Jump to content

LexMichdeappel

Active Members
  • Posts

    27
  • Joined

  • Last visited

  • Days Won

    2

Posts posted by LexMichdeappel

  1. Ah. So if I understand correctly, you can only 'fool' devices that try to connect to unsecured wifi routers. And 'payload' only comes from information submitted by the connections that are made to 'internet-stuff'. The only routerconnection-info I'm transmitting to the pineapple when I walk down the street is a routername I have stored in my phone and it must be unencrypted, no passwords are collected. You were indeed pretty helpful, thanks!

    And afaik my Galaxy Nexus has several unsecure routerconnections saved. It's strange why it doesn't connect automatically through my pineapple, because I can clearly see it probe like a mad-man in 'airodump-ng'.

    At the moment I don't have an internet connection I can share to the pineapple, but I will be coming back with more questions as soon as I had the chance to play some more!

  2. I just got my Mark IV in the mail and I got it running. I'm a big n00b, but still I am at a stage that the thing has Karma turned on and it shows me a few connecting devices.

    Only that isn't really why I turned it on, because I want to check if my own phone is vulnerable for these attacks. What bothers me is, why isn't my phone coming up in the logs? Is it safe to leave my phone in 'WIFI ON' state or am I doing something wrong and is this a false feeling of security?

    When I use 'airodump-ng' on a Backtrack machine, my Galaxy Nexus shows a lot of probing! So I can't believe I'm safe...

    Also I don't see passwords that the other devices use to log into the fake SSID's generated by Karma. Is that something that just isn't possible or is that also leaking from phones and should I be careful with my own info's?

    I hope someone can help me testing my equipment, please keep in mind I'm actually a big n00b, but adventurous enough to have come this far.

×
×
  • Create New...