Jump to content

janekong

Active Members
  • Posts

    67
  • Joined

  • Last visited

Posts posted by janekong

  1. 00:00:58 Pineapple user.info sysinit: wpa_supplicant_setup_vif(wlan1): Refusing to bridge sta mode interface

    00:00:58 Pineapple user.info sysinit: enable_mac80211(radio1): Failed to set up wpa_supplicant for interface wlan1

    [sploier]

    I've had trouble with the network manager myself.

    The best way I've found to connect lets say an Alfa usb card to an encrypted network is to boot up the pineapple after its booted plug in the alfa card. (I wait tell the pineapple boots before I plug it in so I know the Alfa will be on wlan1 not wlan0)

    I run airmon-ng start wlan1 to bring up monitor mode (because 90% of the time I still wanna scan the area to see whats going on) I would run airodump mon0 just to wake up the card. I find if I just try to connect to my WPA2 network it doesn't always work unless I run airodump first.

    Now to connect to a WPA2 network you wanna edit your WPA_supplicant.conf its located inside /etc/ with something simple like

    network={

    ssid=" yourssid "

    psk= yourpassword

    }

    Once your WPA_supplicant is set up you can run wpa_supplicant. I use this little script. (I mostly stole from the forms) That will run wpa_supplicant set ipforwarding clear your iptables and set them then run udhcpc to get a dhcp request.

    #!/bin/sh

    wpa_supplicant -B -D nl80211 -i wlan1 -c /etc/wpa_supplicant.conf

    echo 1 > /proc/sys/net/ipv4/ip_forward

    iptables -F

    iptables -X

    iptables -A FORWARD -o wlan1 -i br-lan -s 172.16.0.0/24 -m conntrack --ctstate NEW -jACCEPT

    iptables -A FORWARD -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT

    iptables -A POSTROUTING -t nat -j MASQUERADE

    sleep 6

    udhcpc -i wlan1

    Assuming you're using the nl80211 driver that should work if not you can just look at wpa_supplicant --help to see other driver options.

    [/sploier]
  2. Yes, I tried that tons of times. But it simply refuses to connect.

    Is there any 'advanced debugging' option???

    What are the instructions to manually connect?

    What does this mean btw?

    Pineapple kern.info kernel: [ 269.890000] wlan1: deauthenticating from (router MAC address) by local choice (reason=3)

    Could you please follow the simplified usage and see if it works for you ?

  3. i try to connect to the WPA2 router with the real internet.

    What does this mean?

    00:00:58 Pineapple user.info sysinit: wpa_supplicant_setup_vif(wlan1): Refusing to bridge sta mode interface
    00:00:58 Pineapple user.info sysinit: enable_mac80211(radio1): Failed to set up wpa_supplicant for interface wlan1

    Logs:

