Jump to content

Foxtrot

Hak5 Team
  • Posts

    2,171
  • Joined

  • Days Won

    155

Posts posted by Foxtrot

  1. On 9/10/2019 at 4:37 PM, Decoy said:

    Hi @Foxtrot - the new firmware is great. Is there any chance we can modify '/etc/opkg.conf' in a future release to add the following line?

    
    dest usb /mnt

    I've been experimenting with installing required packages directly onto USB with some success so far and was hoping a firmware update wouldn't wipe it out or require others to add it for future payloads. Thanks!

    Decoy

    Thanks for the feedback! I'll definitely see about adding a usb destination for the next release.

    • Like 1
  2. Hello!

    We're happy to introduce the 1.0.1 update for the Signal Owl. It introduces some bug fixes and changes on entering Arming Mode to improve the user experience.

    1.0.1 Change Log:

    • General
      • Simplified device mode selection. The device now starts in ATTACK mode by default. Enter ARMING mode by pressing the device button at any time while in ATTACK mode.
      • Fixed a bug in USB Storage Mounting, which sometimes would cause payloads and firmeware upgrades to fail.
      • Fixed a bug in the LED helper, which would sometimes prevent payloads from updating the LED.
      • Fixed a network device driver bug and interface misconfiguration caused by some external wireless adapters.
      • Fixed a bug in the device reset button, which made it difficult to perform factory resets.

     

    You can grab the update via the Hak5 Download Center and follow the Hak5 Docs Signal Owl Update article to get on the latest version.

    Cheers,
    Marc

    • Like 3
  3. Hi!

    We're happy to announce the release of firmware version 6 for the LAN Turtle. Alongside the updates for the WiFi Pineapple and the Packet Squirrel, this release brings a multitude of package updates, and provides an up-to-date kernel and base firmware.

    6.2 Change Log:

    • General
      • Fix an issue affecting package installation and signature verification.
      • Fix an issue where the module status would report incorrectly in the Turtle shell.
    • AutoSSH
      • Fix an issue where single quotes would be displayed in the user input box.
    • Misc
      • Work around a kernel bug causing packet filtering to fail in some tools. Thank you @adde88!
      • Remove PHP from the firmware.

    6.1 Change Log:

    • General
      • Fix an issue where modules would not be listed when attempting to download them from the LAN Turtle module repository.

    6.0 Change Log:

    • General
      • Update base firmware from OpenWRT 15.05 to 19.07.
      • Improve 3G connectivity for 3G LAN Turtle.
    • Modules
      • Fix install issues with QuickCreds.

     

    - The Hak5 Development Team

  4. Hi!

    Alongside our WiFi Pineapple and LAN Turtle firmware release, we're happy to announce firmware 3.0 for the Packet Squirrel. This update, like the LAN Turtle's, features an up-to-date kernel, firmware base and packages, including nmap, tcpdump and OpenVPN.

    Change Log 3.2:

    • General
      • Fix an issue affecting package installation and signature verification.
    • Misc
      • Work around a kernel bug causing packet filtering to fail in some tools. Thank you @adde88!
      • Remove PHP from the firmware.

    Change Log 3.1:

    • General
      • Fix an issue where NTFS and VFAT formatted USB storage devices would not be detected properly.
    • Misc
      • Fix an issue where the C2 Client would not auto-start.

    Change Log 3.0:

    • General
      • Update base firmware from OpenWRT 15.05 to 19.07.
      • Update kernel from 3.18.84 to 4.14.133.
    • Packages
      • OpenVPN package now supports LZ4-V2 compression.

     

    To update your Packet Squirrel, grab the latest firmware from the Hak5 Download Portal and follow the Upgrade Instructions.

    - The Hak5 Development Team

  5. Hi,

    Just wanted to clear up any chance of misinterpretation on what is connected to Hak5 servers, etc.

    The WiFi Pineapple Web Interface that you refer to is stored on the WiFi Pineapple itself, and is served from it's own web server locally. The WiFi Pineapple UI will reach out to Hak5 owned services, but only if you explicitly want it to do so. Things such as updating the firmware, downloading modules and loading bulletins will initiate a connection to our servers. The buttons in the UI that do this are marked with such 'warnings' (basically just so you're aware it will be reaching out, if you're on an engagement).

    This goes for all of our hardware products.

    The Cloud C2 is different from that however, and will for licensing purposes and updates reach out to our infrastructure periodically. The news/bulletins on the Cloud C2 homepage is also hosted on our servers.

