janekong
-
Posts
67 -
Joined
-
Last visited
Posts posted by janekong
-
-
Yes, I tried that tons of times. But it simply refuses to connect.
Is there any 'advanced debugging' option???
What are the instructions to manually connect?
What does this mean btw?
Pineapple kern.info kernel: [ 269.890000] wlan1: deauthenticating from (router MAC address) by local choice (reason=3)
Could you please follow the simplified usage and see if it works for you ?
-
Still not working for me.... It simply does not connect to my wifi router. No lease, failing''
-
Can't download it from pineapple bar. Get error.
-
i try to connect to the WPA2 router with the real internet.
What does this mean?
00:00:58 Pineapple user.info sysinit: wpa_supplicant_setup_vif(wlan1): Refusing to bridge sta mode interface
00:00:58 Pineapple user.info sysinit: enable_mac80211(radio1): Failed to set up wpa_supplicant for interface wlan1Logs:
00:01:06 Pineapple user.info sysinit: setting up led WLAN
00:01:06 Pineapple user.info sysinit: setting up led WAN
00:01:06 Pineapple user.info sysinit: setting up led USB
00:01:06 Pineapple user.info sysinit: setting up led LAN
00:01:06 Pineapple daemon.info dnsmasq[1673]: using nameserver 8.8.8.8#53
00:01:06 Pineapple daemon.info dnsmasq[1673]: using nameserver 195.241.77.58#53
00:01:06 Pineapple daemon.info dnsmasq[1673]: using nameserver 195.241.77.55#53
00:01:06 Pineapple daemon.info dnsmasq[1673]: using nameserver 192.168.1.254#53
00:01:06 Pineapple daemon.info dnsmasq[1673]: using local addresses only for domain lan
00:01:06 Pineapple daemon.info dnsmasq[1673]: using local addresses only for domain lan
00:01:06 Pineapple daemon.info dnsmasq[1673]: started, version 2.62 cachesize 150
00:01:06 Pineapple daemon.info dnsmasq[1673]: reading /tmp/resolv.conf.auto
00:01:06 Pineapple daemon.info dnsmasq[1673]: read /etc/hosts - 1 addresses
00:01:06 Pineapple daemon.info dnsmasq[1673]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack
00:01:06 Pineapple daemon.info dnsmasq-dhcp[1673]: read /etc/ethers - 0 addresses
00:01:06 Pineapple daemon.info dnsmasq-dhcp[1673]: DHCP, IP range 172.16.42.100 -- 172.16.42.249, lease time 12h
00:01:05 Pineapple user.notice root: Mobile.Keepalive: Still Redialing...
00:01:03 Pineapple user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
00:01:03 Pineapple user.notice dnsmasq: Allowing 127.0.0.0/8 responses
00:00:59 Pineapple authpriv.info dropbear[1606]: Running in background
00:00:58 Pineapple user.info sysinit: wpa_supplicant_setup_vif(wlan1): Refusing to bridge sta mode interface
00:00:58 Pineapple user.info sysinit: enable_mac80211(radio1): Failed to set up wpa_supplicant for interface wlan1
00:00:58 Pineapple cron.info crond[1587]: crond: crond (busybox 1.19.4) started, log level 5
00:00:56 Pineapple user.info sysinit: command failed: Device or resource busy (-16)
00:00:55 Pineapple user.notice root: Mobile.Keepalive: Still Redialing...
00:00:55 Pineapple user.notice ifup: Allowing Router Advertisements on wan (eth1)
00:00:55 Pineapple kern.info kernel: [ 55.600000] br-lan: port 2(wlan0) entered forwarding state
00:00:53 Pineapple kern.info kernel: [ 53.600000] br-lan: port 2(wlan0) entered forwarding state
00:00:53 Pineapple kern.info kernel: [ 53.590000] br-lan: port 2(wlan0) entered forwarding state
00:00:53 Pineapple kern.info kernel: [ 53.530000] device wlan0 entered promiscuous mode
00:00:53 Pineapple daemon.notice netifd: wan (935): Sending select for 192.168.1.39...
00:00:53 Pineapple daemon.notice netifd: wan (935): Sending discover...
00:00:53 Pineapple daemon.notice netifd: wan (935): Lease of 192.168.1.39 obtained, lease time 86400
00:00:53 Pineapple daemon.notice netifd: Interface 'wan' is now up
00:00:51 Pineapple user.notice ifup: Enabling Router Solicitations on loopback (lo)
00:00:50 Pineapple kern.info kernel: [ 50.290000] eth1: link up (100Mbps/Full duplex)
00:00:50 Pineapple daemon.notice netifd: wan (935): Sending discover...
