Jump to content


Active Members
  • Content Count

  • Joined

  • Last visited

  • Days Won


Everything posted by m40295

  1. My recommendation is to use an SFTP server like filezilla or winscp Take the downloaded file device.config Open your c2 in sftp open etc place file
  2. Mine arrives tomorrow morning super excited but a question I had was will it have C2 abilities will my C2 server be able to see when it's connected
  3. https://en.m.wikipedia.org/wiki/ARP_spoofing https://en.m.wikipedia.org/wiki/Ettercap_(software) http://smwiki2014.wikidot.com/wiki:password-sniffing-using-ettercap 3 quick searches lots to read for ya but this should get you started Note. this will not work on https just http Good luck
  4. The pineapples don't have the power to run metasploit However they are great to deploy payloads with.
  5. Set the Bash Bunny switch to position 3 (arming mode) Plug the Bash Bunny into a USB power source. The LED will momentarily light green. As soon as the LED goes off, unplug the Bash Bunny. Repeat the previous step twice more (for a total of 3 times) Plug the Bash Bunny into a USB power source and leave for 4 minutes. The LED will light RED to indicate recovery. When the light returns to BLUE blinking, the Bash Bunny has recovered
  6. Can you post the command line options you used Mine on my vps are ./c2_community-linux-64 -db c2.db -hostname myhostname.com -https -sshport 2022 & & makes it run in background I access it myhostname.com as it's running on port 80
  7. Go to your original email find the download link and download the version you need
  8. Ori0n for question 1 I've noticed that when you update the bash bunny it writes default payload files to all the switches so it's best to go into your switches and modify the payload files even if it's just switching it with a rem command For question 2 save to /root/loot/ Not udisk For 3 try setting permission on the folder r/w No answer for 4 Hope that guided you to the right answers
  9. keep checking prices they do deals for xmas i am on my 2nd yr and loving it
  10. i use my vps and run my own (i would rather have full control over my vpn) my vps is thru OVH and it was super cheap at 50$ a yr on sale i use it for VPN , testing , c2cloud , and such i dont know how i ever did without it
  11. for clients connected to the pineapple use br-lan which is the lan interface
  12. I wish but I'm pretty sure they just want our money again and again and again For a company that thrives because of community support there's not much give back to paying customers I've been a long time supporter but as a new product comes out they abandoned the old ones
  13. After playing for a few days there's one feature I would love to see implemented access to the management page of the Nano either forwarding 1471 to the server so you can access it through DNS or putting access to the management page in a tab on the C2 as once the pineapples deployed checking modules would be nice
  14. In the future could the mark 5 be supported with the 3.0 beta
  15. In the future would you guys build Raspberry Pi client to add our Raspberry Pi device drop boxes to the C2 or perhaps a Linux payload
  16. There's an SD card slot on the side in a USB port on the end I recommend going through the wiki https://wiki.wifipineapple.com
  17. My suggestion is to add an external USB Wi-Fi adapter commonly comes up as WLAN 2 as your internet connection so wlan0 and wlan1 are free for hosting the AP and using pineap features
  18. I might be able to answer a few of your questions Yes you can adjust the client call back time in settings You set the options at launch --listenip --hostname (dns) -https Each device setup is super easy download config scp to device /etc/
  19. I'm pretty sure the SSH server is independent don't use 22 as that's your SSH for your VPS leave it as the default -Sshserver 2022 Woot my 300 post on hak5
  20. Windows r cmd C2windows exe -h (not actual command Will give the options such as hostname c2db listenip listenport Great work hak5 team I can't wait to see the updates In the future will I be able to add non hak5 devices such as a Raspberry Pi Will you be integrating this with any other popular tools of the trade Armitage or cobaltstrike ,metasploit
  21. Open the exe in a cmd prompt and run it it's a binary not a installer Got me too
  22. Thinking Out Loud have you thought of putting dban on the bunny darian's Boot and nuke
  • Create New...