I would ignore everything in the log that isn't related to username/email or password. Search/filter for email or pass or the @ symbol and see what pops up.
-
Why was the bus ride necessary? What was your setup? We're you providing internet to folks that connected to your pineapple? Have you tested this at home with your own equipment to ensure you know what it should look like when it works?
-
thrillscience,
I think you've missed something... http://172.16.42.1:1471 is the management page for the pineapple and that is well published. If you are seeing http://192.168.1.1 that is for the recovery page after setting the dip switches to activate that mode. Usually people get there when following the Unbriking guide...
-
EDIT: come to think of it now the flashing over Ethernet that screen shot is talking about im pretty sure is like the way i've been doing it. You download the latest firmware on your computer ssh into the MK5 and the scp into it and upload the firmware then flash.
No, what that page is recommending is doing what you see right there from that page but over Ethernet cable and not over wifi... The term "Over the Air Upgrade" just means over the internet without you needing to download the file first and initiate it like we used to do with older router firmware. More smooth than the DD-WRT days...
-
Cooper,
It's not that I don't understand, I'm just not as worried about it with the recoverability options built into the Mark 5. What I was trying to point out to ZaraByte is that he is doing something via WinSCP and SSH that is very easily and stably accomplished with an Ethernet cable using the same "over the air" update option built into the firmware. He shouldn't have to download the files and manually do the updates... I happen to use the "over the air" option over WiFi, and have never had an issue.
-
Yes it was you Zarabyte... You don't use the over the air feature for firmware updates? You go get the file and manually do it? That's hard core right there... :)
-
I saw that one as well... Whatever works better. I'm not stuck on a specific solution.
-
Lol I can't tell if you're serious or joking....
-
With this one there would most likely need to be big fat buttons with some of the normal/well used Shell commands tied to them so that when you want to hit Ctrl Z or Ctrl X you just click the button etc.. That would make browsing and tablet use much faster.
-
I always flash over wireless too, but since it wipes everything (not on the SD card), I also always need the Ethernet to get back in.
That's not how that works... When you flash over wifi it just reverts the access point name back to the default one. When you see you have dropped off the AP name that you originally had set just start looking for the default one and connect... Configure from there as normal. I can honestly say I've never used the Eth port for any flashing activity.
-
Dip switches are set to normal? No Pineapple Access Point is being broadcast that you can connect to? I know it says not to but I always flash over wireless, never had an issue...
-
You're awesome... and very busy... So thanks for looking.
-
I placed an order last week, and it hasn't shipped yet... But, I wasn't expecting it to. I knew full well that they were all out of the office for DEFCON. I suspect that ramp up and participation in DEFCON has delayed many small boxes of pinappley goodness from being shipped. They'll find your order and get it to you.
-
Several great scripts out there that can be used on the Pineapple but using SSH at times can be difficult. Someone recently mentioned using tablet does not lend itself to using SSH. So, what about a bash prompt in a browser? This project appears to be in PHP and Ajax already: https://code.google.com/p/xwiterm/
Anyone have enough PHP Foo to covert it into an infusion? (Sadly,I do not.)
Yes I know you can run commands from the Advanced tab somewhere but that isn't interactive enough to run WiFite...
-
Why not use Wifite, or the aircrack-ng suite over SSH? No need for an infusion...
-
Logout issue confirmed... Not seeing an issue with PineAP.
-
I was in Germany and the airport in Brussels last week. No worries even internationally. I fly quite a bit and no one ever even asks about it. I keep it with me in my carry on.
-
-
Try bully or Reaver again. But use wash first to ensure its WPS enabled. After that try Ethernet or the reset button so that it goes back to stock settings.
-
I'm not going to debate this with you or anyone else. I believe you're logic is flawed and I have no financial interest is Hak5. Also, not the first time I've had to state that... As to your original question you might check out this new thread:
https://forums.hak5.org/index.php?/topic/33175-sslsplit-on-wifi-pineapple-mark-v/
-
Connect your laptop to the Pineapples broadcasted Access Point, connect to the public adhoc network via Client Mode. Once connected leave everything the same and simply try to browse to a website on your laptop. This splash page will show up and you can then follow the process the captive portal requires.
-
Well the good news is the Hak5 team are very professional and will take good care of you no matter what you want to do...
The bad news is you're wrong and are not the only one that's tried to come here and complain about it after you bought a Pineapple. These guys make the hardware and firmware. They don't make SSL strip... they make a device that can run it. The fact that some websites out there (useful to you or not) are more proactive and plugged the security threat that SSL strip exposed is not the fault of Hak5. Karma is in the same realm but the Hak5 team is working on an updated firmware that will be released in the next few weeks that implements a newer approach. The computing/hacking landscape changes very quickly... Stop bitching and do your homework. People like you are the reason I hardly post here anymore.
Infusions? How do I get them install them? Yes I looked, Yes I am frustrated.
in WiFi Pineapple Mark V
Posted
What you are talking about is the splash page or Captive Portal from the hotel wifi. Connect your pineapple via Client mode to the hotel wifi, then connect your laptop to the Pineapples broadcasted Access point and use your browser to try to navigate to a webpage the captive portal should show up and you might be able to complete the process. Some captive portals I've run into won't allow you to authenticate through. So wait until you get home and connect to wifi then install your infusions. The folks here can only help so much...