00:00:48 Pineapple user.notice ifup: Enabling Router Solicitations on lan (br-lan)
00:00:47 Pineapple daemon.notice netifd: wan (935): Sending discover...
00:00:46 Pineapple kern.info kernel: [ 46.480000] device eth0 entered promiscuous mode
00:00:46 Pineapple daemon.notice netifd: wan (935): udhcpc (v1.19.4) started
00:00:46 Pineapple daemon.notice netifd: Interface 'loopback' is now up
00:00:46 Pineapple daemon.notice netifd: Interface 'lan' is now up
00:00:45 Pineapple user.notice root: Mobile.Keepalive: Still Redialing...
00:00:44 Pineapple user.notice usb-modeswitch: 1-1:1.0: Manufacturer=ATHEROS Product=UB91C Serial=12345
00:00:44 Pineapple user.notice root: Mobile.Keepalive: Preventing Duplicate Self.
00:00:44 Pineapple kern.info kernel: [ 44.410000] usbserial: USB Serial Driver core
00:00:44 Pineapple kern.info kernel: [ 44.410000] usbcore: registered new interface driver usbserial_generic
00:00:44 Pineapple kern.info kernel: [ 44.400000] usbcore: registered new interface driver usbserial
00:00:44 Pineapple kern.info kernel: [ 44.400000] USB Serial support registered for generic
00:00:44 Pineapple kern.info kernel: [ 44.240000] usbcore: deregistering interface driver usbserial
00:00:44 Pineapple kern.info kernel: [ 44.230000] usbcore: deregistering interface driver usbserial_generic
00:00:44 Pineapple kern.info kernel: [ 44.230000] USB Serial deregistering driver generic
00:00:43 Pineapple user.notice usb-modeswitch: 1-0:1.0: Manufacturer=Linux_3.3.8_ehci_hcd Product=Generic_Platform_EHCI_Controller Serial=ehci-platform
00:00:43 Pineapple kern.info kernel: [ 43.470000] usbserial: USB Serial Driver core
00:00:43 Pineapple kern.info kernel: [ 43.470000] usbcore: registered new interface driver usbserial_generic
00:00:43 Pineapple kern.info kernel: [ 43.460000] usbcore: registered new interface driver usbserial
00:00:43 Pineapple kern.info kernel: [ 43.460000] USB Serial support registered for generic
00:00:43 Pineapple kern.info kernel: [ 43.410000] usbcore: deregistering interface driver usbserial
00:00:43 Pineapple kern.info kernel: [ 43.400000] usbcore: deregistering interface driver usbserial_generic
00:00:43 Pineapple kern.info kernel: [ 43.400000] USB Serial deregistering driver generic
00:00:40 Pineapple kern.warn kernel: [ 0.680000] m25p80 spi0.0: found mx25l6405d, expected m25p80
00:00:40 Pineapple kern.notice kernel: [ 2.940000] Bridge firewalling registered
00:00:40 Pineapple kern.notice kernel: [ 0.750000] 0x0000007f0000-0x000000800000 : "art"
00:00:40 Pineapple kern.notice kernel: [ 0.750000] 0x000000050000-0x0000007e0000 : "firmware"
00:00:40 Pineapple kern.notice kernel: [ 0.740000] 0x0000007e0000-0x0000007f0000 : "nvram"
00:00:40 Pineapple kern.notice kernel: [ 0.740000] 0x000000650000-0x0000007e0000 : "kernel"
00:00:40 Pineapple kern.notice kernel: [ 0.730000] 0x000000590000-0x000000650000 : "rootfs_data"
00:00:40 Pineapple kern.notice kernel: [ 0.720000] mtd: partition "rootfs" set to be root filesystem
00:00:40 Pineapple kern.notice kernel: [ 0.710000] 0x000000050000-0x000000650000 : "rootfs"
00:00:40 Pineapple kern.notice kernel: [ 0.710000] 0x000000040000-0x000000050000 : "u-boot-env"