    00:01:06 Pineapple user.info sysinit: setting up led WLAN
    00:01:06 Pineapple user.info sysinit: setting up led WAN
    00:01:06 Pineapple user.info sysinit: setting up led USB
    00:01:06 Pineapple user.info sysinit: setting up led LAN
    00:01:06 Pineapple daemon.info dnsmasq[1673]: using nameserver 8.8.8.8#53
    00:01:06 Pineapple daemon.info dnsmasq[1673]: using nameserver 195.241.77.58#53
    00:01:06 Pineapple daemon.info dnsmasq[1673]: using nameserver 195.241.77.55#53
    00:01:06 Pineapple daemon.info dnsmasq[1673]: using nameserver 192.168.1.254#53
    00:01:06 Pineapple daemon.info dnsmasq[1673]: using local addresses only for domain lan
    00:01:06 Pineapple daemon.info dnsmasq[1673]: using local addresses only for domain lan
    00:01:06 Pineapple daemon.info dnsmasq[1673]: started, version 2.62 cachesize 150
    00:01:06 Pineapple daemon.info dnsmasq[1673]: reading /tmp/resolv.conf.auto
    00:01:06 Pineapple daemon.info dnsmasq[1673]: read /etc/hosts - 1 addresses
    00:01:06 Pineapple daemon.info dnsmasq[1673]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack
    00:01:06 Pineapple daemon.info dnsmasq-dhcp[1673]: read /etc/ethers - 0 addresses
    00:01:06 Pineapple daemon.info dnsmasq-dhcp[1673]: DHCP, IP range 172.16.42.100 -- 172.16.42.249, lease time 12h
    00:01:05 Pineapple user.notice root: Mobile.Keepalive: Still Redialing...
    00:01:03 Pineapple user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
    00:01:03 Pineapple user.notice dnsmasq: Allowing 127.0.0.0/8 responses
    00:00:59 Pineapple authpriv.info dropbear[1606]: Running in background
    00:00:58 Pineapple user.info sysinit: wpa_supplicant_setup_vif(wlan1): Refusing to bridge sta mode interface
    00:00:58 Pineapple user.info sysinit: enable_mac80211(radio1): Failed to set up wpa_supplicant for interface wlan1
    00:00:58 Pineapple cron.info crond[1587]: crond: crond (busybox 1.19.4) started, log level 5
    00:00:56 Pineapple user.info sysinit: command failed: Device or resource busy (-16)
    00:00:55 Pineapple user.notice root: Mobile.Keepalive: Still Redialing...
    00:00:55 Pineapple user.notice ifup: Allowing Router Advertisements on wan (eth1)
    00:00:55 Pineapple kern.info kernel: [ 55.600000] br-lan: port 2(wlan0) entered forwarding state
    00:00:53 Pineapple kern.info kernel: [ 53.600000] br-lan: port 2(wlan0) entered forwarding state
    00:00:53 Pineapple kern.info kernel: [ 53.590000] br-lan: port 2(wlan0) entered forwarding state
    00:00:53 Pineapple kern.info kernel: [ 53.530000] device wlan0 entered promiscuous mode
    00:00:53 Pineapple daemon.notice netifd: wan (935): Sending select for 192.168.1.39...
    00:00:53 Pineapple daemon.notice netifd: wan (935): Sending discover...
    00:00:53 Pineapple daemon.notice netifd: wan (935): Lease of 192.168.1.39 obtained, lease time 86400
    00:00:53 Pineapple daemon.notice netifd: Interface 'wan' is now up
    00:00:51 Pineapple user.notice ifup: Enabling Router Solicitations on loopback (lo)
    00:00:50 Pineapple kern.info kernel: [ 50.290000] eth1: link up (100Mbps/Full duplex)
    00:00:50 Pineapple daemon.notice netifd: wan (935): Sending discover...
    00:00:48 Pineapple user.notice ifup: Enabling Router Solicitations on lan (br-lan)
    00:00:47 Pineapple daemon.notice netifd: wan (935): Sending discover...
    00:00:46 Pineapple kern.info kernel: [ 46.480000] device eth0 entered promiscuous mode
    00:00:46 Pineapple daemon.notice netifd: wan (935): udhcpc (v1.19.4) started
    00:00:46 Pineapple daemon.notice netifd: Interface 'loopback' is now up
    00:00:46 Pineapple daemon.notice netifd: Interface 'lan' is now up
    00:00:45 Pineapple user.notice root: Mobile.Keepalive: Still Redialing...
    00:00:44 Pineapple user.notice usb-modeswitch: 1-1:1.0: Manufacturer=ATHEROS Product=UB91C Serial=12345
