Jump to content

SixKids

Active Members
  • Posts

    33
  • Joined

  • Last visited

Recent Profile Visitors

697 profile views

SixKids's Achievements

Newbie

Newbie (1/14)

  1. OK, I've updated my Wifi Pineapple to the Shiny new 2.2 Firmware, but I've not seen any Infusions for the other apps. Can anyone tell me when they should be released?
  2. Mr-Protocol is most correct. MAC Addresses are 'normally' preconfigured for the hardware at the Factory. We can 'Spoof' the Address, but in doing so, a momentary restart is required.
  3. Yeah, I guess you are right. Friends don't let friend use Internet Exploder.
  4. OK, I have successfully DeAuthed myself from a WPA2 access point, but only by switching access points. Can a Deauth signal deauth everyone from a WPA2 AP?
  5. Second question, I have multiple APs (all WPA2), while my neighbors don't (yet).. The issues is that I selected one of the APs in the Recon Mode, and added it to the PineAP SSID Management List. I am Running Karma. I cleared the PineAP SSID Management List, restarted Karma, and noticed the following in the Karma Log: Jan 18 20:43:15 KARMA: ESSID found in black list mode so not accepting the probe Jan 18 20:43:15 KARMA: Match found, leaving loop Jan 18 20:43:15 KARMA: Checking ESSID WhaleFamily against WhaleFamily Jan 18 20:43:15 KARMA: ESSID found in black list mode so not accepting the probe Jan 18 20:43:15 KARMA: Match found, leaving loop Jan 18 20:43:15 KARMA: Checking ESSID WhaleFamily against WhaleFamily Jan 18 20:42:53 KARMA: ESSID found in black list mode so not accepting the probe Jan 18 20:42:53 KARMA: Match found, leaving loop Jan 18 20:42:53 KARMA: Checking ESSID WhaleFamily against WhaleFamily Jan 18 20:42:53 KARMA: ESSID found in black list mode so not accepting the probe Jan 18 20:42:53 KARMA: Match found, leaving loop Jan 18 20:42:53 KARMA: Checking ESSID WhaleFamily against WhaleFamily Why? If I add the AP from Recon Mode, is is supposed to be added to a 'Black List' as well? Thanks.
  6. Can the DeAuth tool in the Recon mode DeAuth clients that are associated with a WPA2 AP? (I cannot seem to do this, therefore I am asking).
  7. Problem Resolved. Micro SD missing, and also needed to use the Chrome browser to access the Pineapple. I hope that this helps someone else as well. Thank you.
  8. I have been using the Wifi Pineapple for quite a while, and decided to upgrade to the newest PineAP 2.2 release. It would have appeared that there was something wrong with the upgrade, which I allowed to run for Two hours. At which time I had the Green LED solid, and the Blue LED Flashing. I tried to Factory Rest the Pineapple using the Wiki page, and also tried to UnBrick the Pineapple as well. All of these gproceedures lead me to the same result, the Green LED solid, and the Blue LED Flashing. So I am looking for a suggestion as to what to try next. Suggestions?
  9. Tried to flash with 2.2 and after two hours I was only seeing a green light, and flashing Blue light. I tried factory reset, that did not work. I tried to unbrick, and while I was able to communicate and get the firmware laded, the end result is still a Pineapple with a green LED and a flashing Blue LED. Suggestions?
  10. Thanks Newbie, I have that much. I am attempting to automate theis now from the Dip Switches. So far I have the following: ifconfig wlan1 up; iwlist wlan1 scan; iwconfig wlan1 essid "SSID" key "pass-phrase" However, I am greeted with the fllowing from the command line: ifconfig wlan1 up; iwlist wlan1 scan; iwconfig wlan1 essid "UN ITE-5038" key "98240575" wlan1 Scan completed : Cell 05 - Address: 08:BD:43:57:50:38 Channel:11 Frequency:2.462 GHz (Channel 11) Quality=70/70 Signal level=-4 dBm Encryption key:on ESSID:"UNITE-5038" Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 6 Mb/s; 9 Mb/s 11 Mb/s; 12 Mb/s; 18 Mb/s Bit Rates:24 Mb/s; 36 Mb/s; 48 Mb/s; 54 Mb/s Mode:Master Extra:tsf=00000004cf664c7f Extra: Last beacon: 40ms ago IE: Unknown: 000A554E4954452D35303338 IE: Unknown: 010882848B0C12961824 IE: Unknown: 03010B IE: Unknown: 0706555320010B1B IE: Unknown: 2A0100 IE: Unknown: 32043048606C IE: Unknown: 2D1A2C0000FF00000000000000000000000000000000000000000000 IE: Unknown: 3D160B000000000000000000000000000000000000000000 IE: IEEE 802.11i/WPA2 Version 1 Group Cipher : CCMP Pairwise Ciphers (1) : CCMP Authentication Suites (1) : PSK IE: Unknown: DD180050F2020101000003A4000027A4000042435E0062322F00 IE: Unknown: DD730050F204104A00011010440001021057000101103B000103104700108887E6F34A6E5A459B4C0CB88926D016102100085155414C434F4D4D10230006415236303078102400012010420001201054000800060050F2040001101100074152364B2D415010080002238E1049000600372A000120 Error for wireless request "Set Encode" (8B2A) : SET failed on device wlan1 ; Invalid argument. root@Pineapple:~# The Access Point list above is the one I am attempting to connect with. Since it is using a PSK, (WPA2), is the iwconfig command still applicable?
  11. I have the Pineapple Plug, and have updated the second to be able to communicate through the first Pineapple. The problem that I have now is that with both of the Pineapple in the Pineapple Plug, I cannot access them via Ethernet (it's now a closed ETHERNET network). So the issue is that I either need to have an automatic startup of the Wireless network (clientmode), or I need to be able to access the Pineapples via the USB connection. So, how do you get the Pineapple to connect via clientmode to a predefiend AP?
  12. Seems that the proximity of the device was not permitting the connection. I have gotten this to work. Thank you.
  13. Darren, I am not having good success with PineAP (2.0.4) and the AWUS036NEH. It will not associate for client mode (at least not for me). What Cmmand line access would you recommend for testing? Thank you.
  14. I am using the ALFA USB AWUS036NEH to attempt to connect to my AT&T Wifi Hotspot. I am using the Network GUI, and trying to set up the Client mode. Unfortunately the connection Hangs, and I cannot see what error is being sent. I can connect via SSH, what command line can I use to attempt to connect WLAN2 to a nearby AT&T Unite Personal Hot Spot? Thank you. BTW, this is using the latest Firmware 2.0.4
  15. Interesting enough, I have found the following: # lsusb Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 001 Device 004: ID 058f:6254 Alcor Micro Corp. USB Hub Bus 001 Device 005: ID 0bda:8187 Realtek Semiconductor Corp. RTL8187 Wireless Adapter Bus 001 Device 006: ID 058f:6366 Alcor Micro Corp. Multi Flash Reader Bus 001 Device 008: ID 1199:9053 Sierra Wireless, Inc. So in reading the USB Modeswitch information, I found the following diretory: root@Pineapple:/etc/usb_modeswitch.d# root@Pineapple:/etc/usb_modeswitch.d#ls -la 1199\:0fff -rw-r--r-- 1 root root 375 Nov 4 10:03 1199:0fff root@Pineapple:/etc/usb_modeswitch.d# Adding the 9053 Product code to the 1199:0fff reference file, MAY help to identify the information??? Anyone out there familiar with USB Mode Switch?
×
×
  • Create New...