Jump to content

crazyclown

Active Members
  • Posts

    39
  • Joined

  • Last visited

  • Days Won

    2

Recent Profile Visitors

1,201 profile views

crazyclown's Achievements

Newbie

Newbie (1/14)

  1. crazyclown

    sslstrip

    Unless the victim is using Internet Explorer, I don't see the point of having SSL Strip as it is obsolete now. If we could use Delorean, SSL Strip 2 and DNS2Proxy then we would be talking.
  2. Pretty neat, would be sweet if it worked with the Tor module. Will test and update. Thumbs up for coming up with the idea. How slow is it exactly in regards to download speed?
  3. ; Thanks for taking the time out to respond, much appreciated. The whole quoting thing is giving me a headache so I will type up my response all in one. I have no doubt the Nano will be a new experience, as I mentioned before I will most probably get one. I am not implying in any way that you guys didnt work hard on it or that you dont deserve recognition, quite the contrary actually. As a WiFi pentesting enthusiast much of my work has been possible because of your gadgets. You mentioned: If you bought a Mark V for $100 at launch you received over 2 years of firmware updates including additional features such as PineAP for free. That's the sort of customer service we're committed to and I'd say that's above and beyond the industry norm. Which is totally correct, however Id rather pay $200 for the device and expect 4 years of firmware updates rather than having to pay for a new device which isnt really that much different and thats the point Im trying to make. Once again you mentioned: Would you pay for the new system on the Mark V? And the answer is no, but I would pay more for the Mark V and expect updates for much longer, and Im sure many here feel the same way. Just look at Apple, most of what youre paying is for the constant software updates, the hardware itself costs like a 1/5 of the actual price. What it boils down to is the short comings of the Mark V, for instance, limited RAM. For anyone who has done a penitent for more than 5 minutes, you will notice that the Mark V eventually becomes non response and auto reboots and if you dont have a cron job in place, you need to start all over again. Has this been addressed in the Nano? SSL Strip is obsolete, and so is SSL Strip 2 unless it is combined with DNS2Proxy and Delorean. Is this something that has/will be implemented in the Nano? For those who have used the Mark V inside out, you will understand where I am coming from. All Im saying is, when I heard about the new Pineapple, I expected some serious updates besides a shiny new web interface but based on what I have seen and read it doesnt seem to be the case. I could be wrong and the new device can and will do all the points I have mentioned, but based on the information you have provided so far, it doesn't appear to be the case.
  4. Okay so the new gadget looks cool, no doubt, so job well done. But I can't be the only one who notices that it's no different from the Mark V, just smaller and with a better web interface, something they could have easily accomplished with the Mark V, but then again that wouldn't drive sales. Rather cheeky if you ask me. Yes yes i understand the RTL8187 is discontinued and you had to come up with something new, but come on, you can't seriously say you couldn't develop the new web interface for the Mark V as well. The point I'm trying to make is, a lot of people spent good hard earned money of the Mark V, and it's disappointing to see that you're just going to push that to the side with no updates or support, especially when the new Pineapple is pretty much the exact same thing. You can very easily continue support and updates for both side by side but i doubt you will. Still dont believe me? I'll bet the new Pineapple still doesnt have SSL Strip 2 or DNS2Proxy, so how different is it really from the old Pineapple? I hope I'm wrong, and if I am win win for everybody, and if I'm not, well I told you so. Lastly, no I'm not trolling, credit where it's due, the LAN Turtle was a genius invention, hats off to the Hak5 Team for making that happen, but this just seems like a stunt for driving sales. Before a moderator swoops down and tires to save the day, let me just say, relax. You will get my money, there is a good chance I will get the new Pineapple, because I can afford to, but I know there are a lot of people out there who can't and this is for them.
  5. Sounds to me like wlan1 is in use, Reaver and Wash won't work if it is.
  6. Very useful update, it's doesn't get simpler than this.
  7. You have connected the Ethernet cable right? Also you could try this method although I'm not sure if it will work if you just flashed it: 1. Connect Pineapple to your router via Ethernet. 2. Check your router for connected devices and find the IP of the Pineapple. 3. Try to connect with: IPFROMROUTER:1471
  8. Install Apache on the laptop and forward all traffic from the Pineapple using dnsspoof or iptables. Although if hosting a website is all you want to do, the Pineapple runs Nginx, so you don't really need the laptop.
  9. Its "tmp" and not "temp". Try "cd /tmp" I kept getting the mismatch error myself so had to do it manually.
  10. Tested, works wonders! Haven't had any issues yet, although the brute force (-f) takes considerably longer than a laptop/PC, but that's due to the Pineapple's low specs.
  11. Still in the process of testing, will let you know how it goes.
  12. Why so serious?

  13. Check your PM, there was a lot to paste so I've just sent you a message.
  14. The -P switch doesn't do anything. root@Pineapple:/sd# reaver -i mon0 -b 9C:97:26:XX:XX:XX -c 1 -vv -P Reaver v1.4 WiFi Protected Setup Attack Tool Copyright © 2011, Tactical Network Solutions, Craig Heffner <cheffner@tacnetsol.com> reaver: invalid option -- P [+] Switching mon0 to channel 1 Required Arguments: -i, --interface=<wlan> Name of the monitor-mode interface to use -b, --bssid=<mac> BSSID of the target AP Optional Arguments: -m, --mac=<mac> MAC of the host system -e, --essid=<ssid> ESSID of the target AP -c, --channel=<channel> Set the 802.11 channel for the interface (implies -f) -o, --out-file=<file> Send output to a log file [stdout] -s, --session=<file> Restore a previous session file -C, --exec=<command> Execute the supplied command upon successful pin recovery -D, --daemonize Daemonize reaver -a, --auto Auto detect the best advanced options for the target AP -f, --fixed Disable channel hopping -5, --5ghz Use 5GHz 802.11 channels -v, --verbose Display non-critical warnings (-vv for more) -q, --quiet Only display critical messages -h, --help Show help Advanced Options: -p, --pin=<wps pin> Use the specified 4 or 8 digit WPS pin -d, --delay=<seconds> Set the delay between pin attempts [1] -l, --lock-delay=<seconds> Set the time to wait if the AP locks WPS pin attempts [60] -g, --max-attempts=<num> Quit after num pin attempts -x, --fail-wait=<seconds> Set the time to sleep after 10 unexpected failures [0] -r, --recurring-delay=<x:y> Sleep for y seconds every x pin attempts -t, --timeout=<seconds> Set the receive timeout period [5] -T, --m57-timeout=<seconds> Set the M5/M7 timeout period [0.20] -A, --no-associate Do not associate with the AP (association must be done by another application) -N, --no-nacks Do not send NACK messages when out of order packets are received -S, --dh-small Use small DH keys to improve crack speed -L, --ignore-locks Ignore locked state reported by the target AP -E, --eap-terminate Terminate each WPS session with an EAP FAIL packet -n, --nack Target AP always sends a NACK [Auto] -w, --win7 Mimic a Windows 7 registrar [False] Example: reaver -i mon0 -b 00:90:4C:C1:AC:21 -vv
×
×
  • Create New...