Jump to content

johnjdoe

Active Members
  • Content Count

    39
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by johnjdoe

  1. http://seclists.org/bugtraq/2015/Aug/52 Moderator notice: This issue has been fixed in version 2.4.0 of the WiFi Pineapple firmware.
  2. Thank you for your effort! :-) Unfortunately I could not discover the promised mitm proxy ... Did your plans change?
  3. I can confirm that MITMf works fine against some SSL targets. When HSTS is used it depends on the browser too, but I can confirm that with an older version of Chrome an SSLStrip attack against mail.google.com accomplished his objectives. I hope that Seb will include a working MITM proxy in the Pineapple as promised ...
  4. Kevin Mitnicks live hack at CeBIT Global Conferences 2015: Pineapple is used starting minute 38 ...
  5. I thought this too but as I told/asked in https://forums.hak5.org/index.php?/topic/33488-got-pineapnot-pineapple-questions-let-me-answer-them/page-5#entry256968 , it seems that there's a problem or even a bug: When I connect an external USB WIFI (what I bought at Hak5 with my Pineapple) it appears in the GUI as WLAN2. I enable WLAN0, WLAN1 and WLAN2 and put WLAN2 in client mode. After connecting it, WLAN1 and WLAN2 are disabled and the client connection is established with WLAN0! Do you have perhaps other (more promising) experiences with an external wlan2?
  6. Or was it the answer to my textual question? So, DNS hosts => YES, URL => NO ...
  7. Is this one the "first" for you? Because the other "first" was already in the config as an example ... domain2.com/sub *.domain1.* Thanks!
  8. Hi, is it possible to use DNS hosts or even URLs in DNS spoofing? Like this: 172.16.42.1 example.com domain2.com/sub *.domain1.* google.com bing.com Thank you in advance for your answers!
  9. Thank you Crazy52! This worked fine. Here is the result: root@Pineapple:~# route add default gw 172.16.42.42 br-lan root@Pineapple:~# route Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface default 172.16.42.42 0.0.0.0 UG 0 0 0 br-lan 172.16.42.0 * 255.255.255.0 U 0 0 0 br-lan root@Pineapple:~# ping www.google.de PING www.google.de (194.78.99.158): 56 data bytes 64 bytes from 194.78.99.158: seq=0 ttl=57 time=26.155 ms 64 bytes from 194.78.99.158: seq=1 ttl=57 time=25.901
  10. Hi all, I followed the instructions from here: http://wiki.wifipineapple.com/#!ics.md The result is the following: Pineapple Netmask [255.255.255.0]: Pineapple Network [172.16.42.0/24]: Interface between PC and Pineapple [eth0]: Interface between PC and Internet [wlan0]: Internet Gateway [192.168.1.1]: IP Address of Host PC [172.16.42.42]: IP Address of Pineapple [172.16.42.1]: _ . ___ \||/ Internet: 192.168.1.1 - wlan0 ( _ )_ <--> [___] <--> ,<><>, Computer: 172.16.42.42 (_ _(_ ,) \___\ '<><>' Pineapple
  11. I have some questions / problems with my Mark V (latest release): 1. Question: Is it normal that the blue and red LED are not (always) on even when WLAN0 and WLAN1 are enabled in the GUI? 2. Questions: Is it right that I have to enable WLAN0 for sending SSIDs that I have collected or entered manualy in PineAP? Is it right that I have to enable Dogma and MK5 Karma too for distributing these SSIDs? 3. Problem: On a Win7 target I can see temporarily the manualy entered SSID but it disappears after a second or two. Then appears again and disappears etc. Do you have an explanation for this effec
  12. Nice, cause I love some features of CSploit / zAnti. I think you mean that something like that will come with the new MITM proxy? Could you perhaps tell us a little bit more about the roadmap / timeline? ;-)
  13. That's in fact a nice idea! Thank you!
  14. Hi all, I received my USB Rubber Ducky it is some month ago. Now, I have the time to test it. The first test I made was putting it in a Windows machine and I got the "Hello world". :-) I would like to demonstrate the danger from bad USB and for that I tried a reverse shell as this: With the payload generator from http://ducktoolkit-411.rhcloud.com/Home.jsp I generated a inject.bin with the IP and the listener port from my Kali machine and the keyboard layout from my target (Belgian keyboard). Delay 3000. On the Kali box I started the listener. On a Windows 7 Home Premium (SP1) with the
  15. Thanks Seb for the release! Great work! We are now waiting with impatience and anticipation the announced MITM proxy ... :-)
  16. Hi all, just saw the interesting project WifiPhisher (https://github.com/sophron/wifiphisher) and asked myself if it could not be a nice feature/infusion for the MKV? Sorry, I'm not able to code this infusion but perhaps could it be a challenge for somebody else (in the future)? ;-)
  17. This is perhaps a little bit OT, but yesterday I found the Lucy Phishing Server (http://phishing-server.com/). This could be a nice alternative if you want do some more specific phishing campaigns ...
  18. Yeah, a merry xmas to all from Belgium too! We don't have a white Christmas but snow is announced for the next days ... :-)
×
×
  • Create New...