00:00:40 Pineapple kern.notice kernel: [ 0.700000] 0x000000000000-0x000000040000 : "u-boot"
00:00:40 Pineapple kern.notice kernel: [ 0.690000] Creating 7 MTD partitions on "spi0.0":
00:00:40 Pineapple kern.notice kernel: [ 0.690000] 7 cmdlinepart partitions found on MTD device spi0.0
00:00:40 Pineapple kern.info kernel: [ 39.540000] ieee80211 phy1: Atheros AR9271 Rev:1
00:00:40 Pineapple kern.info kernel: [ 39.530000] ath9k_htc 1-1:1.0: ath9k_htc: FW Version: 1.3
00:00:40 Pineapple kern.info kernel: [ 39.340000] ath9k_htc 1-1:1.0: ath9k_htc: HTC initialized with 33 credits
00:00:40 Pineapple kern.info kernel: [ 39.100000] usb 1-1: ath9k_htc: Transferred FW: htc_9271.fw, size: 51272
00:00:40 Pineapple kern.info kernel: [ 38.840000] usbcore: registered new interface driver rndis_host
00:00:40 Pineapple kern.info kernel: [ 38.610000] usbcore: registered new interface driver cdc_ether
00:00:40 Pineapple kern.info kernel: [ 38.520000] usbserial: USB Serial Driver core
00:00:40 Pineapple kern.info kernel: [ 38.510000] usbcore: registered new interface driver usbserial_generic
00:00:40 Pineapple kern.info kernel: [ 38.510000] USB Serial support registered for generic
00:00:40 Pineapple kern.info kernel: [ 38.500000] usbcore: registered new interface driver usbserial
00:00:40 Pineapple kern.info kernel: [ 38.160000] usbcore: registered new interface driver ath9k_htc
00:00:40 Pineapple kern.info kernel: [ 38.150000] usb 1-1: ath9k_htc: Firmware htc_9271.fw requested
00:00:40 Pineapple kern.info kernel: [ 37.660000] xt_time: kernel timezone is -0000
00:00:40 Pineapple kern.info kernel: [ 36.960000] nf_conntrack version 0.5.0 (458 buckets, 1832 max)
00:00:40 Pineapple kern.info kernel: [ 36.830000] NET: Registered protocol family 24
00:00:40 Pineapple kern.info kernel: [ 36.600000] ip_tables: © 2000-2006 Netfilter Core Team
00:00:40 Pineapple kern.info kernel: [ 36.340000] tun: Universal TUN/TAP device driver, 1.6
00:00:40 Pineapple kern.info kernel: [ 36.340000] tun: © 1999-2004 Max Krasnyansky
00:00:40 Pineapple kern.info kernel: [ 36.190000] PPP generic driver version 2.4.2
00:00:40 Pineapple kern.info kernel: [ 35.840000] RPC: Registered tcp NFSv4.1 backchannel transport module.
00:00:40 Pineapple kern.info kernel: [ 35.830000] RPC: Registered udp transport module.
00:00:40 Pineapple kern.info kernel: [ 35.830000] RPC: Registered tcp transport module.
00:00:40 Pineapple kern.info kernel: [ 35.820000] RPC: Registered named UNIX socket transport module.
00:00:40 Pineapple kern.info kernel: [ 35.570000] Button Hotplug driver version 0.4.1
00:00:40 Pineapple kern.info kernel: [ 35.560000] cfg80211: (5490000 KHz - 5710000 KHz @ 40000 KHz), (N/A, 2700 mBm)
00:00:40 Pineapple kern.info kernel: [ 35.550000] cfg80211: (5250000 KHz - 5330000 KHz @ 40000 KHz), (N/A, 2000 mBm)
00:00:40 Pineapple kern.info kernel: [ 35.540000] cfg80211: (5170000 KHz - 5250000 KHz @ 40000 KHz), (N/A, 2000 mBm)
00:00:40 Pineapple kern.info kernel: [ 35.530000] cfg80211: (2402000 KHz - 2482000 KHz @ 40000 KHz), (N/A, 2000 mBm)
00:00:40 Pineapple kern.info kernel: [ 2.950000] VFS: Mounted root (squashfs filesystem) readonly on device 31:2.
