Jump to content


Active Members
  • Posts

  • Joined

  • Last visited

Everything posted by bigthinker

  1. has anyone else seen this? http://www.raspberrypi.org/phpBB3/viewtopic.php?f=36&t=58669 it's a pi version of the Wi-Fi pineapple
  2. bleh, thats the risk you take when using pretty much anything. thejester claims to of developed the new tool xerxes, if your wanting to learn about DOS/DDOS you may want to google that. There are tons of tutorials around the net teaching you about it.
  3. kali is overkill for the pi, unless im mistaken
  4. I was reading a thread about a user who was using kali installed on the pi paired up with the mark v and thought of an idea. Kali is really overkill for the pi and mark v, a better solution would be just pairing the mark v with an actual computer running kali that has enough power to effectively run what you want to do .... BUT a custom linux distro built specifically to be placed on the pi and to be ran with the Mark V ....
  5. Darren should do paid training videos / webinars/ gotomeeting for pentesting techniques, can even incorporate the pineapple. +1 if you are interested.
  6. I sorta disagree. You can learn by just jumping in the deep end. Installing arch can be a learning experience, so can playing around with kali. I would recommend the cli crash course if you are new to the terminal http://cli.learncodethehardway.org/book/ learning "linux" is a little subjective, as linux is really just the kernel.
  7. do you think it would be a new custom board or using the fon still?
  8. http://hak5.org/store/the-interceptor Wasn't the interceptor just a way to capture traffic while preforming a MITM shouldn't this be very easy to achieve with the pineapple? did the original interceptor only offer remittance of the captured data via vpn or wifi and no storage for later retrieval? im having a hard time getting what this device did .. it looks like it was only a wifi tap, no eth like the star tap or whatever they call it? did the device use jasager to trick the device into connecting to the "home" network?
  9. maybe i should rephrase that. im not sure how you would get the hardware to get the fw, the firmware im somewhat familiar with.
  10. holly crap look at the picture, it uses the same hardware http://www.reaversystems.com/ You would somehow need to flash the hardware with the reaver pro firmware .. which im not really sure how you would get.
  11. im wanting to use my just as a wireless card while using another usb wireless card. Since its over ethernet my connection doesnt really work right. Im trying to use one as my connection, and the usb wifi card in monitor mode but network manager keeps kicking me into one or the other.
  12. what did you do flash it with the original firmware ? or ... will dd wrt run on it?
  13. So, now that we have the mk5, the mk4 is being geared down (naturally), and karma is going to be updated/fixed for the mk5 ... what does everyone have planed for their mk4?
  14. maybe it is just me, but with the mk4, I used the AP on many different computers and was constantly having to chase down the internet setup script ... wp4.sh or whatever did anyone else have this headache? Seems like having the ability to have this script readily available or easily downloadable from the wp5 would be nice.
  15. @Darren out of interest, can you confirm why the installation of the original firmware occurs in the users possession and not preflashed prior to purchase. My original assumption is maybe something legal, or maybe because the manufacture would charge a fee for this installation wich would drive the cost higher? either way im interested to know why.
  16. are you saying it supports POE because of the listed DC in? at 5-12 volts and POE supporting 25w give or take then it "should" work, did i follow you correctly there?
  17. @darren could you see doing some tutorials on metasploit with the mk5 in the future or is that past the scope or depth of the show for the audience? I'm pretty good with metasploit but its so indepth/complex/big there is something always new to learn and seeing how mk5 and metasploit can play together would be nice.
  18. with the inclusion of the sd card for expanded memory, can anyone comment on the likelyhood of getting metasploit running on the mk5, and if it would be worth your time. If im not mistaken it's running open wrt, i dont see any pre-made packages but I know it can be done. I might be interested in playing around with this (getting it running). Has anyone played around with this? http://jollyblog.squarespace.com/updates/2006/5/19/metasploit-openwrt.html http://hackaday.com/2006/05/19/metasploit-running-on-a-wrt/
  19. westy 12 @leevai? Thats the beer of all beers, it litterly doesnt get any better than that. Worlds best ranked beers, and most interesting If you can find it. Belguim beer, brewed by monks, that have only shipped a small batch to the US once to pay for a new part of their church. I drink the trappist 10 on occasion. I agree, darren should try a westy. http://beeradvocate.com/beer/profile/313/1545 http://www.npr.org/blogs/thesalt/2012/12/12/166987378/a-sign-from-above-needing-new-roof-monks-sell-rare-beer-in-u-s http://www.beerboxx.com/trappist-westvleteren-12-33cl.html
  20. device that allows you to create dns redirects, facilitate mitm, and sniff login creds doesnt allow you to share phishing pages. odd While I can understand the stance and the reason why (legality, public perception worries when the site is dependent on hardware sales and advertisment/sponsorship), it is an odd place for a hacker friendly site to be in. As hackers, we stand for common principles, one of which is the free flow of information regardless of the skill factor, political nature, public perception, and to some even legality. Let us remember that legal concerns are temporal, dependent on location, and are subject to change with short notice. And remember, when we say NO DOGS Allowed, they are really just saying not allowed here. one must ask themself, if we cant create or share phishing pages what else cant we do. What other features of the pineapple could be heald back ... in the internet world censorship isn't well liked.
  21. any word on if this was fixed on the mk5? https://forums.hak5.org/index.php?/topic/30411-issues-with-karma-in-mark-iv/
  22. actually, if my link is being deleted, someone let me know so I can stop posting it for whatever reason.
  23. I think my link to the product is being deleted by a moderator. Not sure why. sorry, im posting from a mobile device so I must of posted the link in your quoted text in error. What i was saying is, devices already exist that are what I would consider "hack in the box". For example the pwn plug r2. http://pwnieexpress.com/products/pwn-plug-r2 now, this device cost's a heck of a lot more, but ... check out what all it can do.
  • Create New...