Everything posted by Tech
Digininja's interceptor is great, although I would be more than happy just dumping the traffic (with or without a filter) on USB storage. Telot is thinking very similar to what I'm wishing for :) Adding MITM attacks for cabled clients aswell would be great. Interceptor functionality with wireless transfer even better.
Would it be possible to set the device in passive passthrough, or active, and have it dump the traffic (tcpdump or the like)? Traffic in through the WAN port and out through LAN and use the wireless for management, and USB for storage.
I use the following commands to run the Mk4 as a regular AP (connect my home network to the Pineapple, and run karma/sslstrip) on the wireless network. The device will be manageable over the WAN port (just take note of the assigned IP when the script runs): iptables -A FORWARD -i eth1 -o wlan0 -s 172.16.42.0 -m state --state NEW -j ACCEPT iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT iptables -t nat -A POSTROUTING -o eth1 -j MASQUERADE [/CODE]