Jump to content

mw3demo

Active Members
  • Posts

    133
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by mw3demo

  1. Found a bug with arpspoofing, I think. I went ahead with the first option: Sniff Mails ,Messages,and URl's and files Who do you want to arpspoof eg : 192.168.0.18 10.0.1.1 Where do your want to save the output? Default = /sd/FruitySniffer/logs/logs.txt arpspoof: invalid option -- r Version: 2.4 Usage: arpspoof [-i interface] [-t target] host ^C There is no -r option in arpspoof according to the man. In this case, I'm trying to arp the whole network, so I chose my router ip (Right thing to do?) arpspoof -i br-lan 10.0.1.1 I opened up vim and saw at line 101: arpspoof -i $Interface -r $gateway -t $target & I changed that to: arpspoof -i $Interface $target & Which gets things going but it just continues to arp and doesn't continue with the rest of the script: Nmap done: 256 IP addresses (9 hosts up) scanned in 9.56 seconds Who do you want to arpspoof eg : 192.168.0.18 10.0.1.1 Where do your want to save the output? Default = /sd/FruitySniffer/logs/logs.txt 0:13:37:xx:xx:xx ff:ff:ff:ff:ff:ff 0806 42: arp reply 10.0.1.1 is-at 0:13:37:xx:xx:xx 0:13:37:xx:xx:xx ff:ff:ff:ff:ff:ff 0806 42: arp reply 10.0.1.1 is-at 0:13:37:xx:xx:xx 0:13:37:xx:xx:xx ff:ff:ff:ff:ff:ff 0806 42: arp reply 10.0.1.1 is-at 0:13:37:xx:xx:xx I hit enter to see if that would do anything for the hell of it: Write failed: Broken pipe root:~ root$ Disconnected. Might be worth checking out yamas/easy-creds and compare, my dog tired mind can't figure it out/is doing something wrong. As a request: An option to target an individual target via -t and the whole network would be nice via arpspoof. I also tried running it without arpspoof, and connected via a Karma SSID. I checked a mail via my iPhone, and sent one, browsed two sites and quit the script. I checked the logs, urlsnarf works fine, but nothing from mailsnarf. I apologise for this chaotic post, it's 4am here and it's been a hectic day, my brains burnt and so are my eyes! Will pick up on this tomorrow evening. I also quickly tried via ettercap. The wget via mediafire is a bad idea, it pulls the config file as the hmtl page for the download page, rather than the actual file. I don't think they support wget in the manner tried here. Here is my 1iQbYYX file in /etc/ It appears you are using an older browser. For a better experience when using MediaFire, we recommend you upgrade your browser. Help Questions? Submit a ticket or visit our Help Center. Additional help links: Contact Us Help with Web Help with Mobile Help with Desktop Call us at 1-877-688-0068 to speak to a live representative. YOUR SUPPORT CODE: CLOSE MediaFire Overview Share Connect Backup Trusted More etc Time to sleep! :)
  2. Hey Jesse, Burning the midnight oil after a hectic day of shopping! Just retried the depencies check, works fine apart from mdk3: Version : Alpha v1.0 Select from the following functions Hit ctrl + c at any time to quit and clean up 0 Clean up manually 1 Sniff Mails ,Messages,and URl's and files 2 DNS Spoof, Capture All Packets 3 Sniffing with Ettercap 4 Install Dependencies 5 Sniffing passwords over HTTPS(SSL) + HTTP FTP, IMAP , SMTP and more 6 Exit choice : 4 Installing Dependencies Package ettercap (NG-0.7.3-3) installed in root is up to date. Package dsniff (2.4b1-2) installed in root is up to date. Unknown package 'mdk3'. Collected errors: * opkg_install_cmd: Cannot install package mdk3. Package sslstrip (0.9-1) installed in root is up to date. Package tcpdump (4.2.1-3) installed in root is up to date. Done! Press RETURN for menu I checked out opkg list and opkg list_installed and there is no mention of mdk3. Which I know has to be wrong. I therefore did and opkg update: root@Pineapple:/sd/FruitySniffer# opkg update Downloading http://cloud.wifipineapple.com/mk5/packages/Packages.gz. Updated list of available packages in /var/opkg-lists/pineapple_packages. root@Pineapple:/sd/FruitySniffer# opkg list ---Snip--- mdadm - 3.2.5-1 - A tool for managing Linux Software RAID arrays. mdk3 - v6-1 - Tool to exploit wireless vulnerabilities mdns-utils - 214.3.2-4 - Bonjour, also known as zero-configuration networking, enables automatic discovery of computers, devices, and services on IP networks. ---Snip--- Tried the check depencies again: Installing Dependencies Package ettercap (NG-0.7.3-3) installed in root is up to date. Package dsniff (2.4b1-2) installed in root is up to date. Installing mdk3 (v6-1) to root... Downloading http://cloud.wifipineapple.com/mk5/packages/mdk3_v6-1_ar71xx.ipk. Configuring mdk3. Package sslstrip (0.9-1) installed in root is up to date. Package tcpdump (4.2.1-3) installed in root is up to date. Done! Press RETURN for menu An "opkg update" before the opkg install in FruitySniffer.sh should solve the problem.
