-
Posts
198 -
Joined
-
Last visited
-
Days Won
1
Posts posted by raz0r
-
-
Please help me chaps for some unknown reason my pineapple keeps rebooting i have flashed it bit it keeps doing it, it will be OK for like 10-20 min then that's it BAM !!
Any ideas would be helpful
Kind Regards
Raz0r
-
Yea im playing with it now and its says wrong login for the email but its right.
Can someone please help me
Regards
Raz0r
-
Go over to the WPS thread cheeto has done a vid :)
Raz0r
-
Disabled m8 :)
Take a look at the vid
Regards
Raz0r
-
Thanks for the update keep us posted :)
Raz0r
-
Good to hear its up and running again :)
Raz0r
-
Try clearing your cach
Then refresh
Raz0r
-
Well done buddy thanks for the credit.
Why dont you post this in the tutorial section
Raz0r
-
Also the best way to lern is not by scripts but the manual way other wise people will call u a script kiddie
Learn the hard way first , that script is good for mitm and evil twin I believe ;)
Raz0r
-
Wifislax is good I've been using it but I'm a Kali fan I have been using it since it started off now I'm 31 lol and still love security .
Believe me m8 translate that page and sign up.
Download the script and use it on Kali
But only on your own router other wise u might get into trouble
Regards
Raz0r
-
Yea I find that also with bully sometimes
But I have a little present for you one that has been over looked !!
I'm no good at PHP but I got friends who are
How about making this into an infusion !!!
I have used it many times on routers my own of course
http://lampiweb.com/foro/index.php?topic=9834.0
Now what about if this were to be an infusion download the script in Kali and let me know what you think
Raz0r
-
Then I'm not to sure I'm affraid someone here maybe able to assist you further
Regards
Raz0r
-
Try getting a little closer to the AP or get a better antenna buddy
Raz0r
-
Good to hear its working for you :)
Try attacking it with Bully and use the -D option as it detects lockouts.
Or you could try putting a delay in with Reaver
Best thing to do is try different settings and see what works for you.
usage: bully <options> interface Required arguments: interface : Wireless interface in monitor mode (root required) -b, --bssid macaddr : MAC address of the target access point Or -e, --essid string : Extended SSID for the access point Optional arguments: -c, --channel N[,N...] : Channel number of AP, or list to hop [b/g] -i, --index N : Starting pin index (7 or 8 digits) [Auto] -l, --lockwait N : Seconds to wait if the AP locks WPS [43] -o, --outfile file : Output file for messages [stdout] -p, --pin N : Starting pin number (7 or 8 digits) [Auto] -s, --source macaddr : Source (hardware) MAC address [Probe] -v, --verbosity N : Verbosity level 1-3, 1 is quietest [3] -w, --workdir path : Location of pin/session files [~/.bully/] -5, --5ghz : Hop on 5GHz a/n default channel list [No] -B, --bruteforce : Bruteforce the WPS pin checksum digit [No] -F, --force : Force continue in spite of warnings [No] -S, --sequential : Sequential pins (do not randomize) [No] -T, --test : Test mode (do not inject any packets) [No] Advanced arguments: -a, --acktime N : Deprecated/ignored [Auto] -r, --retries N : Resend packets N times when not acked [2] -m, --m13time N : Deprecated/ignored [Auto] -t, --timeout N : Deprecated/ignored [Auto] -1, --pin1delay M[,N] : Delay M seconds every Nth nack at M5 [0,1] -2, --pin2delay M[,N] : Delay M seconds every Nth nack at M7 [5,1] -A, --noacks : Disable ACK check for sent packets [No] -C, --nocheck : Skip CRC/FCS validation (performance) [No] -D, --detectlock : Detect WPS lockouts unreported by AP [No] -E, --eapfail : EAP Failure terminate every exchange [No] -L, --lockignore : Ignore WPS locks reported by the AP [No] -M, --m57nack : M5/M7 timeouts treated as WSC_NACK's [No] -N, --nofcs : Packets don't contain the FCS field [Auto] -P, --probe : Use probe request for nonbeaconing AP [No] -R, --radiotap : Assume radiotap headers are present [Auto] -W, --windows7 : Masquerade as a Windows 7 registrar [No] -Z, --suppress : Suppress packet throttling algorithm [No] -V, --version : Print version info and exit -h, --help : Display this help information
