Jump to content

sud0nick

Dedicated Members
  • Posts

    1,056
  • Joined

  • Last visited

  • Days Won

    66

Posts posted by sud0nick

  1. I use VAS (Vintela Authentication Services) which is also known as QAS (Quest Authentication Services) which now appears to be owned by OneIdentity.  It works really well for AD authentication on Linux hosts.  I'm not sure where you can get the version that I use but you can check OneIdentity's trial downloads for something similar (https://www.oneidentity.com/trials).

    Edit: I should mention I use it on RHEL and haven't tried on Ubuntu but I'm sure they provide an appropriate package for your system.

  2. 6 hours ago, Roatandave said:

    Thank you for looking, I found this program on the net and is only a starting point, an idea and yes it is a mess right now. I am not a programmer or a developer, just an old fart with some time to kill and enjoying the mental exercise.

    I suggest you re-read my earlier post.  I'll quote it for convenience.  Pay particular attention to the paragraph that details how you can build this module without using a Python script you've found online.

    On 2/12/2017 at 1:21 PM, sud0nick said:

    I think the first thing you need to understand is the architecture of a module.  You could watch the video that Seb and Darren put together a while back on building modules but I'll give a quick description here.

    index.html - The homepage of your module.  It contains all of the code to display the features of your module to the user.  It also contains elements of AngularJS to bind controls to functions in your module.js file.

    js/module.js - Includes an AngularJS controller with all necessary code to interface between index.html and module.php asynchronously.

    api/module.php - Contains the server-side code that performs tasks when called by module.js.

    In the case of building a web terminal it would be as simple as having a textarea in index.html with a javascript event that fires every time return is pressed.  When the event fires it would call a function within module.js that extracts the last line of text from the data within the textarea (this can be a variable within your scope that is simply bound to the textarea).  It then sends an AJAX request to module.php which takes the line, runs it through a function like shell_exec and returns the output to module.js.  When it's received, your function in module.js appends the returned data to the scoped variable that's bound to your textarea and it automatically gets updated in the user interface.

    Of course it would take a bit more work than this to make everything look exactly like a shell, and for it to be secure, but the basic functionality really is simple.

     

    • Like 1
  3. I think the first thing you need to understand is the architecture of a module.  You could watch the video that Seb and Darren put together a while back on building modules but I'll give a quick description here.

    index.html - The homepage of your module.  It contains all of the code to display the features of your module to the user.  It also contains elements of AngularJS to bind controls to functions in your module.js file.

    js/module.js - Includes an AngularJS controller with all necessary code to interface between index.html and module.php asynchronously.

    api/module.php - Contains the server-side code that performs tasks when called by module.js.

    In the case of building a web terminal it would be as simple as having a textarea in index.html with a javascript event that fires every time return is pressed.  When the event fires it would call a function within module.js that extracts the last line of text from the data within the textarea (this can be a variable within your scope that is simply bound to the textarea).  It then sends an AJAX request to module.php which takes the line, runs it through a function like shell_exec and returns the output to module.js.  When it's received, your function in module.js appends the returned data to the scoped variable that's bound to your textarea and it automatically gets updated in the user interface.

    Of course it would take a bit more work than this to make everything look exactly like a shell, and for it to be secure, but the basic functionality really is simple.

    • Upvote 2
  4. 11 hours ago, shadowmmm said:

    JUST FYI it wouldnt be for the Nano anyway he is asking for 2.4Ghz and 5Ghz so most likely the TETRA

    line 12 Use both wifi cards if possible for 5ghz (TETRA) as well as 2ghz

    Will be following

    You can still make it for the NANO, too.  Just disable the 5GHz feature.

  5. 1 hour ago, lild4d said:

    Thanks mubix for resurrecting the Nano!!!

    I think you misunderstood his post.  He's not building this module, he is simply requesting that someone else build it and has laid out requirements.

    I think it's a great idea and I would like to see it implemented.  I would do it myself if I wasn't already too swamped with work and school.

  6. Sort of, the file() function in PHP returns an array of lines from the file.

    $lines = file($ssidFile);

    This allows us to access each line of the file individually by using its index which would be n-1 where n is the line number you want.

    // Echo line 1
    echo $lines[0];
    
    // Echo line 2
    echo $lines[1];

    So to get the number of lines in the file we can use the count() function to count the number of elements in the array.

    echo count($lines);

    In this particular case the SSID file contains one SSID per line.  So the number of lines in the file is equal to the number of SSIDs.  I think Noth may have confused the principle of zero indexing an array with getting its number of elements which is why they subtracted one from the count.

    • Upvote 1
  7. 9 hours ago, Ineffective_Device said:

    Doesn't the decline of tools like SSLSplit and SSLStrip effectively make the pineapple an obsolete tool as nearly all internet traffic at this point uses both HTTPS and HSTS

    The Pineapple does so much more than intercept communications to the internet.  It's great for spoofing, auditing, recon, and much more.  It's really only limited to your capabilities and the laws of physics.

  8. 8 hours ago, Fuylo said:

    Is there a reason you're using BackBox?  Not that there's really anything wrong with it, but I'm pretty sure you're going to get better support, better compatibility with ruby, and more up-to-date libraries with newer Kali and Debian distros.  Don't expect newer tools (especially pen-testing tools) that are updated frequently to work with a distro that hasn't updated their downloadable image in over 6 months.  That's a pretty long time in the world of infosec.

    I posted that almost a year ago...  I doubt any of it is relevant anymore.

  9. 1 minute ago, z3roc00l said:

    I use my pi1's for cctv and pi2 for pihole and pivpn as for my pizero's not found anything worth using them for yet. 

    https://github.com/pi-hole/pi-hole

    https://github.com/pivpn/pivpn

    https://github.com/ccrisan/motioneyeos

    How's the performance of the PiVPN?  I currently use OpenVPN Access Server as a VM on my NUC and was considering building a PiVPN to have dedicated hardware for it but I'm concerned about the network performance.

  10. On 12/9/2016 at 7:01 AM, insyder5000 said:

    ...Another downside was the need for a physical Oracle Database server for the backend. I keep getting told support for virtualization is coming but their support says its still not supported.

    Will DLP not work if your Oracle DB is on a VM?  If that's the case it's very strange.  According to this article Symantec won't support that configuration simply because it's not certified by Oracle, although Oracle will provide support for DB issues even if the server is hosted in a virtual environment.  Where I work we have a few Oracle DB servers on VMs and I don't think we've had any problems because of it.

  11. 2 hours ago, jermzz said:

    You're right. I misunderstood. I thought you were telling me to tether to my laptop. That should work, didn't even clue into that. Thanks :)

    Fun fact, I thought the exact same way a couple years ago and built PortalAuth to automatically authenticate the Pineapple with captive portals (hence the name).  newbi3 pretty much told me the same thing I told you and over time the module evolved into a cloner more than something that just bypasses captive portals.

  12. 19 minutes ago, jermzz said:

    I want to control the pineapple by wifi either than tether from my laptop. Only way I've found so far That works is to use macchanger to clone the mac of my wireless wlan2 with my kali box and then Disconnect / connect  the pineapple 

    You definitely didn't even try what I said...

×
×
  • Create New...