Jump to content

zz2Fac3zz

Active Members
  • Posts

    77
  • Joined

  • Last visited

  • Days Won

    2

Posts posted by zz2Fac3zz

  1. This is what happened to me! Except I can't even get a shell through serial. I've been running wifite but not through the dip switches and without a dictionary attack.(I think I may have shutdown the pineapple without completely closing wifite.) I was hoping if I let it sit unplugged for a day or two and try the serial cable again I'll at least get a shell...

  2. Haha Mr-Protocol I like you. Its Black-White-Green-None from left to right for those who are to lazy to RTFM.

    Unfortunately its not even attempting to boot. Putty doesn't see a thing lights don't flicker. So I guess the question is now, does anyone wanna buy a cheap pineapple paperweight?

  3. up, down, down, up up from left to right. Now it won't even respond to the dip switches I just get a power light and nothing else. I've never unplugged it in the middle of flashing or removed the SD card well it was on. I've tried different power and cable sources. I think it just died on me =(

    I have a usb to TTL serial cable I used to flash the mark 4 but I'm not sure if I even wanna mess with all that.

  4. You'll have an easier time if you just tell your pineapple to connect to your network through Wifi.

    That being said post your iwconfig and you shouldn't have eth0&eth1. Your pineapple is plugged directly into your computer correct and you only have one Ethernet card?

  5. So my Pineapple just stopped booting up all of the sudden. I'm using the wall power adapter. I've tried resetting system defaults, but after it loads the firmware I reboot and I just get a solid green light and cannot connect via Wifi or Ethernet. I've had my pineapple for more than a month so I don't think its eligible for an exchange. Any Ideas?

  6. You can run sslstrip manually by just SSHing into your pineapple.

    Flip your machine into forwarding mode. (should already be done by default)

    echo "1" > /proc/sys/net/ipv4/ip_forward

    Setup iptables to redirect HTTP traffic to sslstrip. (sslstrip default listenPort is 8080)

    iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port <listenPort>

    Run sslstrip.

    sslstrip -l <listenPort>

    Run arpspoof to convince a network they should send their traffic to you.

    arpspoof -i <interface> -t <targetIP> <gatewayIP>
  7. Well from what I've found (correct me if i'm wrong) its a little more difficult then it may seem at first, and i'll explain why.

    #For these examples I'm going to use wlan0 for people to connect to and wlan1 for your pineapple to connect to a wireless network.

    The way the sslstrip infusion works now is someone connects to the pineapple and the traffic goes from wlan0 -> wlan1 -> wirelessnetwork -> internet

    Because all the traffic is going through the pineapple its easy for the infusion to intercept the packets.

    Now what your trying to do is intercept traffic that isn't going though the pineapple but instead is already on a wireless network.

    In order to do that you need to redirect the traffic on the network to go thought the pineapple.

    You can redirect the traffic by SSHing into your pineapple and using ARPSpoof or Ettercap. But from what I've found is it becomes terrible slow and unstable.

  8. Nicely done. I was able to repeat what you did. Used wifite on the pineapple with -aircrack option, got the .cap file. I used the windows aircrack-ng to convert to .hccap, and now its running in hashcat just fine.

    I'm doing a straight attack, with about 12gb between 3 wordlists. (using best64 rule) I'm only getting about 14,500 H/s so this could take awhile. Like, most of next week. But, its working. That's great. So I'm guessing the .hccap files made this way could be uploaded to an online cracking center and actually work as well.

    I would guess the .hccap file will work with the online cracking center. Also I think you mentioned your using an nvidia card. I don't know why but the older nvidia drivers work a lot faster with hashcat. I think between 320.00 and 327.23 after and before that they are about half the speed.You can read more about it here. I have no idea why the newer drivers are slower at cracking passwords.

  9. Nope, sorry. I never converted a capture file to hccap, I have just (succesfully) used the cap file in aircrack-ng.

    When you used the .cap file from your pineapple with aircrack-ng was it able to actually crack the file? Because I've tried with the correct password in a smaller word list and aircrack didn't crack it. Unless of course the capture came from my laptop or pc then aircrack has no problem.

  10. The problem with wifite and the wifi pineapple is the pineapple doesn't come with tshark/pyrite/cowpatty by default and wifite uses them to check to make sure you have a vaild handshake. If you run wifite with the -aircrack option so it only uses aircrack to verify it should let you capture the handshake. Although if you captured it using your pineapple that capture will be junk. Aircrack will open the .cap but even if you have the correct password in your wordlist it won't crack it, and if you try and convert it to .hccap " [error ] unable to find valid handshakes."

×
×
  • Create New...