Jump to content

Sailor

Active Members
  • Posts

    64
  • Joined

  • Last visited

  • Days Won

    3

Posts posted by Sailor

  1. You can use the following script and set it as a boot script for your dip configuration. Make sure you change the log directories or create them (/sd/log/ and /sd/log/archive/)

    #!/bin/bash
    logger '***** Start boot script *****'
    
    DATE=$(date +"%Y%m%d%H%M")
    # Clean up older files from log directory and archive them
    mv -n /sd/log/*.pcap* /sd/log/archive/ >/dev/null
    sleep 5
    # Start tcp dump
    logger '***** Start tcp dump *****'
    tcpdump -n -C 10 -W 100 -i br-lan -w /sd/log/packetlog-$DATE.pcap >/dev/null 2>&1 &
    
    logger '***** Finished boot script *****'
    
  2. I experience the same but it is not related to this infusion but more likely to the load you put on the pineapple. Did you check your logs? In my case the usb-device has hick-ups when transferring big files on a fast network when under load.

    You can try to limit the download speed in WinSCP, this helps for me (and off course apply the suggestion made by WinSCP: turn of the optimization of the buffer size).

  3. You could do it in a similar set up in which I did a small proof of concept: https://forums.hak5.org/index.php?/topic/31961-arduino-pineapple-led-matrix/

    In this case it would be easier to use a Raspberry Pi with a camera module:

    - Connect the serial interfaces on the Pineapple and the Raspberry

    - Write a shell script on the Pineapple that writes something to /dev/tty/ATH0 when someone connects or is in range (for instance grep on a probe or connect in the karma log)

    - Have a small (python) program watch the serial port for that command you'll send in the step above

    - Take a picture

  4. I know that the Karma log is temporarily stored at tmp/karma-phy0.tmp, but wanted to see if anyone knew what file managed the log file (i.e. that creates its input) so I can see about modifying it to add the date/time that the probe was received. grep'ing the string "Probe Request from" didn't come up with anything.

    It is most probably a binary, that is why you cannot find this.

    I managed to add a timestamp with the following command (read the log file, in this example I filter only the connects, and redirect to a new file). You can also redirect to a remote server, the sink as you call it.

    tail -f /tmp/karma-phy0.log | grep 'pass\|AP-STA-DISCONNECTED\|Successful' | awk '{ print strftime("%Y-%m-%d %H:%M:%S"), $0; }' >> /sd/karma.log
    
  5. I switched (back) to using a USB drive for processes that require I/O on the disk. Especially tools like tcpdump, sslstrip/sslsplit or downloading bigger logfiles via ssh/scp cause problems on my sd but run fine when configured to use USB.

    Look in your syslog and dmesg for message like:

    usb 1-1.4: reset high-speed USB device number 5 using ehci-platform
    

    This device is the "Multi Flash reader" for the sd card

  6. Irrespective of when official expansion boards are available, I'd still like to see some documentation on the expansion bus, hear about any gotchas and caveats around using the pins, etc.

    The closed and secretive nature around the expansion bus doesn't really seem to be in the hacker / Hak5 spirit!

    Agree.

    PenturaLabs did some analysis: http://penturalabs.wordpress.com/2013/10/27/naked-wifi-pineapple-mark-v/

    I haven't had time to do some research myself but I guess it is fairly straight-forward to use the GPIO pins since the packages are already there.

  7. Hey Sailor, what happened here? I have the exact same problem, and was looking through the forum to see if anyone else has.

    I tried various things from changing SD cards to changing settings in different SCP clients but none helped. I guess there is no real solution for this and you just need to live with it, at least that is what I do.

    I am curious to hear if you find a solution!

  8. now you just have to make it so it will move on its own to get the strongest signal.. maybe have 2 alfa's for this system.. one that locks on and stays with the signal, while the other constantly looks for new ones.. Kind of like an attack radar system. it would be cool if you could have some figurines at the bottom, and when the one antenna locked on you could make the eye's turn on ( with led's or something)..haha, talk about the scare factor for strangers.

    LOL, that is an interesting idea, should definitely be possible and is pretty simple by parsing for instance:

    iwconfig wlan0 | grep -i Signal

    and use the Arduino to rotate back and forth until the strongest signal is found

  9. Sure. I have included the wiring diagram here.

    It is basically just connecting the serial port from the Pineapple to the serial port of the Arduino. Because the Arduino has 5 volt logic and the Pineapple 3.3 volt logic I placed a logic level shifter (the red part, just around 2 dollar). It might work without as I have read from people having a similar setup (Arduino - RasPi).

    On the Arduino I have a program running that reads the serial port and performs an action (controlling the LED in this case, rotating the antenna in the other case).

    On the Pineapple you can send commands to the serial port (/dev/tty/ATH0) from you existing scripts.

    post-44836-0-22158700-1393760146_thumb.j

  10. Another experiment with connecting an Arduino to a Pineapple. The same will probably be possible by using the GPIO pins but I used serial.

    In this project I have connected my antenna to a directional Alfa antenna. I mounted the antenna to a servo so I can rotate the antenna just by sending some commands to the Pineapple.

    For now I used a bash script to send the commands to the serial port, but it is perfectly possible to make an infusion for this. The only command that needs to be send to the Arduino is the number of degrees and the antenna will rotate to this angle.


    Watch the video here: https://vimeo.com/87356058


    post-44836-0-26259600-1393596476_thumb.j


    Wiring scheme:

    post-44836-0-63215100-1393760730_thumb.j





  11. I have been experimenting with connecting an Arduino to a Pineapple. This might be possible by using the GPIO pins but I have used the serial interface.

    In this experiment I have an RGB LED Matrix connected to an Arduino and the Arduino connected to the serial interface.

    The Arduino waits for events to happen on the Pineapple. In this case I send a 'Connect' event to the Arduino if someones connects to the Pineapple. This is followed by a message string (the number of succesfull connections).

    The connect event triggers an animation and the number of connections is shown on the LED Matrix afterwards.

    It is fairly easy to catch all kinds of events and trigger an action, for instance a succesfull WPS attack.

    This is probably not very useful in a pentest but I had fun building it :)


    Watch the video here: https://vimeo.com/87283079


    post-44836-0-81885300-1393596207_thumb.j

  12. You will get some more info in the console and log file if you use the -a (or --all) switch. Did you try that already?

    echo "1" > /proc/sys/net/ipv4/ip_forward
    iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
    sslstrip -a -w /usb/sslstrip.log &
    
×
×
  • Create New...