Jump to content

johnjdoe

Active Members
  • Content Count

    39
  • Joined

  • Last visited

  • Days Won

    2

About johnjdoe

  • Rank
    Hak5 Fan +

Profile Information

  • Gender
    Male
  • Location
    Belgium
  • Interests
    Pentesting, security, networks

Recent Profile Visitors

1,439 profile views
  1. http://seclists.org/bugtraq/2015/Aug/52 Moderator notice: This issue has been fixed in version 2.4.0 of the WiFi Pineapple firmware.
  2. Thank you for your effort! :-) Unfortunately I could not discover the promised mitm proxy ... Did your plans change?
  3. I can confirm that MITMf works fine against some SSL targets. When HSTS is used it depends on the browser too, but I can confirm that with an older version of Chrome an SSLStrip attack against mail.google.com accomplished his objectives. I hope that Seb will include a working MITM proxy in the Pineapple as promised ...
  4. Kevin Mitnicks live hack at CeBIT Global Conferences 2015: Pineapple is used starting minute 38 ...
  5. I thought this too but as I told/asked in https://forums.hak5.org/index.php?/topic/33488-got-pineapnot-pineapple-questions-let-me-answer-them/page-5#entry256968 , it seems that there's a problem or even a bug: When I connect an external USB WIFI (what I bought at Hak5 with my Pineapple) it appears in the GUI as WLAN2. I enable WLAN0, WLAN1 and WLAN2 and put WLAN2 in client mode. After connecting it, WLAN1 and WLAN2 are disabled and the client connection is established with WLAN0! Do you have perhaps other (more promising) experiences with an external wlan2?
  6. Or was it the answer to my textual question? So, DNS hosts => YES, URL => NO ...
  7. Is this one the "first" for you? Because the other "first" was already in the config as an example ... domain2.com/sub *.domain1.* Thanks!
  8. Hi, is it possible to use DNS hosts or even URLs in DNS spoofing? Like this: 172.16.42.1 example.com domain2.com/sub *.domain1.* google.com bing.com Thank you in advance for your answers!
  9. Thank you Crazy52! This worked fine. Here is the result: root@Pineapple:~# route add default gw 172.16.42.42 br-lan root@Pineapple:~# route Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface default 172.16.42.42 0.0.0.0 UG 0 0 0 br-lan 172.16.42.0 * 255.255.255.0 U 0 0 0 br-lan root@Pineapple:~# ping www.google.de PING www.google.de (194.78.99.158): 56 data bytes 64 bytes from 194.78.99.158: seq=0 ttl=57 time=26.155 ms 64 bytes from 194.78.99.158: seq=1 ttl=57 time=25.901
  10. Hi all, I followed the instructions from here: http://wiki.wifipineapple.com/#!ics.md The result is the following: Pineapple Netmask [255.255.255.0]: Pineapple Network [172.16.42.0/24]: Interface between PC and Pineapple [eth0]: Interface between PC and Internet [wlan0]: Internet Gateway [192.168.1.1]: IP Address of Host PC [172.16.42.42]: IP Address of Pineapple [172.16.42.1]: _ . ___ \||/ Internet: 192.168.1.1 - wlan0 ( _ )_ <--> [___] <--> ,<><>, Computer: 172.16.42.42 (_ _(_ ,) \___\ '<><>' Pineapple
  11. I have some questions / problems with my Mark V (latest release): 1. Question: Is it normal that the blue and red LED are not (always) on even when WLAN0 and WLAN1 are enabled in the GUI? 2. Questions: Is it right that I have to enable WLAN0 for sending SSIDs that I have collected or entered manualy in PineAP? Is it right that I have to enable Dogma and MK5 Karma too for distributing these SSIDs? 3. Problem: On a Win7 target I can see temporarily the manualy entered SSID but it disappears after a second or two. Then appears again and disappears etc. Do you have an explanation for this effec
  12. Nice, cause I love some features of CSploit / zAnti. I think you mean that something like that will come with the new MITM proxy? Could you perhaps tell us a little bit more about the roadmap / timeline? ;-)
×
×
  • Create New...