Jump to content

bytedeez

Active Members
  • Posts

    338
  • Joined

  • Last visited

  • Days Won

    5

Everything posted by bytedeez

  1. Did the update a few times. Intalling modules works sometimes other times it will not load installable module list. Attempted factory reset from gui. Would not load page. So I reflashed from command. Now I just have a solid red and green light. No way to connect via wifi. Radios not active maybe? Doing this from mobile. EDIT: I'm obviously doing something wrong. Tried reformatting the sd card and loading 2.4 firmware on it but i still just get the solid red and green light. Where is the info for recovering from a bad flash without serial? It seems the MK5 has no support left on the wiki or wifipineapple.com
  2. As the tittle says i am curious as to the answer, since the hardware is designed for openwrt i would think the regulations wouldn't apply. Also if anyone needs to get around this lockout, start here: https://forum.openwrt.org/viewtopic.php?id=63123 and here: http://www.shadowandy.net/2015/03/flashing-tp-link-tl-wr703n-v1-7-to-openwrt.htm
  3. A good way to check what infusions / modules are avalible for the nano is my looking here https://forums.hak5.org/index.php?/forum/90-nano-tetra-modules/
  4. bytedeez

    USB Phishing

    Concerning you signature, i believe his name is "Groot" my good friend.
  5. bytedeez

    USB Phishing

    Cooper is always the man but he really nailed it on this one! I have a friend who would you the macro exploit and place flies on a usb drive named "exam" / "mid term key" / answers" , then he would go place them around the all girls college campus. Do not underestimate the power of SE.
  6. Due to not wanting to spoil it, i will pm you (if that's cool with you), i already tried using a configuration that was compatible with openssh and in returned I was locked out via ssh.
  7. After many years I finally have an idea that i am capable of executing for the community. I do not want to spoil this so i will not release the details unless it is the only way to get the answers i am looking for. 1. What does the pineapple use for ssh? (DropBear?, openssh?) 2. Can someone point me in the right direction for information on KexAlgorithms for the pineapple?
  8. No Body knows or can point in the direction to figure this out?
  9. For whatever reason i can't figure out when trying to connect any device to my mobile hotspot I have to set DNS to use 8.8.8.8. How do i do this on the Mark V? I can't provide service through my mobile or download any infusions without setting the MKV to use a different dns. I figured it was under /etc/config/network but i know it is better to ask before i get in there and start breaking things. Also If i do set this manually will it affect the DNS spoofing capabilities? I know if i have my laptop is set to manually use 8.8.8.8 i can't access my piratebox since the piratebox uses DNS spoof (at least that's my conclusion), i figured it would be different for the MKV since it would be the host not the client. And if anyone has had this issue with their carrier / hotspot and know a solution that would be awesome, the geniuses over at AT&T pretend that I am speaking a different language when i spoke to their "tech support" about this issue. It has not always had this issue, but one day, it just started. EDIT: I figured i might need to add, the DNS Changer infusion did not and caused me to do a hard reset in order for me to gain access to my Mark V.
  10. Well even though i am disappointed, I do understand that the Mark V was Hak5's first major release that was built from the ground up in the Wifi Pineapple series and that it was a learning experience for you guys as well as us. I just don't feel that i got as much use out of it as expected due to changes in wifi security and other factors that your aware of as well as my learning curve and when purchased i was hoping it would be a solid platform that could be upgraded and built upon on a user level. As i am sure you are aware i know several people complained that due to changes in the wifi security landscape that the mark V just didn't have the same spark as the Mark IV. Has Hak5 considered hiring freelance developers to help? (Seb does a great job and is a mad genius but sometimes it takes a few extra head with different experience to really get the juices flowing.) Also since i mentioned learning curve and i know i am not the only person who has one. I know you guys are doing the Red Team training, but it been mentioned by me and others about offering something online as well. Although i am not sure about prices but Udemy makes a great platform for this and since most all your students will be directly refereed to by Hak5 they would only take a 15% cut for sue of their platform. Just a thought. Anyway i look forward to seeing what these knew products and software brings to the field and Thank you for your fast response.
  11. I generally try not to be that guy but this time i must. When the Mark V was released one of the points you, Darren, sold us on was the expansion bay and "future pineapple slices". So far this makes at least 3 major products released by Hak5 and not a single "Pineapple Slice".
  12. besides the obvious stuff such as Form factor, mobility and ports. Are there any solid performance advantages in using the Nano vs the mark V? Are there features exclusively to the software of the Nano not available on the Mark 5?
  13. you obviously missed the keywords in my reply:
  14. In my expeirence getting the iso straight from the server was going to take about 3 hours. While obtaining via torrent is only taking about 1hour and 20 mins.
  15. Also Yeti, is the new thing. BiDiBlah is outdated.
  16. It's more complicated then just "updating sslstrip". Hsts completely changed the game. I don't have time to explain it but just know that basically you can use this from your linux machine to strip ssl. https://github.com/sensepost/mana Not all the tools are available for openwrt yet which is why it's not possible with a pineapple alone. (Dns2proxy). For more info please search the forums, their has been plenty of threads covering this topic.
  17. I do see his point. Unfortunately things have changed since the mkIV, just remember that it's a cat and mouse game and a little SE can go along way and Within ever policy there is a vulnerability, the trick is to find it and exploit it. Just give it time.
  18. Foxtrot might be on to something but it also sounds like you might have accidently deleted some necessary files needed to run scripts.
  19. Too funny! Which one of us should clue him in? ;)
  20. as idiotic as this sounds. I am actually surprised and alittle jealous, one drunken and very good night, a few friends and myself tried to replicate serveral senerios that we read online where a battery exploded or caught on fire. ubfortunately 9or fotunately depending on how you look at it) We was unsucessful 9/10 times. What as the tempature the device was being stored at? Was it stored in a hot car during the dat at all?
  21. Author dicusses how to build and makes a valid point as to why the talk was cancelled. http://hackaday.com/2015/07/14/how-to-build-a-proxyham-despite-a-cancelled-defcon-talk/
  22. I get what your saying. but here's my question would really need to query the state of the device because I am really a amateur when it comes to this and code in general but I don't believe query the state of the device is possible without modifying the cheap 433mhz socket. Wouldn't it make more sense to modify the code to remember the last action made on the WebUI?
  23. Yes, in less technical words. but also I want to know if anyone has better code they use. The community's input is desires.
  24. That maybe true but a zip lock bag only cost .05.
×
×
  • Create New...