    00:00:44 Pineapple user.notice root: Mobile.Keepalive: Preventing Duplicate Self.
    00:00:44 Pineapple kern.info kernel: [ 44.410000] usbserial: USB Serial Driver core
    00:00:44 Pineapple kern.info kernel: [ 44.410000] usbcore: registered new interface driver usbserial_generic
    00:00:44 Pineapple kern.info kernel: [ 44.400000] usbcore: registered new interface driver usbserial
    00:00:44 Pineapple kern.info kernel: [ 44.400000] USB Serial support registered for generic
    00:00:44 Pineapple kern.info kernel: [ 44.240000] usbcore: deregistering interface driver usbserial
    00:00:44 Pineapple kern.info kernel: [ 44.230000] usbcore: deregistering interface driver usbserial_generic
    00:00:44 Pineapple kern.info kernel: [ 44.230000] USB Serial deregistering driver generic
    00:00:43 Pineapple user.notice usb-modeswitch: 1-0:1.0: Manufacturer=Linux_3.3.8_ehci_hcd Product=Generic_Platform_EHCI_Controller Serial=ehci-platform
    00:00:43 Pineapple kern.info kernel: [ 43.470000] usbserial: USB Serial Driver core
    00:00:43 Pineapple kern.info kernel: [ 43.470000] usbcore: registered new interface driver usbserial_generic
    00:00:43 Pineapple kern.info kernel: [ 43.460000] usbcore: registered new interface driver usbserial
    00:00:43 Pineapple kern.info kernel: [ 43.460000] USB Serial support registered for generic
    00:00:43 Pineapple kern.info kernel: [ 43.410000] usbcore: deregistering interface driver usbserial
    00:00:43 Pineapple kern.info kernel: [ 43.400000] usbcore: deregistering interface driver usbserial_generic
    00:00:43 Pineapple kern.info kernel: [ 43.400000] USB Serial deregistering driver generic
    00:00:40 Pineapple kern.warn kernel: [ 0.680000] m25p80 spi0.0: found mx25l6405d, expected m25p80
    00:00:40 Pineapple kern.notice kernel: [ 2.940000] Bridge firewalling registered
    00:00:40 Pineapple kern.notice kernel: [ 0.750000] 0x0000007f0000-0x000000800000 : "art"
    00:00:40 Pineapple kern.notice kernel: [ 0.750000] 0x000000050000-0x0000007e0000 : "firmware"
    00:00:40 Pineapple kern.notice kernel: [ 0.740000] 0x0000007e0000-0x0000007f0000 : "nvram"
    00:00:40 Pineapple kern.notice kernel: [ 0.740000] 0x000000650000-0x0000007e0000 : "kernel"
    00:00:40 Pineapple kern.notice kernel: [ 0.730000] 0x000000590000-0x000000650000 : "rootfs_data"
    00:00:40 Pineapple kern.notice kernel: [ 0.720000] mtd: partition "rootfs" set to be root filesystem
    00:00:40 Pineapple kern.notice kernel: [ 0.710000] 0x000000050000-0x000000650000 : "rootfs"
    00:00:40 Pineapple kern.notice kernel: [ 0.710000] 0x000000040000-0x000000050000 : "u-boot-env"
    00:00:40 Pineapple kern.notice kernel: [ 0.700000] 0x000000000000-0x000000040000 : "u-boot"
    00:00:40 Pineapple kern.notice kernel: [ 0.690000] Creating 7 MTD partitions on "spi0.0":
    00:00:40 Pineapple kern.notice kernel: [ 0.690000] 7 cmdlinepart partitions found on MTD device spi0.0
    00:00:40 Pineapple kern.info kernel: [ 39.540000] ieee80211 phy1: Atheros AR9271 Rev:1
    00:00:40 Pineapple kern.info kernel: [ 39.530000] ath9k_htc 1-1:1.0: ath9k_htc: FW Version: 1.3
    00:00:40 Pineapple kern.info kernel: [ 39.340000] ath9k_htc 1-1:1.0: ath9k_htc: HTC initialized with 33 credits
    00:00:40 Pineapple kern.info kernel: [ 39.100000] usb 1-1: ath9k_htc: Transferred FW: htc_9271.fw, size: 51272
    00:00:40 Pineapple kern.info kernel: [ 38.840000] usbcore: registered new interface driver rndis_host
    00:00:40 Pineapple kern.info kernel: [ 38.610000] usbcore: registered new interface driver cdc_ether
    00:00:40 Pineapple kern.info kernel: [ 38.520000] usbserial: USB Serial Driver core
    00:00:40 Pineapple kern.info kernel: [ 38.510000] usbcore: registered new interface driver usbserial_generic
    00:00:40 Pineapple kern.info kernel: [ 38.510000] USB Serial support registered for generic