    I hope this answers any questions. We don't acquire any data (for example, client reports from engagements as you mention).

    • Upvote 2
  6. Hi everyone,

    We're very happy to announce the release of the 1.6 Firmware for the Bash Bunny. This firmware packs a few new features and bug fixes, as well as support for the Metasploit tools package.

    Change Log:

    • Fix an issue where APT would not work correctly due to now invalid feeds.
    • Add the Debian Stretch APT feeds.
    • Include Ruby 2.3.3 by default.
    • Update Bunny Extensions to the latest available via GitHub.
    • Include languages for BE, BR, CA-FR, CA, CH, CZ, DE, DK, ES-LA, ES, FI, FR, GB, HR, IT, MX, NO, PT, SE, SI and SK.
    • Add support for the Metasploit Framework tool.
    • Add ATTACKMODE ARMING.

     

    You can also find the new Metasploit tools package on the tools forum post

    You can update your Bash Bunny to version 1.6 by using the Bash Bunny Updater.

    Thank you to everyone who tried out the beta test! We're looking forward to seeing feedback from the community :)

    Cheers,
    Foxtrot

    • Like 1
    • Upvote 1
  7. 56 minutes ago, Mr.miYagi said:

    .....now im on 18.06.02 and kinda of official release......

    Hi everyone, I just wanted to chime in quickly and clarify that the OpenWRT trunk builds for the NANO are not compatible with the Mark V, nor are they 'official' (read: the firmware that we provide to users of the WiFi Pineapple). There are other differences between the Mark V and NANO in both software and hardware that make them incompatible with eachother. The OpenWRT trunk NANO builds also lack any of the software that we ship in actual official releases by Hak5.

    Happy hacking :)

    • Upvote 1
  8. 9 hours ago, gam35guru said:

    Man oh man ... am I just being an utter moron here or is this nano device even capable of WPS hacking using wifite or airgeddon?

    Im attempting to crack my other network using a pixie dust attack using reaver but everytime I choose my interface (the pineapple nano) which is eth1 it says its not a wifi device so cannot perform wifi hack?   I mean isn't this the reason I bought the darn thing in the first place?   And if it DOESNT do that then why the heck did I buy it over the other 3 wifi dongles I already own that already do the job?

    So in short ... without the rant ..... what am I doing wrong please?   This is stressing me out completely ..... Im trying to get the ball rolling so I can start my darn ethical hacking course and I bought a nano thinking it would be pplug n play and plenty of support but since Ive had it Ive received no help or response from emails or the forums.  I was led to believe the Hak5 community was helpful.  Anyone?  Please?   Just a glimmer of hope would be nice ..... Im stuck in an endless cycle of uninstalling Kali and trying to reinstall and then following the setup (which goes well) but once I get back to the guts of it all again and attempting my first WPS attack it just denies me and tells me wifi pineapple Nano is NOT capable of monitor mode cos it isn't a wifi card ...... OF COURSE IT IS ... IT HAS FRICKING AERIALS STICKING OUT OF IT?!?!?!?!?!?

    Argh give me strength....... please guys .... enlighten a newbie.   I beg you.

    It sounds like you're expecting the nano to enumerate on your computer as a wireless card... that's not what the Pineapple is.

    The WiFi Pineapple is its own embedded Linux system with two wireless radios of its own, which is why it has the antennas sticking out of it.

    The Ethernet interface you are seeing is actually (USB) Ethernet. That's how you would manage the Pineapple.

    Also, there's no need to make multiple posts on the same issue.

  9. 17 hours ago, akmartinez said:

    You can buy what you can afford now and upgrade the RAM later.  Unless it's an Apple product or another vendor that likes to solder their memory in place you should be able to open up the case and add or replace/upgrade the memory.  I've done it with my IBM/Lenovo ThinkPads without fail.  Wish I could do it with my MacBook Pro.

    Not with the XPS 13 you can't.

  10. 11 minutes ago, Just_a_User said:

    Blue = Unknown MAC prefix - Black is a sucsessful OUI lookup

    This isn't quite right. Blue text for MAC addresses is an indicator that the MAC may be randomised by the discovered device. You can see more detail if you hover over that text.

    46 minutes ago, Spoonish said:

    And the Out of Range Clients, Are they connected Clients and APs that I can reach with my equiptment but their equiptment but they can’t reach me with theirs?

    Out of Range clients are stations that your Pineapple has seen previously but is now no longer seeing any probes for. 

    • Like 3
×
×
  • Create New...