root@Raz0r:~# reaver Reaver v1.4 WiFi Protected Setup Attack Tool Copyright (c) 2011, Tactical Network Solutions, Craig Heffner <cheffner@tacnetsol.com> Required Arguments: -i, --interface=<wlan> Name of the monitor-mode interface to use -b, --bssid=<mac> BSSID of the target AP Optional Arguments: -m, --mac=<mac> MAC of the host system -e, --essid=<ssid> ESSID of the target AP -c, --channel=<channel> Set the 802.11 channel for the interface (implies -f) -o, --out-file=<file> Send output to a log file [stdout] -s, --session=<file> Restore a previous session file -C, --exec=<command> Execute the supplied command upon successful pin recovery -D, --daemonize Daemonize reaver -a, --auto Auto detect the best advanced options for the target AP -f, --fixed Disable channel hopping -5, --5ghz Use 5GHz 802.11 channels -v, --verbose Display non-critical warnings (-vv for more) -q, --quiet Only display critical messages -h, --help Show help Advanced Options: -p, --pin=<wps pin> Use the specified 4 or 8 digit WPS pin -d, --delay=<seconds> Set the delay between pin attempts [1] -l, --lock-delay=<seconds> Set the time to wait if the AP locks WPS pin attempts [60] -g, --max-attempts=<num> Quit after num pin attempts -x, --fail-wait=<seconds> Set the time to sleep after 10 unexpected failures [0] -r, --recurring-delay=<x:y> Sleep for y seconds every x pin attempts -t, --timeout=<seconds> Set the receive timeout period [5] -T, --m57-timeout=<seconds> Set the M5/M7 timeout period [0.20] -A, --no-associate Do not associate with the AP (association must be done by another application) -N, --no-nacks Do not send NACK messages when out of order packets are received -S, --dh-small Use small DH keys to improve crack speed -L, --ignore-locks Ignore locked state reported by the target AP -E, --eap-terminate Terminate each WPS session with an EAP FAIL packet -n, --nack Target AP always sends a NACK [Auto] -w, --win7 Mimic a Windows 7 registrar [False] Example: reaver -i mon0 -b 00:90:4C:C1:AC:21 -vv
-
I find it is better then Reaver BUT you need to be really close for it to work smooth, other wise you just get timeouts !!
Yea get a good outdoor antenna but make sure you got the right connectors on the end m8
Let me know how u get on
Regards
Raz0r
-
Not that i know of i have only been using a few infusions on there at the moment.
Also take a look at bully but use the -C command i find that works good but you need to be close to the AP or have a very good antenna
To be honest i leave mine at work lol i stick with Kali at the min cos i can get my jobs done very quick using it in VM player :)
But the Mark V is a great tool just need more time with it.
Regards
Raz0r
-
I also wouldn't have thought that as i don't have to do it in Kali Linux i was getting frustrated my self until i read something on here.
Just strange that you don't have to do it on Kali, maybe someone else here could answer your question :)
Raz0r
-
Mine works fine m8 i was rushing ill do another one sec lol
Also you need to be close to the AP for less errors :)
http://www.sendspace.com/file/rxgx8u
Regards
Raz0r
-
You can enable monitor mode while wlan1 is enabled BUT what you need to do is disable wlan1 before the attack ;) other wise it wont work
Kind Regards
Raz0r
-
You need to enable it to scan for APS then disable it and start monitor mode on wlan1. it will work m8 trust me
The reason i checked them boxes was so it remembers where i left off just in case it gets canceled some how and i don't have to restart the bloody thing again i highly recommend using that first box ;).
The next box was so i get verbose out put and could see any errors using -vv but i just type in the box -v I'm not to worry about the verbose just sometimes nice to see whats going on.
Don't forget the M5 M6 messages are good to see :)
Kind Regards
Raz0r
-
Very cool thanks :)
-
Vid done for you for some reason it got stuck but you get the gyst of it !!
http://www.sendspace.com/file/5fz53h
Regards
Raz0r
-
Ill do a vid for you hang fire ;)
Raz0r
-
Thats not the case buddy !!
Your should be using wlan1, enable monitor mode then disable the adaptor.
Take a look here m8 https://forums.hak5.org/index.php?/topic/31454-support-wps/page-7 (137 by slimpickens)
Just apply his method to the infusion ;)
Regards
Raz0r
RED LIGHT
in WiFi Pineapple Mark V
Posted
You know what i find strange is when i have been attacking an AP for a long time i lose the signal strength so all i done was reinstall the infusion but made sure i backed up the files.
Any way good luck fella
Regards
Raz0r