    00:00:40 Pineapple kern.info kernel: [ 38.500000] usbcore: registered new interface driver usbserial
    00:00:40 Pineapple kern.info kernel: [ 38.160000] usbcore: registered new interface driver ath9k_htc
    00:00:40 Pineapple kern.info kernel: [ 38.150000] usb 1-1: ath9k_htc: Firmware htc_9271.fw requested
    00:00:40 Pineapple kern.info kernel: [ 37.660000] xt_time: kernel timezone is -0000
    00:00:40 Pineapple kern.info kernel: [ 36.960000] nf_conntrack version 0.5.0 (458 buckets, 1832 max)
    00:00:40 Pineapple kern.info kernel: [ 36.830000] NET: Registered protocol family 24
    00:00:40 Pineapple kern.info kernel: [ 36.600000] ip_tables: © 2000-2006 Netfilter Core Team
    00:00:40 Pineapple kern.info kernel: [ 36.340000] tun: Universal TUN/TAP device driver, 1.6
    00:00:40 Pineapple kern.info kernel: [ 36.340000] tun: © 1999-2004 Max Krasnyansky
    00:00:40 Pineapple kern.info kernel: [ 36.190000] PPP generic driver version 2.4.2
    00:00:40 Pineapple kern.info kernel: [ 35.840000] RPC: Registered tcp NFSv4.1 backchannel transport module.
    00:00:40 Pineapple kern.info kernel: [ 35.830000] RPC: Registered udp transport module.
    00:00:40 Pineapple kern.info kernel: [ 35.830000] RPC: Registered tcp transport module.
    00:00:40 Pineapple kern.info kernel: [ 35.820000] RPC: Registered named UNIX socket transport module.
    00:00:40 Pineapple kern.info kernel: [ 35.570000] Button Hotplug driver version 0.4.1
    00:00:40 Pineapple kern.info kernel: [ 35.560000] cfg80211: (5490000 KHz - 5710000 KHz @ 40000 KHz), (N/A, 2700 mBm)
    00:00:40 Pineapple kern.info kernel: [ 35.550000] cfg80211: (5250000 KHz - 5330000 KHz @ 40000 KHz), (N/A, 2000 mBm)
    00:00:40 Pineapple kern.info kernel: [ 35.540000] cfg80211: (5170000 KHz - 5250000 KHz @ 40000 KHz), (N/A, 2000 mBm)
    00:00:40 Pineapple kern.info kernel: [ 35.530000] cfg80211: (2402000 KHz - 2482000 KHz @ 40000 KHz), (N/A, 2000 mBm)
    00:00:40 Pineapple kern.info kernel: [ 2.950000] VFS: Mounted root (squashfs filesystem) readonly on device 31:2.
    00:00:40 Pineapple kern.info kernel: [ 2.940000] 8021q: 802.1Q VLAN Support v1.8
    00:00:40 Pineapple kern.info kernel: [ 2.930000] TCP cubic registered
    00:00:40 Pineapple kern.info kernel: [ 2.930000] NET: Registered protocol family 17
    00:00:40 Pineapple kern.info kernel: [ 2.920000] ag71xx ag71xx.0: eth1: connected to PHY at ag71xx-mdio.1:04 [uid=004dd041, driver=Generic PHY]
    00:00:40 Pineapple kern.info kernel: [ 2.370000] eth1: Atheros AG71xx at 0xb9000000, irq 4
    00:00:40 Pineapple kern.info kernel: [ 1.330000] eth0: Found an AR7240/AR9330 built-in switch
    00:00:40 Pineapple kern.info kernel: [ 0.780000] eth0: Atheros AG71xx at 0xba000000, irq 5
    00:00:40 Pineapple kern.info kernel: [ 0.780000] ag71xx_mdio: probed
    00:00:40 Pineapple kern.info kernel: [ 0.720000] mtd: partition "rootfs_data" created automatically, ofs=590000, len=C0000
    00:00:40 Pineapple kern.info kernel: [ 0.680000] m25p80 spi0.0: mx25l6405d (8192 Kbytes)
    00:00:40 Pineapple kern.err kernel: [ 38.730000] Error: Driver 'gpio-keys-polled' is already registered, aborting...
    00:00:40 Pineapple kern.debug kernel: [ 39.550000] Registered led device: ath9k_htc-phy1
    00:00:40 Pineapple kern.debug kernel: [ 39.540000] ath: doing EEPROM country->regdmn map search
    00:00:40 Pineapple kern.debug kernel: [ 39.540000] ath: country maps to regdmn code: 0x37
    00:00:40 Pineapple kern.debug kernel: [ 39.540000] ath: Regpair used: 0x37
    00:00:40 Pineapple kern.debug kernel: [ 39.540000] ath: EEPROM regdomain: 0x833a
    00:00:40 Pineapple kern.debug kernel: [ 39.540000] ath: EEPROM indicates we should expect a country code
    00:00:40 Pineapple kern.debug kernel: [ 39.540000] ath: Country alpha2 being used: GB@qualcomm.com>

