yabasoya
-
Posts
184 -
Joined
-
Last visited
-
Days Won
2
Posts posted by yabasoya
-
-
-
It just needed a wlan1 on the last line and an extra set of parenthesis on line 4. Without them it was assigning '20 /sd/mac.list' to max, not just '20'
#!/bin/bash sleep 20 #Wait 20 seconds - Use if you need to wait for other things to load first max=($(wc -l /sd/mac.list)) #Count the macs in list (i assume each mac is on a seperate line and only contains MAC?) num=$(( ( RANDOM % $max ) + 1 )) #Get number between 1 - number of macs in file. mac=$(tail -n $num /sd/mac.list| head -n 1) # get random mac macchanger -m $mac wlan1 #Change to random mac address :)
Thanks for the help! It works in a shh terminal on the pineapple. I just need to test it on a dip switch next. -
I just got done deploying mine from Monday morning to Friday afternoon. I was trying to get into a seemingly abandoned WEP AP. No clients all week. I collected 600,000 IV's and couldn't crack it. On Monday I just did a simple 'screen' and 'python wifite.py' and then a 'screen -r' on Friday. I'm preparing something more focused on chopchop for Monday.
-
You sir, are a pineapple pioneer!!
-
That's beautiful.. Thanks I will try it!
-
I have a list of 20 'authorized' macs (will add more as I come across them). I was looking to write a script that runs on startup to query the file of macs and randomly pick one to clone it to wlan1.
Can someone help me write a script to do this or at least point me in the right direction?
Thanks.
-
Hopefully the new firmware will address some of those issues. Try the beta and note what has gotten better or worse. We all seem to be experiencing some quirky behavior from time to time.
-
Perfect fit! I'm going to do that as well, I have some extra laying around from my pi.
-
Name your ssid 'attwifi' and you should get a shit load of connections even without karma.
-
Considering the fact that the price of a class 10 16gb sd card can be found for $13, I would go 16. Also, all of the infusions combined are relatively small, it's all the data you collect that fills up the card.
-
I have a similar one.. I need to rotate mine between horizontal and vertical to fine tune.
-
I bought my pineapple because it seems like a way that I can give back to hak5, their expertise is profound with still enough laughter and smiles to make us coming back for more.
Thank you Hak5
I give back by watching and clicking on all the ads in their videos.
-
You state that you know that wlan0 is locked by design.... If you accept this what exactly is your question? Ohh and it was the TX power that is locked, not the RX side... Are you using the stock antennas?
Yes, wlan0 and wlan1 are stock antennas, and I swapped them with each other. All 4 readings are from the same distance. Very strange.
-
I was on a mission on Friday when I was trying to overpower an access point. I kept noticing that clients were connecting to the other open access point and not mine. It prompted me to experiment with my pineapple today. After trying to change the stock 18dbm power level of wlan0 without success I tried to test it a different way. I was told on the message board that this is locked by design. Ok, fine, I accept that for now. I changed it to client mode when I noticed that I get very poor reception through wlan0.
First scenario, TP-Link usb(wlan2), wlan0 and wlan1 all connected to my ASUS router in client mode. As you can see, wlan0 is detecting my ASUS router at ~30db less than the other 2.
Scenario 2. Same test but my TP-Link(wlan2) is swapped for my Alfa G(wlan3). Again, wlan0 is 30db less than the other 2.
I did the same test using single connections with the same result.
I already swapped antennas between wlan0 and wlan1.
Am I doing something wrong?
Do I have a bad unit or is this done by design?
Thanks.
-
Hmm, emailed that address last week and nothing, and then used their online web submission form again after selecting 'Technical Support' as the type.
I emailed them 3 times since December and nothing, nada, zilch.
-
Hush hush, Mr Gray. I just tried it. I will pm you with my findings.
-
Holy hell battery! What's that setup weigh?
The black one only weights 3.5 lbs. The yellow one weighs *cough* 3l lbs. *cough*
-
I had this yellow case for a camera that I have. I only used it one at the beach anyway. I haven't really figured out what I want to do with this one as far as drilling holes yet. I have 3 - 12v batteries at 12,000mAh each. Total sum of 12v @ 36,000mAh. I am still testing this on for longevity but I am hoping for at least 5 days for this one. I know the coloring of the charging wire is opposite, it's just what I had in the drawer but is the right polarity when hooked up this way. I plan to order a "Testing in Progress" sign for this. The fact that it is bright yellow will make it look more "official" and less likely to get the bomb squad involved.
-
This was my first project. I tore apart a bunch of battery packs that I get from work. Each cell is 3.5v @ 1100mAh. I soldered 13 packs of 2 (7v@1100mAH). I have a total sum of 7v @ 14,300mAh. I get exactly 48hrs out of this with the pineapple pretty much idle with 2 radios.
I haven't gotten around to adding the cage antenna externally yet. I really only use it for deauth anyway. I also cut a piece of plexiglass to separate the batteries fom the pineapple.
-
Thanks for the info.
Where would be a good place to start getting some hands-on experience with pen testing?
I have programming experience in C and Python, and some knowledge of TCP-IP
is this book reccomended? :
BackTrack 5 Wireless Penetration Testing Beginner’s Guide
I watched the entire set and I loved it. It got me started with many of the utilities in Back-Track/Kali
http://www.cbtnuggets.com/it-training-videos/course/backtrack-kali-linux
-
Great reviews! I accidentally found a 16,000mAh from the same manufacturer for the same price
-
Looks awesome!
-
I made a thread on the hashcat and well as aircrack forums I'll see if they can't shed some light on the problem.
If it's not against hak5 rules, do you mind posting a link to that? I'd like to follow. Thanks.
-
The NAT is what protects visibility of users behind the device. At this time, I don't think it's possible to do what you want.
My cable company was able to tell me on the phone that I had 4 devices connected to my router. I didn't think that was possible either.
Anyone seen people trying to scan ssh?
in WiFi Pineapple Mark V
Posted · Edited by yabasoya
I used to get port scan alerts all the time. Usually 3 at a time on random ports from China. I use Sophos UTM9 now, it's free for home use.
The only problem is that I am big into torrents and most seeds are from over there.