Jump to content

TwistedPacket

Active Members
  • Posts

    63
  • Joined

  • Last visited

Posts posted by TwistedPacket

  1. I just flashed my Pineapple to 2.8.1 good news Karma works! Bad news is that if I plug in anything into the usb port my Pineapple reboots within 2 minutes It also will not start with anything in the usb port.

    Any help would be great!

    -Tp

  2. I have a problem.. Here is my setup...

    Pineapple running Karma (wlan0) added this MAC to Whitelist

    Pineapple connecting to internet through Raspberry PI running Kali. Pi connects to internet via wireless to my iPhone. No problems there. I get an ip on the Pineapple etc.. internet works, karma works etc...

    I also whitelisted the MAC of the iPhone hotspot.

    When I click start to start the death it disconnects everthing connected to the Pineapple even though I whitelisted WLAN0 MAC.

    My Pi's connection to the iPhone stays connected however (as it should as it is also whitelisted)

    In the whitelisting txt window it looks like:

    ______________________

    #iPhone

    00:01:02:03:04:05

    #Pineapple

    01:02:03:04:05:06

    _______________________

    In the blacklisting windows it looks like:

    _______________________

    #Every AP

    [a-zA-Z0-9]*

    _______________________

    My wlan1 interface that I'm putting in to monitor mode is an Alfa AWUS036NH.

    I'm confused.... :/

    Update:

    It seems that once I start the jammer wlan0 interface goes down. I was running airodump-ng on my kali laptop. It was displaying my Pineapple's ESSID up until about 5 seconds after I ran jammer on Wlan1 Mon0.

    So, it's not deauthing me. It seems it shutting down WLAN0. Any ideas?

    Try to blacklist just one AP as a test. Also use a powered Hub on Wlan1 that fixed my issue with Wlan0 shutting down

    -Tp

  3. echo '1' > /proc/sys/net/ipv4/ip_forward

    arpspoof -i wlan0 -t 192.168.1.45 192.168.1.1 & > /dev/null

    arpspoof -i wlan0 -t 192.168.1.1 192.168.1.45 & > /dev/null

    urlsnarf -i wlan0

    Most new wireless routers have some type of AntiArpSpoofing protection so it might not work at all. I am seeing every network I work on now have this all ready enabled so Arp spoofing is becoming a thing of the past.

    -Tp

  4. If you turn the Pineapple into a client and connect to the same AP other clients are connected to you must force them to route through your pineapple / Computer for it to work

    So it can work like this:

    Target User ----> Pineapple -----> MitM Attack ------> internet.

    Or:

    User -----> Computer ------ MitM Arrack ----> Pineapple -------> internet

    You have to have Arp Spoofing on wired networks so that you take over the routers IP an route requests through you.

    For a MitM attack to work you have to get yourself in the middle.

    -Tp

  5. I think there is a missunderstanding here, TwistedPacket.

    WallE wants to connect the pineapple to his router using WPA and then use the Pineapple's tools to explore the network.

    To answer your question, this is entirely possible:

    Use the networkmanager infusion from the Pineapple bar to connect to your AP.

    Now, simply use the tools as you would on any computer connected to said AP.

    Its entirely possible that I misunderstood the question :)

    However for the main tools to run would you not need to have MITM access so the victim is routing through your pineapple? The way I would do this type of attack is as fallows. First if the AP supports it I would turn the target AP into a client and have it connect to the Pineapple for its internet access. Or if the target AP supports openwrt I would flash the AP then install the tools on the target AP.

    If you want to use the Pineapple only you would need to have the pineapple connect as a client to the target AP and perform some Arp posing to force a MITM type of attack. PLEASE correct me if I am wrong :)

    -Tp

×
×
  • Create New...