  3. Hey Jesse, Still going to work on this, but last minute Christmas preps are taking full swing! Left the shopping late like millions of others, might take a few days for some feedback. :)
  4. Hey Jesse! Really appreciate your work! Just got home, I'll bug test this for the next couple hours/day on my network, and report back. One thing I rememeber on the way out (quickly tried the dependencies check), is sslstrip has a tendency to stay on even after CTRL + C/(0)"Clean up Manually". I had to stop SSLStrip manually via the pineapple web interface, and then rerun the script to stop errors. I'll look into it deeper, commited to bug testing this all the way through. Curiously (I am going to start with a fresh install to be sure.), when I "ls" inside /sd/ the Fruity folder is nowhere to be seen, but it is there if I use the "Go to folder" function. I have no idea if this is because of my setup or the folder gets hidden somehow? I'm going to throughly go over it over tonight. Keep it up!
  5. Second method works. I might have an idea why the first way doesn't work. The filehost intentionally corrupts the zip to stop wget downloads? Dependency check has a bug: Version : Alpha v1.0 Select from the following functions Hit ctrl + c at any time to quit and clean up 0 Clean up manually 1 Sniff Mails ,Messages,and URl's and files 2 DNS Spoof, Capture All Packets 3 Sniffing with Ettercap 4 Install Dependencies 5 Sniffing passwords over HTTPS(SSL) + HTTP FTP, IMAP , SMTP and more 6 Exit choice : 4 Installing Dependencies ./FruitySniffer.sh: line 388: sudo: command not found ./FruitySniffer.sh: line 389: sudo: command not found ./FruitySniffer.sh: line 390: sudo: command not found ./FruitySniffer.sh: line 391: sudo: command not found ./FruitySniffer.sh: line 392: sudo: command not found Done! Press RETURN for menu
  6. Hey Jessel! Just tried to do the install and encountered the same problem as overwraith. Tried to install on the SD, but something is up with the .zip Going to try your second method Configuring unzip. Install on USB or on SD? SD Archive: FruitySniffer.zip End-of-central-directory signature not found. Either this file is not a zipfile, or it constitutes one disk of a multi-part archive. In the latter case the central directory and zipfile comment will be found on the last disk(s) of this archive. unzip: cannot find zipfile directory in one of FruitySniffer.zip or FruitySniffer.zip.zip, and cannot find FruitySniffer.zip.ZIP, period. ./Installer.sh: line 28: cd: /sd/FruitySniffer/: No such file or directory chmod: FruitySniffer.sh: No such file or directory open with : ./FruitySniffer.sh Done root@Pineapple:/sd# ls FruitySniffer.zip infusions tmp var Installer.sh lost+found usr root@Pineapple:/sd# unzip FruitySniffer.zip Archive: FruitySniffer.zip End-of-central-directory signature not found. Either this file is not a zipfile, or it constitutes one disk of a multi-part archive. In the latter case the central directory and zipfile comment will be found on the last disk(s) of this archive. unzip: cannot find zipfile directory in one of FruitySniffer.zip or FruitySniffer.zip.zip, and cannot find FruitySniffer.zip.ZIP, period. root@Pineapple:/sd#
