Jump to content

Jerfguy2

Active Members
  • Posts

    5
  • Joined

  • Last visited

Everything posted by Jerfguy2

  1. https://forums.hak5.org/index.php?/topic/31915-nodogsplash-redirecturl-command/?fromsearch=1 Like this but instead of a web URL it can be directed to a page that has links to our favorite spoofed pages hosted on the pineapple in the form of file paths?
  2. WarWalking / Driving / ... Would be cool to do with this tool. Any updates onf LeftCoast's question?
  3. Soo... You know how public APs make you 'log into' a network via a webpage before allowing you access to the internet? How is THAT done? Could you replace that (login) page with, say, some quick links to our "guests" favorite website (our spoofs)?
  4. I too am a newb; however what I found helps is learning the root program of the "fusion" you are using. What I've learned. Wlan0 is how you and clients connect to the pineapple. Wlan2 is what EITHER connects to another AP in client mode OR attacks an AP. It can NOT be connected to AND attack two different APs. Karma - only says "yes" to probe requests for open (or unsecure) previously connected to networks. SSL is still pretty hit and miss for Me. I think there are commands that can filter the captured data so it's not an overwelming amount of data. Another thing I'm starting to look into is DNSpoisoning/DNSspoofing. That's where you host 'fake' websites right on the AP and poison the DNS library to point the URL to your local site, there by capturing the logon information. Now how I've learned this is by Searching google. Find which tools you'd like to learn and search for write ups or tutorials or how to's. Check the official pages, youtube, EVERY where. Best of luck buddy. and YES some write ups included in the "fusion" on how to use that fusion would be totaly cool but hunting for the information is fun too.
×
×
  • Create New...