  4. My router only supports:

    WPA2 CCMP

    PSK

    I can't select CCMP (tried AES and TKIP) in the network manager.

    So, the pineapple does not connect.

    Tried a '[DHCP Request]'

    I checked the logs. The connection does not show up

    And why should you set ICS to share from none to none?

    System logs:

    udhcpc (v1.19.4) started
    Sending discover...
    Sending discover...
    Sending discover...
    No lease, failing

    second try:

    Pineapple kern.info kernel: [ 269.890000] wlan1: deauthenticating from ff:ff:ff:ff:ff:24 by local choice (reason=3)

    What does that mean by local choice??

  5. What do you think about the cheap mtec external batteries on ebay? Are they any good? Or should I buy the more expensive ones? Like the

    Anker Astro Pro2 20000mAh or the Intocircuit® Power Castle PC26000 26000mAh

    http://www.amazon.com/Anker-20000mAh-Ultra-High-Multi-Voltage-Notebooks/dp/B00B45EOYS/ref=cm_cr_pr_product_top

    http://www.amazon.com/Intocircuit%C2%AE-26000mAh-External-Capacity-Notebooks/dp/B00BB5VQCE/ref=cm_cr_pr_product_top

  6. Where do I select it in the GUI? I can't find it.

    Could you make some screenshots, please?

    I do use the awus036nha from the hak5shop.

    You just select available access point select your SSID and put in the password. Then click DHCP request at the top. Are you doing that and its still not working? If so what is happening?

  7. That does not work for me however... I do use the Alfa usb card.

    But it does not connect to the real WPA2 hotspot (with the real internet).

    I've had trouble with the network manager myself.

    The best way I've found to connect lets say an Alfa usb card to an encrypted network is to boot up the pineapple after its booted plug in the alfa card. (I wait tell the pineapple boots before I plug it in so I know the Alfa will be on wlan1 not wlan0)

    I run airmon-ng start wlan1 to bring up monitor mode (because 90% of the time I still wanna scan the area to see whats going on) I would run airodump mon0 just to wake up the card. I find if I just try to connect to my WPA2 network it doesn't always work unless I run airodump first.

    Now to connect to a WPA2 network you wanna edit your WPA_supplicant.conf its located inside /etc/ with something simple like

    network={
    ssid=" yourssid "
    psk= yourpassword
    }

    Once your WPA_supplicant is set up you can run wpa_supplicant. I use this little script. (I mostly stole from the forms) That will run wpa_supplicant set ipforwarding clear your iptables and set them then run udhcpc to get a dhcp request.

