Jump to content

Fallen Archangel

Active Members
  • Posts

    106
  • Joined

  • Last visited

  • Days Won

    3

1 Follower

About Fallen Archangel

  • Birthday March 6

Profile Information

  • Gender
    Male
  • Location
    Oklahoma, US

Recent Profile Visitors

3,030 profile views

Fallen Archangel's Achievements

Newbie

Newbie (1/14)

  1. Hello, I haven't been around for a while and I'm interested in purchasing either Bash Bunny or Packet Squirrel devices. I'm not sure which would fit my needs better. I'm mainly wanting to be able to drop this device and use get a remote VPN/SSH connection. I'm just an amature messing with these devices for fun, so I feel like the packet squirrel can do this in a much more user friendly way. And it has expandable storage which is a big plus. Looking through the payloads on GitHub, I noticed the I Hate WiFi one is using wlan0, but I'm not able to find any mention of it having wireless onboard The Bash Bunny also has rubber ducky like capabilities, and only requires a USB port. As far as I'm aware there is not expandable storage options, but if it can create a VPN/SSH session I wouldn't mind losing that. I'm not concerned about the price difference, so I think my main question is if the bash bunny can create a VPN/SSH tunnel, and if there would be any benefit to getting one over the other for this purpose. Lastly, I'm wondering if the packet squirrel has wireless, or a USB port to add a USB adapter. I like the other things the bash bunny offers, but I'm mainly focused on remote access. Thank you for reading all of this.
  2. Hello I'm known as the local "tech kid" around the neighborhood, and I've been asked to do some stuff at a high school graduation later today. I brought up the same thing that that was done here, and know I'm trying to think of good SSIDs to broadcast. Any ideas? Thank you.
  3. At the thirty second mark of "Tiny Hardware Firewall Review"
  4. I've had it working with these same devices before, but that was many hard resets ago so I don't remember how I did it. And dropbear doesn't support anyrhing like verbose mode. It doesn't support -o StrictHostKeyVerification=no either, so I can't use that as a test. It does support dbclient -y -y, which is much the same. But I still get the same error this way.
  5. I've been having some trouble with my router lately. I'm trying to get everything set up for autossh. If I'm logged in to my router and try to connect to my device, I get this error: (192.168.1.176 is the Nano) However, if I'm on my Nano and try connecting to my router, it works perfectly. So it's like a one way connection. Both devices have all the proper keys added, so no passwords are needed. My router is using SSH-2.0 Dropbear 2014.63, and the pineapple of course uses SSH-2.0 OpenSSH 6.8. The firmware of the router is DD-WRT-v24 sp2 std P.S. I posted the question here as I don't think it's anything pineapple-specific. Feel free to move it if needed.
  6. He basically did everything I did. Almost word for word except the small changes like channel number/bssid/ and wlan1mon.
  7. So yesterday it occured to me that I've never actually cracked a WEP network. I've heard that it's extremely easy, so I figured I'd give it a try. From what I was reading I seen you needed clients connected, and they needed to be active. I took an old router with DDWRT on it and dropped it to WEP encryption and added three clients and booted up a Kali live cd. Step one: I put my card into monitor mode. (It's the ALFA NEH from the Hak5 store) Step Two: I ran airodump to start capturing the packets. "Airodump-ng -c 1 -w WEP --essid Fallen wlan1mon" (And I also tried everything again using BSSIDs, but no difference.) Step Three: Wait for IVs. Step Four: Speed up the process. A.K.A. Where the problem starts. The first step was to run aireplay-ng -1 0, I believe this is some sort of fake authentication. I got the message "Sending authorization request" over and over. One had (ACK) beside it, the rest said (OPEN). Next I needed to run aireplay-ng -3, which was supposed to look for or create ARP packets I believe. Unfortunately, It was showing that it was reading tons of packets, but never found a single ARP request. Considering by this time I only had about 200 IVs, I figured I was doing something wrong. So I decided to use automated tools to see if it worked. My first try was my beloved Wifite. "wifite -c 1 -wep -e Fallen" It gets all the way to the actual attack. Here it tries about seven different types of attacks (Chop-Chop, Fake Authentication, Ect) All of them fail, and by the time it's done I have about 19 IVs. Just for the heck of it I also tried to use the Fern-wifi-cracker, which wasn't any different. Thinking maybe it was either y laptop or the card causing the issue, I tried the same steps on my NANO. I used wlan1, and then also tried the NEH again. Can anyone tell me what I'm doing wrong here? Thanks. If you need any more information just let me know.
  8. Unfortunately I've never messed with PHP, so I can't make infusions or modules. But if you don't mind using SSH Wifite is a great way to go. I've never tried it on the nano but there is also AutoPixieWPS to consider, although it's limited to only pixiedust attacks.
  9. I have the S4 and mine works. Make sure on your settings you don't have the SSID hidden, and that you put it in the list of allowed devices.
  10. While the Nano doesn't have 5G or built in amplifiers, I believe it would work fine for this. You could always use something like kismet from command line, the pineapples have a nice UI that can record things. I'll upload an example of a report if you'd like.
  11. As far as connecting to hotspots, do this. First connect to the WiFi from the Nano's network page. Then on whichever device you have connected to the Nano, try to browse the internet. On that device it will show the portal. Example: Nano is connected to FreeWiFi My phone is connected to my Nano's AP On my phone, go to www.google.com The portal page appears, agree to the terms or whatever and click continue. Now the nano has internet access, and so do the devices connected. This has worked on every portal I've tried except for one, which used some weird form of mac address tracking. I never could figure out how to make it work correctly. So yes, some may be different, but this should work for most.
  12. The SSH server I'm using this with has a banner that authentication banner that displays whenever you connect with ssh (Just the standard, "Hey don't mess with this device!" type message). Will autossh still work with this server? If not, is there anything I can do about this, aside from removing the banner? Thanks!
  13. I know a lot of devices will stop probing for other networks if they are already connected to one.
  14. Samsung Galaxy S4 Stock ROM (Rooted) It's an AT&T phone, but I'm using it on a different network, so I can only use wifi tethering, not usb. I use the JuiceSSH app.
  15. You need to re-add it to your known hosts. (It's a file in /var/root/.ssh/)I've you don't know what this is, and you don't use ssh for anything else, it's probably save to just rename or remove it. Run this command and try it again. mv /var/root/.ssh/known_hosts /var/root/.ssh/known_hosts_backup Whenever you connect to a device with ssh, your computer will save a fingerprint of the device. This is saying that the fingerprint of the device is different from what it expects, so it's blocking it. (Happens whenever you do a factory reset or something.)
×
×
  • Create New...