00:00:40 Pineapple kern.info kernel: [ 2.940000] 8021q: 802.1Q VLAN Support v1.8
00:00:40 Pineapple kern.info kernel: [ 2.930000] TCP cubic registered
00:00:40 Pineapple kern.info kernel: [ 2.930000] NET: Registered protocol family 17
00:00:40 Pineapple kern.info kernel: [ 2.920000] ag71xx ag71xx.0: eth1: connected to PHY at ag71xx-mdio.1:04 [uid=004dd041, driver=Generic PHY]
00:00:40 Pineapple kern.info kernel: [ 2.370000] eth1: Atheros AG71xx at 0xb9000000, irq 4
00:00:40 Pineapple kern.info kernel: [ 1.330000] eth0: Found an AR7240/AR9330 built-in switch
00:00:40 Pineapple kern.info kernel: [ 0.780000] eth0: Atheros AG71xx at 0xba000000, irq 5
00:00:40 Pineapple kern.info kernel: [ 0.780000] ag71xx_mdio: probed
00:00:40 Pineapple kern.info kernel: [ 0.720000] mtd: partition "rootfs_data" created automatically, ofs=590000, len=C0000
00:00:40 Pineapple kern.info kernel: [ 0.680000] m25p80 spi0.0: mx25l6405d (8192 Kbytes)
00:00:40 Pineapple kern.err kernel: [ 38.730000] Error: Driver 'gpio-keys-polled' is already registered, aborting...
00:00:40 Pineapple kern.debug kernel: [ 39.550000] Registered led device: ath9k_htc-phy1
00:00:40 Pineapple kern.debug kernel: [ 39.540000] ath: doing EEPROM country->regdmn map search
00:00:40 Pineapple kern.debug kernel: [ 39.540000] ath: country maps to regdmn code: 0x37
00:00:40 Pineapple kern.debug kernel: [ 39.540000] ath: Regpair used: 0x37
00:00:40 Pineapple kern.debug kernel: [ 39.540000] ath: EEPROM regdomain: 0x833a
00:00:40 Pineapple kern.debug kernel: [ 39.540000] ath: EEPROM indicates we should expect a country code
00:00:40 Pineapple kern.debug kernel: [ 39.540000] ath: Country alpha2 being used: GB@qualcomm.com> -
My router only supports:
WPA2 CCMP
PSK
I can't select CCMP (tried AES and TKIP) in the network manager.
So, the pineapple does not connect.
Tried a '[DHCP Request]'
I checked the logs. The connection does not show up
And why should you set ICS to share from none to none?
System logs:
udhcpc (v1.19.4) started
Sending discover...
Sending discover...
Sending discover...
No lease, failingsecond try:
Pineapple kern.info kernel: [ 269.890000] wlan1: deauthenticating from ff:ff:ff:ff:ff:24 by local choice (reason=3)
What does that mean by local choice??
-
What does that cost?
Many people, including myself, have the Anker A3, very good 10000mha battery, comes with lots of adaptors and stuff too
-Foxtrot
-
What do you think about the cheap mtec external batteries on ebay? Are they any good? Or should I buy the more expensive ones? Like the
Anker Astro Pro2 20000mAh or the Intocircuit® Power Castle PC26000 26000mAh
-
Where do I select it in the GUI? I can't find it.
Could you make some screenshots, please?
I do use the awus036nha from the hak5shop.
You just select available access point select your SSID and put in the password. Then click DHCP request at the top. Are you doing that and its still not working? If so what is happening?
-
That does not work for me however... I do use the Alfa usb card.
But it does not connect to the real WPA2 hotspot (with the real internet).
I've had trouble with the network manager myself.
The best way I've found to connect lets say an Alfa usb card to an encrypted network is to boot up the pineapple after its booted plug in the alfa card. (I wait tell the pineapple boots before I plug it in so I know the Alfa will be on wlan1 not wlan0)
I run airmon-ng start wlan1 to bring up monitor mode (because 90% of the time I still wanna scan the area to see whats going on) I would run airodump mon0 just to wake up the card. I find if I just try to connect to my WPA2 network it doesn't always work unless I run airodump first.
Now to connect to a WPA2 network you wanna edit your WPA_supplicant.conf its located inside /etc/ with something simple like
network={
ssid=" yourssid "
psk= yourpassword
}Once your WPA_supplicant is set up you can run wpa_supplicant. I use this little script. (I mostly stole from the forms) That will run wpa_supplicant set ipforwarding clear your iptables and set them then run udhcpc to get a dhcp request.
#!/bin/sh
wpa_supplicant -B -D nl80211 -i wlan1 -c /etc/wpa_supplicant.conf
echo 1 > /proc/sys/net/ipv4/ip_forward
iptables -F
iptables -X
iptables -A FORWARD -o wlan1 -i br-lan -s 172.16.0.0/24 -m conntrack --ctstate NEW -jACCEPT
iptables -A FORWARD -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
iptables -A POSTROUTING -t nat -j MASQUERADE
sleep 6
udhcpc -i wlan1Assuming you're using the nl80211 driver that should work if not you can just look at wpa_supplicant --help to see other driver options.
