Jump to content

calguy

Members
  • Posts

    4
  • Joined

  • Last visited

Everything posted by calguy

  1. Thank you Mr. P for your reply. Interestingly, I bought the AWUS036NEH when I purchased the Mark V. It has b/g/n capability. I have it plugged into the USB port but it's the wireless interface that I use to connect to the Mark V, and I use ethernet to connect it to the internet. Do I need to enable one of the other wireless i/f to make this work?
  2. Hello, My AP (Buffalo) has 2 wireless , 802.11b, and one for 802.11n/a. When I go into recon mode, it only detects the 802.11b SSID, and never the 802.11n/a, no matter how long I allow it to scan. Also one other thought - when you click on the open access point said , its hidden by default. If I try to connect to this via my wireless adapter, without a password, it says network not found. This should be similar to not broadcasting your said on a standard wireless connection, however you can still connect. If I uncheck to not hidden, it can find it fine. I was planning on testing with this SSID, to see if I can death my own connection, and how the other tools work with it. Any thoughts on these 2 questions? Thank you!
  3. Hi Does anyone have any thoughts on any of my above questions? Thank you
  4. Hello, Just got my pineapple and flashed firmware, and watching some videos and have several questions. 1) I see that Dogma is used to transmit beacon frames at very high rates to respond to probe requests. Still it's a timing issue, and wouldn't a laptop connect to the highest signal strength (real AP)? On that same topic, what is the signal strength of the wifi radio on the Pineapple relative to that of a typical wifi router? With the included antennas , what are distance limitations? 2) When testing, if you want to target say 3 laptops, not the entire building, or area, can you specify the mac addresses of three? I saw that it has provision to offer one? 3) Realism.. one thing that concerns me -> if you turn it on, and it populates a large number of ssids, if you look at the wireless icon (which I always do), you would see two of every ssid, the real one, and the non secure one, ie: linksys with a lock, linksys without a lock, .... and a complete list. This certainly is a major tip off, and also very obvious. Thoughts on this? 4) Know about sslstrip (hsts) , dnsspoof, and the comments about dns caching. Yes, you can do things with routing which were mentioned, but there was talk about a new mitm, i believe mitmf project. Anything new in that arena? 5) What infusions for the Mark V are your favorites in pentesting? Thank you! I'm glad to be part of this extremely interesting community.
×
×
  • Create New...