Jump to content


Dedicated Members
  • Posts

  • Joined

  • Last visited

  • Days Won


Everything posted by Zylla

  1. I'll get working on updating Kismet for the Nano & Tetra asap. I've been so focused on the packages for Pineapple Mark 7, so i've honestly only had an hour or two (MAX) to spend on updating some MK6 (nano/tetra) packages lately.
  2. I can take a deeper dive into this mystery. What version of kismet are you installing? Or, how exactly do you go about installing kismet? If other ppl. are experincing the same problem, feel free to chime in your answers to the questions above.
  3. Yeah! It's working. But i've noticed a bug, which can be a bit annoying. Read more about it on the Issue section on the Github repo. I've opened an issue there. 🙂
  4. When installing a custom built kmod, make sure to not only iinstall for the correct kernel version, but also on a kernel that was built with the kmod you are installing. 🙂
  5. Yeey!!!! @Foxtrot REALLY made my day yesterday! 🥳 Hak5 have sponsored me with the latest WiFi Pineapple MKVII 😍 I can't wait to check it out, and start developing stuff for it! Thank you so much @Foxtrot , @Darren Kitchen and everyone else at Hak5 ❤
  6. Oh Snap, thanks for the heads up. I think my inbox was full. I've written tons of pm's here before. It should be fixed now. 👍🏻
  7. Yeah i'm still rocking the Tetra/Nano 😢 Haven't been able to get the latest Pineapple(s) due to some financial issues this last year.😕 I would love to have one though, and to keep packages such as Bettercap up-to-date for it as well! ❤️ Perhaps Hak5 would like to sponsor me with one? 🙊
  8. I'll take a look into it. Thanks for reporting any issues to me. Might be related to alot of updates to the tools in question. EDIT: Try testing now. I've updated the project, some parts of the installer script had broken due to github updating their website.
  9. Ohh, yeah, you are right, it's ath_warn. I wasn't aware that the patch was live already! That's awesome! I was afraid it would take a long time, and make these tools harder to use on the Pineapples. Yeah, disregard my comment! 🙂
  10. Are you able to use to the Pineapples WEB interface? If yes, try checking if you have any firewalls/anti-virus blocking your attempts.
  11. Your pineapple is NOT a wireless adapter!! It's an embedded device running it's own version of Linux, getting power from the USB port. So NO, you can NOT run the pineapple as wlan0 on your kali installation. However, you are able to SSH into the Pineapple, and then use the Pineapple wifi chips. I recommend using wlan1 for monitor-mode.
  12. It's able to capture the handshakes of WPA/WPA2 networks, as well as capturing the PMKID and doing WPS attacks. (Just like you can do on your kali installation) There's not a guarantee of getting access to any network.
  13. Seems to be related to a bug with the ath9k_htc drivers. (https://hashcat.net/forum/thread-6661-post-47187.html#pid47187) I reckon this gets backported into openwrt as soon as they have a fix for it. This bug is the reason @ZerBea dropped ar9271 support on hcxdumptool.
  14. What you are describing sounds to me like hcxdumptool are successfully capturing what would normally be 5ghz clients on the 2.4ghz range. Which is quite normal. I really doubt that hcxdumptool are actually taking your wlan0/wlan1 interface into the 5ghz channel range. That would be an impossible feat. 🙂
  15. Routers are considered small embedded devices running a custom variant of Linux on a MIPS/ARM CPU. So yeah, totally possible for a router with vulnerabilities to get "infected".
  16. So you are able to deauth then? I'm a little confused. My last post lists alternatives you can try out, if you're having issues with capturing handshakes.
  17. If you're unable to deauth, you can still try to capture handshakes the moment when people are connecting to the wifi. For example by capturing 24/7. Other attack vectors to try is WPS vulnerabilities with reaver and/or pixiewps, or trying to capture the PMKID with hcxdumptool.
  18. I recommend reading up on "protected management frames". Which can be an issue now a days when trying to de-auth certain APs 🙂
  19. I currently have my Raspberry Pi 4 (4GB) setup running Kismet. I then have both my Pineapple Nano and Tetra running "kismet-remote", sending the captures to the Kismet server on the Raspberry Pi. The Tetra is actually powerful enough to run the main kismet server, though not with the same peformance as on the Raspberry. Using the above setup gives me the same peformance as running kismet on my desktop.
  20. Huge changes came with fw 2.6.0. So most modules does not work "out of the box" on older firmwares! If you need some packages that still works on the older firmwares, you can check out the "packages-15.05" branch on my github repo: "openwrt-useful-tools". (Link below) https://github.com/adde88/openwrt-useful-tools/tree/packages-15.05
  21. Yeah, Kismet is working perfectly on both devices. :)
  22. Glad you got it sorted out. There's not any known issues with the latest firmware (2.6.2) afaik. The firmware is working perfectly fine for me, on both my Tetra and Nano. However, some modules are deprecated, and needs to be updated by their authors to keep up with the changes in the firmware, as 2.6.0 contained a lot of changes!
  23. Strange. What firmware version are you running on your Pineapple? The version you're trying to install is the official releases from OpenWRT's repositories, which i can confirm is working on all firmware versions > 2.6.0
  24. I've tweaked the script a bit, and updated the packages in the repo. This script will install hcxdumptool and hcxtools from the default openwrt repos IF it's launched without any arguments. To install the latest bleeding-edge versions (from my repo) you need to launch the script with the -c argument Examples from terminal: root@pineapple:~/hcxtools-hcxdumptool-openwrt$ ./INSTALL.sh root@pineapple:~/hcxtools-hcxdumptool-openwrt$ ./INSTALL.sh -c If you have any errors, try checking that the script is executable before reporting back. (chmod +x INSTALL.sh)
  • Create New...