-
I have network manager working. But I don't see how it allows me to connect to real wifi.
How do I make the USB wireless adapter connect to a WPA2 password protected real wifi hotspot?
-
I have network manager working. But I don't see how it allows me to connect to real wifi.
How do I make the USB wireless adapter connect to a WPA2 password protected real wifi hotspot?
-
@Sebkinne:
How does the Pineapple actually download the files from this list? Or do I need to figure that out myself?
This link does not work.
sslstrip|2.9|whistlemaster|sslstrip interface|7|c06ac5487cf486bd0ef9bdbe5658d23f#
networkmanager|1.9|whistlemaster|Network Manager|11|ccfa2d257faf65862998fe92cf246b28#
urlsnarf|2.8|whistlemaster|urlsnarf interface|7|fddddadde7c3dda649beb5bc3cb3e7f1#
jammer|3.1|whistlemaster|WiFi Jammer|8|e3161ba65c32c7e62a2eb334d6b1b007#
randomroll|3.2|petertfm|Rick, Nyan, Rainbow, PBJ, Afro, Trololo, Tubes, BSoD and Rick Trap 2.7 UP|7359|26183375bc10f3b95d63992df1d396ad#
sitesurvey|2.6|whistlemaster|WiFi Site Survey|9|ad78b857525962685bc76279f526a247#
mitm|1.3|whistlemaster|Man-in-the-middle interface|111|d824d1ef84179faa42ddf71ed8ed554b#
dnsspoof|1.6|whistlemaster|dnsspoof interface|6|4a85df55d08416bcfcbf2e2b264413bf#
nmap|2.4|whistlemaster|nmap interface|6|7064a320903deef69cae7e30f0bbedfc#
tcpdump|2.4|whistlemaster|tcpdump interface|6|584f49271c24152bf783ae533ebae224#
ettercap|1.5|whistlemaster|ettercap interface|8|051d995ec78ba7d155a9cadcd1ad2180#
reaver|0.4|hackrylix|Reaver module|9|8b80f217c5a6bcc241d5cacfba1a5115#
status|1.4|whistlemaster|Pineapple Status|44|37e525cc85bd57082668c6cf5d036877#
opkgmanager|2.3|whistlemaster|OPKG Manager|43|9c47a66d6a750628916d824a38dea18f#
uwui|1.0|whistlemaster|New Web Interface for Hacking Functionalities by Moriarty|404|ac859d5052ff2c670c32ac1fe98466d2#
keylogger|1.1|whistlemaster|A JS keylogger injected via a proxy. 2.7.5 and up.|112|154dc2f5cd86bedf972d716ffe607f95#
logcheck|2.3|whistlemaster|Monitor logs on pineapple|7|4a88e2471a1cb6f7d1ab2ee44dec28c6#
button|2.5|whistlemaster|Change WPS button behaviour|5|39587f64479e0fe1c7decd4d32294711#
monitor|2.3|whistlemaster|Monitor bandwidth usage on all interfaces|7|3fb7aa283079e1b041c685228e699103#
blacklister|2.7|petertfm|Black/White listing for MACs and SSIDs.|6|53972eb6eea5f3967f3b0441391317f9#
occupineapple|1.6|whistlemaster|Occupineapple based on Darren Kitchen concept|13|0d344799b7295e9f94531180b1447e48#
bartender|2.2|sebkinne|Module creator|2|b27df51c7a3de0aff28b4d46d85e59d8#
eviljava|2.4|dustbyter|This infusion enables to send a malicious signed jar that loads and opens a metasploit connection back to your listener.|109|2870ce7c3f1c01bf8f8d6159cd45a2d5#
get|2.3|dustbyter|Module to get information about client connecting. Information includes plugins installed in browser.|7|269699936d44c16d995e7a419aaf9cb6#
smser|1.1|newbi3|Control your pineapple with a text message.|5|ee2d20f0d3f20268e2123fc685fda179#
iptools|1.1|computerchris|This Infusion was created to make subnetting easier. The next release will have more features.|2|c2a2d7198e775a877b976705d5328378# -
Not working... It is essentially trying to download a piece of code. Could someone (@Sebkinne!) tell me which code it is trying to download for networkmanager infusions and in which folder I have to place it?
janekong,
Plug your pineapple directly into your router...(I believe it should be the POE/LAN port. If that doesn't work try the other one.) Make sure you're using a usb thumb drive, formatted properly of course, for installation of the infusions. The pineapple has very limited on board space.