    #!/bin/sh

    wpa_supplicant -B -D nl80211 -i wlan1 -c /etc/wpa_supplicant.conf

    echo 1 > /proc/sys/net/ipv4/ip_forward

    iptables -F
    iptables -X

    iptables -A FORWARD -o wlan1 -i br-lan -s 172.16.0.0/24 -m conntrack --ctstate NEW -jACCEPT
    iptables -A FORWARD -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
    iptables -A POSTROUTING -t nat -j MASQUERADE

    sleep 6

    udhcpc -i wlan1

    Assuming you're using the nl80211 driver that should work if not you can just look at wpa_supplicant --help to see other driver options.

  8. @Sebkinne:

    How does the Pineapple actually download the files from this list? Or do I need to figure that out myself?

    This link does not work.

    http://cloud.wifipineapple.com/index.php?modules&update&name=networkmanager&version=1.9&size=11&md5=ccfa2d257faf65862998fe92cf246b28

    sslstrip|2.9|whistlemaster|sslstrip interface|7|c06ac5487cf486bd0ef9bdbe5658d23f#
    networkmanager|1.9|whistlemaster|Network Manager|11|ccfa2d257faf65862998fe92cf246b28#
    urlsnarf|2.8|whistlemaster|urlsnarf interface|7|fddddadde7c3dda649beb5bc3cb3e7f1#
    jammer|3.1|whistlemaster|WiFi Jammer|8|e3161ba65c32c7e62a2eb334d6b1b007#
    randomroll|3.2|petertfm|Rick, Nyan, Rainbow, PBJ, Afro, Trololo, Tubes, BSoD and Rick Trap 2.7 UP|7359|26183375bc10f3b95d63992df1d396ad#
    sitesurvey|2.6|whistlemaster|WiFi Site Survey|9|ad78b857525962685bc76279f526a247#
    mitm|1.3|whistlemaster|Man-in-the-middle interface|111|d824d1ef84179faa42ddf71ed8ed554b#
    dnsspoof|1.6|whistlemaster|dnsspoof interface|6|4a85df55d08416bcfcbf2e2b264413bf#
    nmap|2.4|whistlemaster|nmap interface|6|7064a320903deef69cae7e30f0bbedfc#
    tcpdump|2.4|whistlemaster|tcpdump interface|6|584f49271c24152bf783ae533ebae224#
    ettercap|1.5|whistlemaster|ettercap interface|8|051d995ec78ba7d155a9cadcd1ad2180#
    reaver|0.4|hackrylix|Reaver module|9|8b80f217c5a6bcc241d5cacfba1a5115#
    status|1.4|whistlemaster|Pineapple Status|44|37e525cc85bd57082668c6cf5d036877#
    opkgmanager|2.3|whistlemaster|OPKG Manager|43|9c47a66d6a750628916d824a38dea18f#
    uwui|1.0|whistlemaster|New Web Interface for Hacking Functionalities by Moriarty|404|ac859d5052ff2c670c32ac1fe98466d2#
    keylogger|1.1|whistlemaster|A JS keylogger injected via a proxy. 2.7.5 and up.|112|154dc2f5cd86bedf972d716ffe607f95#
    logcheck|2.3|whistlemaster|Monitor logs on pineapple|7|4a88e2471a1cb6f7d1ab2ee44dec28c6#
    button|2.5|whistlemaster|Change WPS button behaviour|5|39587f64479e0fe1c7decd4d32294711#
    monitor|2.3|whistlemaster|Monitor bandwidth usage on all interfaces|7|3fb7aa283079e1b041c685228e699103#
    blacklister|2.7|petertfm|Black/White listing for MACs and SSIDs.|6|53972eb6eea5f3967f3b0441391317f9#
    occupineapple|1.6|whistlemaster|Occupineapple based on Darren Kitchen concept|13|0d344799b7295e9f94531180b1447e48#
    bartender|2.2|sebkinne|Module creator|2|b27df51c7a3de0aff28b4d46d85e59d8#
    eviljava|2.4|dustbyter|This infusion enables to send a malicious signed jar that loads and opens a metasploit connection back to your listener.|109|2870ce7c3f1c01bf8f8d6159cd45a2d5#
    get|2.3|dustbyter|Module to get information about client connecting. Information includes plugins installed in browser.|7|269699936d44c16d995e7a419aaf9cb6#
    smser|1.1|newbi3|Control your pineapple with a text message.|5|ee2d20f0d3f20268e2123fc685fda179#
    iptools|1.1|computerchris|This Infusion was created to make subnetting easier. The next release will have more features.|2|c2a2d7198e775a877b976705d5328378#

