Jump to content

KingOfPine@pples

Active Members
  • Posts

    14
  • Joined

  • Last visited

Everything posted by KingOfPine@pples

  1. Trying to upgrade to the 2.4.0 but pineapple is saying "No Upgrade Found." When I try to download the firmware manually using the provided link I get. Error Over QuotaThis application is temporarily over its serving quota. Please try again later. What's the deal? I'm assuming the above is also responsible for the "No Upgrade Found" error.
  2. In regards to the problem being the power adapter, I am using the supplied Mark V power adapter, and I would assume it landed itself on the hak5 approved list using that adapter. In addition, the TL-WN722N uses under 250 mAH or something, so it's hard to imagine that extra 250 mAH is causing a problem, especially when I know the Alfa adapter I mentioned earlier uses more power, and it works with that. Nonetheless, I'll see about trying another power adapter and see if that works out. I haven't got to try it with the 2.4 firmware yet.
  3. Never found anything J5x86? Thanks for trying anyway. It looks like the TL-WN722N needs to be removed from the Supported High Throughput Client Mode Radios list. I bought one because of that thread with input from Hak5, and it turns out it was a waste because it doesn't work, at least not with the current build..
  4. Thanks for confirming that it doesn't work for you either J5x86. I have an Alfa AWUS036H that works as well, but I think that the Alfa can suck up a lot of power compared to the TL-WN722N when I'm mobile, which is why I was attempting to switch. Maybe when Darren originally tested it (not sure if it was him personally or someone in the community) it worked, but a firmware update along the way killed it or something. Happy to provide a log of some sort if it might help. Here's to hoping someone with much more Linux knowledge than me can shed some light on it.
  5. So after finding a topic called "Supported High Throughput Client Mode Radios" I picked up a TP Link model TL-WN722N but it doesn't actually appear to work with the Mark V. The Mark V sees it, I scan for AP with wlan2 , press connect, it goes through the connecting phase and finishes with "Connection initiated. See below for connection details." but below it just says "Not connected" and this is in fact the case; it is not connected. I notice that after I press "Connect to this network" The blue light on the pineapple goes off for a second. I'm not sure if that is an indication of a malfunction or what. Any ideas on if this actually works? Or is it just a fluke on the supported list? Thanks.
  6. Hey Happyjoe, I wanted to know if you could tell me what problems you were having with the TPlink TL-WN722N and if you were able to fix them. I've been having problems too. I mentioned some of the problems in the "Supported high throughput wireless adapters" thread. I can't connect in client mode using the TL-WN722N as wlan2.
  7. The TL-WN722N actually is not working. The Mark V sees it, I scan for AP with wlan2 , press connect, it goes through the connecting phase and finishes with "Connection initiated. See below for connection details." but below it just says "Not connected" and this is in fact the case; it is not connected. I notice that after I press "Connect to this network" The blue light on the pineapple goes off for a second. I'm not sure if that is an indication of a malfunction or what. Any ideas?
  8. So how do you set up an eviltwin on the Pineapple? The nodogsplash module? As far as I can tell the Pineapple has no capibilities to spoof a WEP, WPA, or WPA2 network, even when the password is known. Barry, can you provide some helpful information on how an adversary would execute an attack on a WPA2 or otherwise "protected" network that he already knows the passphrase to? Let's say the attacker is trying to sniff out password or emails or something like that. Just general hackery. I know this has been asked before, but I want to be clear. It it possible for the Pineapple to spoof a WPA2 AP with an evil WPA2 AP when the password is already known by the Pineapple user? If a Pineapple attacker has the password to a WPA2 AP, how would he go about monitoring for passwords, email etc.? Haven't had much luck with ettercap. Thanks for the replies
  9. What are some effective attacks using the pineapple against encrypted networks where the passphrase is already known? Let's assume you only get to use the pineapple, so no kali or laptops or anything like that. One method I can think is for an attacker to respond to beacon requests with an encrypted, spoofed AP using the known passphrase, but I don't think that is possible using the pineapple. I realize that may be a convoluted, ill-thought up method, but is that even possible at all? I understand a bit about handshakes etc, but would it be possible if the pineapple had a little different hardware or software? Just curious about that one really. Would most of you just use ssl-strip and ettercap or something? Thanks for your time.
  10. Thanks for the reply. I found the supported adapter list in the Wiki and I'm going to give the TPLINK WN722N a shot because of its low power consumption.
  11. I picked up a USB to 5V DC Barrel cable to run the Mark V from a 2A USB battery, but it doesn't seem to be capable of powering the AWUS036H usb adapter, and starts acting funny with reboots etc. I've tried using a Realtek RTL8191SU instead, but it doesn't seem to be recognized at all. I've tried downloading the linux driver directly from Realtek, but when I SSH in, it doesn't look like the ash shell supports ./configure and makefile etc. but I'm pretty much a linux noob. On top of that, I don't know if the Pineapple Mark V platform is MIPS_RMI or MIPS_AR9132, or neither. It appears those two platforms are supported by the driver. Anyone know if either of those platforms are right? TL;DR Is there any way to get a Realtek RTL8191SU USB wifi adapter to work with the Mark V?
  12. Yes I'm sure. I notice if my gps log number is something like Kismet-Jun-25-2015-6.gpsxml and I check inside it says <network-file>/path/to/logs/Kismet-Jun-25-2015-7.netxml</network-file> Shouldn't the network-file for Kismet-Jun-25-2015-6.gpsxml be Kismet-Jun-25-2015-6.netxml ? Why is the gpsxml saying the network xml is one number higher?
  13. Tried running it without GPSD, and kismet still isn't logging any coords to .gpsxml
  14. Can you post your kismet.conf and gpsd.conf magik? I seem to be receiving GPS info to the pineapple as confirmed by gpsd output, and kismet claims it connects to the gpsd server in its output, but kismet is not logging GPS information. Not sure if it's related to installing kismet to the SD card or what. Thanks.
×
×
  • Create New...