-
Is there an pineapple interface for this as well?
There is a ready script that implements the attack Hole 196 ( http://www.slideshare.net/MdSohailAhmad/wpa-toohole196defcon18presentation )?
-
I can't install them through the web UI:
"Available Infusions
Error connecting!
Please make sure you have an internet connection."I do have an internet connection and I tried to share the internet with the pineapple.(internet connection sharing was enabled)But I couldn't get the pineapple online.How to fix this? Can I install the infusions manually? -
How do you install the network manager infusion? I don't see a download button anywhere.
Can I install the infusion manually? I can't install it when using the web UI.
Installed InfusionsThere are no infusions installed.Available InfusionsError connecting!
Please make sure you have an internet connection.PS: I DO HAVE INTERNET CONNECTION, BUT THE PINEAPPLE DOES NOT RECOGNIZE MY GREAT INTERNET CONNECTION.Yes, that is the correct card.
For routing, try the Networkmanager Infusion.
I don't know what you mean about the Karma attack. What autoconnection are you talking about? On the clients? The answer is not really.
I am assuming you mean the AWUS036nha? It is better to do it the other way around - use that card to supply internet to the pineapple and keep using the internal card for Karma / Jasager.
The best way to do this is download the Networkmanager infusion and use that to set everything up!
Please don't make multiple threads on the same subject. I have merged the two.
Best Regards,
Sebkinne
-
I would recommend flashing over SSH, if that is still possible however: http://www.youtube.com/watch?v=mf8Q-COyQM8
And I prefer this tutorial: http://www.youtube.com/watch?v=5SAnsjuJmXE (part 1) and http://www.youtube.com/watch?v=tJjkDxt7V1g (part 2), because there are more detailed.
-
I would recommend flashing over SSH, if that is still possible however: http://www.youtube.com/watch?v=mf8Q-COyQM8
And I prefer this tutorial: http://www.youtube.com/watch?v=5SAnsjuJmXE (part 1) and http://www.youtube.com/watch?v=tJjkDxt7V1g (part 2), because they are more detailed.
@Mr-Protocol: You might want to mentions those tutorials about flashing using an usb cable on your wiki as well...
-
@deathdealerxx: That video says that the RX and TX labels on the usbcard are mislabeled. This is probably not the case. But it sounds confusing. Why do you need to connect it in this way:
For non-Alfa Console Board hookup
UART RX Pin —– Hornet TX Pin
UART TX Pin —– Hornet RX PinCould you explain that?
@Mr-Protocol: I would prefer the USB solution. Your video does only provides a serial port solution. But my computer does not have a serial port.
No, that adapter can be used alone with the hornet-ub board and with the alfa board.
http://www.youtube.com/watch?v=5SAnsjuJmXE
make sure if you have the hornet-ub board to only hook up the RX, TX , and ground. then you'll have to plug in the 12v dc wall adapter to power your pineapple.
Hope this helps -
Since the pineapple is a flashed version of an AP121U if I am corrected? Why is it valued at 99 dollar.
$54.98 At amazon:http://www.amazon.com/150Mbps-Portable-Wireless-802-11n-Support/dp/B00A8E4I42
And around $50 dollars at ebay.
-
Does that thing require an Alfa board?
-
That is not the usb cable solution. That is the serial cable solution.... What was the solution without the alfa board?
-
Which serial to USB solution do you recommend?
Dear hfam,
"There is absolutely no way I'd pay $30 (or even $3) for that Alfa board"
Why? In your solution [PC > TrendNet Cable > Gender Changer > Alfa Board] you still need an Alfa board.
That makes your comment look completely irrational.
-
I read a very very confusing conversation here: http://forums.hak5.o...flash-a-hornet/
Can you flash using USB?
Do you need an UART adapter?
Or doesn't it work. Will it really fry your device? 'Both Darren and Seb have fried either boards or the adapters while developing.'
very confusing....
Could Darren and Seb comment on the 'it will fry your device' part?
PS: What is a safe way to open the Pineapple MARK IV without damaging the case?
WiFi Manager
in Mark IV Infusions
Posted · Edited by janekong
00:00:58 Pineapple user.info sysinit: wpa_supplicant_setup_vif(wlan1): Refusing to bridge sta mode interface
00:00:58 Pineapple user.info sysinit: enable_mac80211(radio1): Failed to set up wpa_supplicant for interface wlan1
[sploier]