  7. Don't know how I missed it! I'll test it out tonight, thanks!
  8. Multithreaded asynchronous packet parsing/injecting ARP poisoner. Individually poisons the ARP tables of the target box, the router and the DNS server if necessary. Does not poison anyone else on the network. Displays all most the interesting bits of their traffic and can inject custom html into pages they visit. Cleans up after itself. Prereqs: Linux, scapy, python nfqueue-bindings 0.4.3+, aircrack-ng, python twisted, BeEF (optional), and a wireless card capable of promiscuous mode if you choose not to use the -ip option Tested on Kali 1.0. In the following examples 192.168.0.5 will be the attacking machine and 192.168.0.10 will be the victim. All options: python LANs.py [-h] [-b BEEF] [-c CODE] [-u] [-ip IPADDRESS] [-vmac VICTIMMAC] [-d] [-v] [-dns DNSSPOOF] [-r IPADDRESS] [-set] [-p] [-na] [-n] [-i INTERFACE] [-rip ROUTERIP] [-rmac ROUTERMAC] [-pcap PCAP] https://forums.kali.org/showthread.php?19139-Python-tool-for-seeing-everything-a-LAN-user-is-doing https://github.com/DanMcInerney/LANs.py Is it possible to have the above as an infusion or to get this to interact with the Mark V? This would be a great addition.
  9. Hey Jesse! Any news? Getting excited to see your work! :)
  10. The same thing happened to me. I think you'll have to connect the sd to a computer and try and format
  11. Easy-creds style infusion is what you are looking for.
  12. Keep it up Lavanoid! Still haven't had a chance to try this on my ducky, but love how you are quickly updating and improving this script with each users feedback. Just a quick post to say well done!
  13. Is there any command I can issue the pineapple to make sure urlsnarf has zero trace left on the pineapple memory and SD?
  14. No luck. I'll try another factory reset and wipe, just install urlsnarf and see what happens.
  15. Thank you for the prompt reply Seb! Really appreciate the work you and the team are doing, especially with the quick firmware releases recently. Would you have any recommendations for a portable flat panel of that size? Aswell as recommendations for one with larger range in the shape of the standard antenna?
  16. I found an old Alfa lying around that I purchased. It also came with the Alfa 7dBi flat panel. This is the link: http://www.amazon.co.uk/gp/aw/d/B0041OI01C/ref=mp_s_a_1_2?qid=1385399741&sr=8-2π=AC_SX110_SY165 Will that flat panel work fine with the pineapple? Also, which side of the Mark V is the "Karma Antenna" side on? I would experiment but I don't want to turn it on with an antenna that I think has contact when it doesn't, could be bad for the radio apparently. Many thanks!
  17. What would the correct interface be? Br-lan? I've tried on all interfaces and can't get any logs, but it says it's running. Karma and sslstrip on. I did a factory reset, SD wipe, and still no luck. Sslstrip picks up traffic though.
  18. That would really be great Foxtrot, thanks! It's probably the best tool at what it does, and would be perfect for the pineapple. Hopefully the wait won't be too long for the package.
  19. For what it's worth, It is a very well made program by Eric Milam (co-developer of ettercap): https://code.google.com/p/easy-creds/ http://sourceforge.net/projects/easy-creds/
  20. Wifipineapple.com "Available Pentest Packages include aircrack-ng, dsniff, easy-creds, ettercap, hping3, httptunnel, karma, kismet, macchanger, mdk3, ngrep, nmap, nodogsplash captive portal, privoxy, ptunnel, snort, sslsniff, sslstrip, ssltunnel, stunnel, tcpdump, tor, and reaver."
  21. Listed on wifi pineapple as a package but couldn't see it with opkg. An easy-creds infusion would be great.
  22. I love passive-aggressiveness! Back on topic, well done Lavanoid! You probably put a bunch of effort into this, and I will give it a test in the near future. Good work doesn't need huge PR though, just look at the Rubber Ducky, and Wifi Pineapple. Your work will get attention if its good at what it does, just keep putting the hard work in! Good job.
  23. Wish the hak5 team a successful launch party, and standing by for details!
  24. I was actually about to purchase a unit and saw the announcement, but details are scarce! "Mum's the word" until the announcement?
×
×
  • Create New...