Jump to content

Fallen Archangel

Active Members
  • Content Count

    106
  • Joined

  • Last visited

  • Days Won

    3

1 Follower

About Fallen Archangel

  • Rank
    "I will save you, I swear."
  • Birthday March 6

Profile Information

  • Gender
    Male
  • Location
    Oklahoma, US

Recent Profile Visitors

2,302 profile views
  1. Hello, I haven't been around for a while and I'm interested in purchasing either Bash Bunny or Packet Squirrel devices. I'm not sure which would fit my needs better. I'm mainly wanting to be able to drop this device and use get a remote VPN/SSH connection. I'm just an amature messing with these devices for fun, so I feel like the packet squirrel can do this in a much more user friendly way. And it has expandable storage which is a big plus. Looking through the payloads on GitHub, I noticed the I Hate WiFi one is using wlan0, but I'm not able to find any mention of it having wireless onb
  2. Hello I'm known as the local "tech kid" around the neighborhood, and I've been asked to do some stuff at a high school graduation later today. I brought up the same thing that that was done here, and know I'm trying to think of good SSIDs to broadcast. Any ideas? Thank you.
  3. At the thirty second mark of "Tiny Hardware Firewall Review"
  4. I've had it working with these same devices before, but that was many hard resets ago so I don't remember how I did it. And dropbear doesn't support anyrhing like verbose mode. It doesn't support -o StrictHostKeyVerification=no either, so I can't use that as a test. It does support dbclient -y -y, which is much the same. But I still get the same error this way.
  5. I've been having some trouble with my router lately. I'm trying to get everything set up for autossh. If I'm logged in to my router and try to connect to my device, I get this error: (192.168.1.176 is the Nano) However, if I'm on my Nano and try connecting to my router, it works perfectly. So it's like a one way connection. Both devices have all the proper keys added, so no passwords are needed. My router is using SSH-2.0 Dropbear 2014.63, and the pineapple of course uses SSH-2.0 OpenSSH 6.8. The firmware of the router is DD-WRT-v24 sp2 std P.S. I posted the question here as I don't
  6. He basically did everything I did. Almost word for word except the small changes like channel number/bssid/ and wlan1mon.
  7. So yesterday it occured to me that I've never actually cracked a WEP network. I've heard that it's extremely easy, so I figured I'd give it a try. From what I was reading I seen you needed clients connected, and they needed to be active. I took an old router with DDWRT on it and dropped it to WEP encryption and added three clients and booted up a Kali live cd. Step one: I put my card into monitor mode. (It's the ALFA NEH from the Hak5 store) Step Two: I ran airodump to start capturing the packets. "Airodump-ng -c 1 -w WEP --essid Fallen wlan1mon" (And I also tried everything again using
  8. Unfortunately I've never messed with PHP, so I can't make infusions or modules. But if you don't mind using SSH Wifite is a great way to go. I've never tried it on the nano but there is also AutoPixieWPS to consider, although it's limited to only pixiedust attacks.
  9. I have the S4 and mine works. Make sure on your settings you don't have the SSID hidden, and that you put it in the list of allowed devices.
  10. While the Nano doesn't have 5G or built in amplifiers, I believe it would work fine for this. You could always use something like kismet from command line, the pineapples have a nice UI that can record things. I'll upload an example of a report if you'd like.
  11. As far as connecting to hotspots, do this. First connect to the WiFi from the Nano's network page. Then on whichever device you have connected to the Nano, try to browse the internet. On that device it will show the portal. Example: Nano is connected to FreeWiFi My phone is connected to my Nano's AP On my phone, go to www.google.com The portal page appears, agree to the terms or whatever and click continue. Now the nano has internet access, and so do the devices connected. This has worked on every portal I've tried except for one, which used some weird form of mac address tracking.
  12. The SSH server I'm using this with has a banner that authentication banner that displays whenever you connect with ssh (Just the standard, "Hey don't mess with this device!" type message). Will autossh still work with this server? If not, is there anything I can do about this, aside from removing the banner? Thanks!
  13. It's installed. Airmon-ng is part of the aircrack-ng suite.
  14. Word of warning, doing it this way will only allow wifite to scan for 5 seconds before attempting to start attacking networks. 5 seconds isn't long enough, I'd say 20-30 would be a better choice. 120 would be even better.
  15. I know a lot of devices will stop probing for other networks if they are already connected to one.
×
×
  • Create New...