Jump to content

slyd0g

Active Members
  • Posts

    5
  • Joined

  • Last visited

Posts posted by slyd0g

  1. Hey everyone,

    As I am sure most of you know, ssl-strip is basically useless on any modern browser or operating system since all have been updated to use HSTS. The guys at Sensepost were able to defeat HSTS using a modified version of ssl-strip as part of their MANA Rogue-AP system.

    https://github.com/sensepost/mana/tree/master/sslstrip-hsts

    Any chance of this getting implemented on the Pineapple? As of now I am barely picking up any credentials unless people are submitting via unencrypted HTTP posts.

  2. Hey guys, I followed the instructions at the bottom of this page https://wifipineapple.com/?flashing for unbricking the pineapple. I downloaded the stager, set the pineapple to a static IP address of 192.168.1.2. Powered it on and navigated to 192.168.1.1 and made it to the MK5 Recovery Page. I selected the stager.bin and uploaded it, then nothing happens, even after 15-20 minutes, my browser just says "Connecting to 192.168.1.1".

    Could someone offer me some advice or help please?

  3. Hey guys, I would like to go about creating a payload for the Rubber Ducky that pretty much does the same thing as the

    *RunEXE from SD* payload but on OSX using a .JAR file. How would I do this? The payload for EXE files on windows uses a batch file that waits for the SD card to be mounted but OSX doesn't use batch files? Sorry for my inexperience, I am both a Windows and a Kali user but need this payload for penetration testing on Macs.

    I think the only alternative would be to open a OSX backdoor and download and run the file in terminal. I would rather not resort to this though because if I was trying to install on multiple machines I would have to change the listening port every time to download the file. A little more time consuming and inefficient compared to a straight SD card transfer and run.

×
×
  • Create New...