  9. Not working... It is essentially trying to download a piece of code. Could someone (@Sebkinne!) tell me which code it is trying to download for networkmanager infusions and in which folder I have to place it?

    janekong,

    Plug your pineapple directly into your router...(I believe it should be the POE/LAN port. If that doesn't work try the other one.) Make sure you're using a usb thumb drive, formatted properly of course, for installation of the infusions. The pineapple has very limited on board space.

  10. I can't install them through the web UI:

    "Available Infusions

    Error connecting!
    Please make sure you have an internet connection."
    I do have an internet connection and I tried to share the internet with the pineapple.(internet connection sharing was enabled)
    But I couldn't get the pineapple online.
    How to fix this? Can I install the infusions manually?
  11. How do you install the network manager infusion? I don't see a download button anywhere.

    Can I install the infusion manually? I can't install it when using the web UI.

    Installed Infusions
    There are no infusions installed.


    Available Infusions
    Error connecting!
    Please make sure you have an internet connection.
    PS: I DO HAVE INTERNET CONNECTION, BUT THE PINEAPPLE DOES NOT RECOGNIZE MY GREAT INTERNET CONNECTION.

    Yes, that is the correct card.

    For routing, try the Networkmanager Infusion.

    I don't know what you mean about the Karma attack. What autoconnection are you talking about? On the clients? The answer is not really.

    I am assuming you mean the AWUS036nha? It is better to do it the other way around - use that card to supply internet to the pineapple and keep using the internal card for Karma / Jasager.

    The best way to do this is download the Networkmanager infusion and use that to set everything up!

    Please don't make multiple threads on the same subject. I have merged the two.

    Best Regards,

    Sebkinne

  12. @deathdealerxx: That video says that the RX and TX labels on the usbcard are mislabeled. This is probably not the case. But it sounds confusing. Why do you need to connect it in this way:

    For non-Alfa Console Board hookup

    UART RX Pin —– Hornet TX Pin

    UART TX Pin —– Hornet RX Pin

    Could you explain that?

    @Mr-Protocol: I would prefer the USB solution. Your video does only provides a serial port solution. But my computer does not have a serial port.

    No, that adapter can be used alone with the hornet-ub board and with the alfa board.

    http://www.youtube.com/watch?v=5SAnsjuJmXE

    make sure if you have the hornet-ub board to only hook up the RX, TX , and ground. then you'll have to plug in the 12v dc wall adapter to power your pineapple.

    Hope this helps

  13. Which serial to USB solution do you recommend?

    Dear hfam,

    "There is absolutely no way I'd pay $30 (or even $3) for that Alfa board"

    Why? In your solution [PC > TrendNet Cable > Gender Changer > Alfa Board] you still need an Alfa board.

    That makes your comment look completely irrational.

  14. I read a very very confusing conversation here: http://forums.hak5.o...flash-a-hornet/



    Can you flash using USB?


    Do you need an UART adapter?


    Or doesn't it work. Will it really fry your device? 'Both Darren and Seb have fried either boards or the adapters while developing.'


    very confusing....



    Could Darren and Seb comment on the 'it will fry your device' part?



    PS: What is a safe way to open the Pineapple MARK IV without damaging the case?


×
×
  • Create New...