-
Posts
338 -
Joined
-
Last visited
-
Days Won
5
Posts posted by bytedeez
-
-
Awesome! WTG!
-
Concerning the new features:
I noticed that from my spare android phone (samsung galaxy exhibit) that auto Harvester is not picking up my APs that should be broadcasting.
I've tried disabling and re-enabling the different features in various order as well as wlan1.
I don't think it's all in the features as AV will pick some from pc. But not all.
-
Gotcha, well just some food for thought in case their is so lightweight ways of going about it or for the mk6 possibly
-
Ok since we can switch between reconnaissance and infusions in the UI.
Right now the recon tab only has one application, what not expand on the idea of recon with the pineapple and categorize the infusions in the pineapple bar and webUI based on the UI.
Example: with recon selected from the drop down menu in the UI. You would see small tiles of installed infusions for recon. Like:
GET
networktools
Nmap
Sitesurvey
The current recon application.
And so on..
And under the current tab currently labeled as infusions have infusions such as: Deauth, random roll, sslsplit, urlsnarf. If I get a chance I will draw up a visual for better explanation.
-
It'd be really cool if there was an option in the Web interface to be able to create and install infusions based on the type of infusion.
I.E. recon infusions: instaled and only viewable when reconnaissance is selected.
-
My main concern for this infusion would be how it would interact or possibly conflict with the new features.
-
found some scripts for it here. http://www.ukhoneynet.org/2008/06/03/p0f-208-on-openwrt/
Not really a developer or i would do this myself.
-
its completely possible, you can even set it up with wiggle and and google maps / openstreet map.
You should check out snoopy and creepyDOL.
-
You can also try to disable and the re - enable the wlan0 interface . That's what I have to do.
-
Why not a pineapple thong for the ladies? Talk about a selfish gift to our GFs
-
If I'm not mistaken metasploitable linux is a distro designed just for "hacking".
-
Although some of you might have thought a support thread for pineAP was silly. Let's not forget that we are called a community for a reason. The thread was created for us to give support to each other, having all the information in one thread to make issues and solutions easier to find makes things easier and more organized rather than scrolling through a bunch of different threads that get lost in the shuffle. Plus having a thread for support rather than a bug report, takes some of the load off Seb and others in the community, especially when it's a issue that had been answered. So if nothing else maybe pin* a thread where all questions and concerns can be answered or linked.
-
After upgrading I could receive the test text but could not get the pineapple to respond to my commands when sending smser a text.
I kept getting datetime errors.
Here is a copy of the logs:
22:29:05.448717 - Checking for messages...
22:29:05.802111 - You've got mail
22:29:05.922876 - Error fetching messages: type object 'datetime.datetime' has no attribute 'datetime'
22:29:05.930282 - No more messages. Will check again in 54 seconds
22:30:00.461935 - Checking for messages...
22:30:00.771926 - You've got mail
22:30:00.910317 - Error fetching messages: type object 'datetime.datetime' has no attribute 'datetime'
22:30:00.917322 - No more messages. Will check again in 37 seconds
Any help would be appreciated!
-
It's available on youtube. However the audio is poor. Him and Seb will be doing a proper release via Google hangouts soon.
-
Ah Ha! For whatever reason Pineapple still wasn't working as described above. Decided to re - flash and it seemed to fix my issue.
However I do not see all ssid that my device should be probing for show up.
-
I would of like to have seen it filmed and then uploaded. Like any of your shows but eh, hindsight is 20-20.
-
As far as how it is done I couldn't tell you. But basically they take off the shelves Atheros based routers modify the firmware and resignal them to other frequencies for secure, cost effective communications.
-
Thanks Bobjones!I am just playing the middle on it. If this is real, I personally don't mind his actions. It's kinda charismatic.
-
Cool, thanks for explaining Darren! from my test it seemed like it would only rebroadcast surrounding APs. Myself and the rest of the community is highly grateful for all of yours, Sebs and the rest of the crew's hard work!
Hope your enjoying Defcon!
-
Well honestly for $300 if it comes close I would still buy. I mean to do the same with the hackRF it would require me to purchase 2 of them.
As far as his attack on Ettus, he is the uunderdog, so it's expected.
-
Without a doubt he has a vendetta against ettus. What I'm concerned about is if he is actually offering a genuine gsm capable sdr transceiver and does his advertising match the quality of the product.
-
damavox,
I happened to stumble across this, and I wanted to caution you. "WindyCitySDR" is an ex-con named Martin O'Shield. He has spent a good part of the last couple years aggressively attacking Ettus Research, Range Networks, and the RTLSDR, OpenBTS and GNU Radio Communities, etc for unknown reasons.
He has been particularly aggressive toward Ettus employees for some reason; so I would certainly take anything he says about that company with a large grain of salt... for example, the post he listed above is from the OpenBTS mailing list; and was addressed by multiple Ettus employees and stemmed from the original author being confused about the frequency accuracy of the included oscillator. B2xx work just fine for OpenBTS provided you deal with the frequency offset (not hard). Just about the entire community is very pleased with Ettus products - the only real downside is the cost.
I don't know why he has chosen the software radio community to pollute, but we all wish he would go away! Nobody in the community takes him seriously but he does present a very poor image for us. Of course, it's up to you but I felt compelled to give you a heads up.
- GNU Radio Community Member
Thanks Bobjones for a heads up. Ettus is a favorite among Pros. Can Someone who isn't new to this forum back up this claim?
-
From my understanding the new firmware offers the ability to collect SSIDs of currently broadcasting APs and shows which clients are connected to them. It also can take those SSIDs and rebroadcast them in order to aid in karma attacks.
My question is this:
Wouldn't it make more sense if the recon section picks up ssids from client side probe request and then offers the ability to rebroadcast them?
I mean if you are sitting at one location you can already determine what APs are around and set the pineapple to rebroadcast those SSIDs.
Gaining SSIDs from clients would allow you to collect SSIDs of APs from other locations and rebroadcast them.
-
Figured i would start this as i know the HAK5 team is busy
Kali users should check this out
in Security
Posted
https://code.google.com/p/lazykali/