Jump to content

Zylla

Dedicated Members
  • Content Count

    639
  • Joined

  • Last visited

  • Days Won

    41

Everything posted by Zylla

  1. I'll take a look into it. Thanks for reporting any issues to me. Might be related to alot of updates to the tools in question.
  2. Ohh, yeah, you are right, it's ath_warn. I wasn't aware that the patch was live already! That's awesome! I was afraid it would take a long time, and make these tools harder to use on the Pineapples. Yeah, disregard my comment! 🙂
  3. Are you able to use to the Pineapples WEB interface? If yes, try checking if you have any firewalls/anti-virus blocking your attempts.
  4. Your pineapple is NOT a wireless adapter!! It's an embedded device running it's own version of Linux, getting power from the USB port. So NO, you can NOT run the pineapple as wlan0 on your kali installation. However, you are able to SSH into the Pineapple, and then use the Pineapple wifi chips. I recommend using wlan1 for monitor-mode.
  5. It's able to capture the handshakes of WPA/WPA2 networks, as well as capturing the PMKID and doing WPS attacks. (Just like you can do on your kali installation) There's not a guarantee of getting access to any network.
  6. Seems to be related to a bug with the ath9k_htc drivers. (https://hashcat.net/forum/thread-6661-post-47187.html#pid47187) I reckon this gets backported into openwrt as soon as they have a fix for it. This bug is the reason @ZerBea dropped ar9271 support on hcxdumptool.
  7. What you are describing sounds to me like hcxdumptool are successfully capturing what would normally be 5ghz clients on the 2.4ghz range. Which is quite normal. I really doubt that hcxdumptool are actually taking your wlan0/wlan1 interface into the 5ghz channel range. That would be an impossible feat. 🙂
  8. Routers are considered small embedded devices running a custom variant of Linux on a MIPS/ARM CPU. So yeah, totally possible for a router with vulnerabilities to get "infected".
  9. So you are able to deauth then? I'm a little confused. My last post lists alternatives you can try out, if you're having issues with capturing handshakes.
  10. If you're unable to deauth, you can still try to capture handshakes the moment when people are connecting to the wifi. For example by capturing 24/7. Other attack vectors to try is WPS vulnerabilities with reaver and/or pixiewps, or trying to capture the PMKID with hcxdumptool.
  11. I recommend reading up on "protected management frames". Which can be an issue now a days when trying to de-auth certain APs 🙂
  12. I currently have my Raspberry Pi 4 (4GB) setup running Kismet. I then have both my Pineapple Nano and Tetra running "kismet-remote", sending the captures to the Kismet server on the Raspberry Pi. The Tetra is actually powerful enough to run the main kismet server, though not with the same peformance as on the Raspberry. Using the above setup gives me the same peformance as running kismet on my desktop.
  13. Huge changes came with fw 2.6.0. So most modules does not work "out of the box" on older firmwares! If you need some packages that still works on the older firmwares, you can check out the "packages-15.05" branch on my github repo: "openwrt-useful-tools". (Link below) https://github.com/adde88/openwrt-useful-tools/tree/packages-15.05
  14. Yeah, Kismet is working perfectly on both devices. :)
  15. Glad you got it sorted out. There's not any known issues with the latest firmware (2.6.2) afaik. The firmware is working perfectly fine for me, on both my Tetra and Nano. However, some modules are deprecated, and needs to be updated by their authors to keep up with the changes in the firmware, as 2.6.0 contained a lot of changes!
  16. Strange. What firmware version are you running on your Pineapple? The version you're trying to install is the official releases from OpenWRT's repositories, which i can confirm is working on all firmware versions > 2.6.0
  17. I've tweaked the script a bit, and updated the packages in the repo. This script will install hcxdumptool and hcxtools from the default openwrt repos IF it's launched without any arguments. To install the latest bleeding-edge versions (from my repo) you need to launch the script with the -c argument Examples from terminal: root@pineapple:~/hcxtools-hcxdumptool-openwrt$ ./INSTALL.sh root@pineapple:~/hcxtools-hcxdumptool-openwrt$ ./INSTALL.sh -c If you have any errors, try checking that the script is executable before reporting back. (chmod +x INSTALL.sh)
  18. I'll take a look at the install script and see what's causing problems. Thanks for reporting the problem. 😊
  19. Every single dependency is accounted for in the script. The dependency that seems to be missing in your installation is "musl-fts". This will happen most often if the Pineapple doesn't have a working internet connection while installing, or if "opkg update" has not been run / is not working. Easiest fix would be to run this one liner over SSH: "opkg update ; opkg install musl-fts -d sd"
  20. You clone it to /sd/modules, AND create a sym-link (shortcut) to "/pineapple/modules/sslsplitdirectory". This will make the module appear in the web interface. This sym-link process is mentioned in the instructions and the tutorial. Don't use the exact directory name i wrote above. 🙂
  21. I suspect the Pineapple couldn't find the SD card, and was writing to the internal memory. Explaining why you got the error message regarding "out of space". I can see that it's mounted correctly now. Do you still get the same error when trying to clone the directory to: /sd/modules/ ?
  22. Try replacing https with git. That might do the trick. 🙂 example: git clone git://github.com/adde88/SSLSplitNG
  23. I just posted a video guide showing how to install this on your Pineapple to YouTube. https://youtu.be/ZZ64E1GhL0c Sorry for the delay, but i don't usually make videos like this. The audio on the video is not that great. But if enough people are interested, i'll purchase a mic. Perhaps i can create more related videos for some of my other projects I've compiled for the Pineapple. 🙂
×
×
  • Create New...