Jump to content

r3g3x

Active Members
  • Content Count

    38
  • Joined

  • Last visited

About r3g3x

  • Rank
    Hak5 Fan +

Recent Profile Visitors

715 profile views
  1. All fired up - just ordered. It would be cool if the early adopters would receive a few stickers. :) Can't hurt to ask. Jim
  2. Darren Will we know what "it is" next Friday or Saturday? I'm with Zoro I'll buy it and find a use for it later. :)
  3. The variable MAC has no value due to scoping. At this point MAC has no value unless it would be an environment variable. If you type the command "env" from the command line you will see what values are inherent to your session. If you export those values, your script till know about them. What value did you expect MAC to have. You need to do something like this: #!/bin/bash set -a export MAC="00:AA:BB:CC:DD:EE" echo ${MAC} > /var/found.txt exit 0 What you have above prints nothing, you need to assign a value to the variable MAC.
  4. Where are you running this script - on the pineapple or on a *UNIX image connecting to it. As kerravon said, post the script. You might need to so a "set -a". You can also do #!/bin/bash -x This will put the script into debug mode and yo can watch what it is doing. FIN/ACK, Jim
  5. I see questions from people who do not understand how open authentication works for WiFi. Hopefully the steps below can help address some of the questions and serve as a small tutorial. There are 3 parts of the process for a client to connect and transmit data on a wireless network. They are the probe stage, Authentication stage and Association stage. In documentation the client is the station or STA for short. The access point is AP. PROBE STAGE STA --- Probe Request --> AP STA <-- Probe Reponse --- AP AUTHENTICATION STAGE STA --- Authentication Request --> AP STA <-- Authentication Process --> AP STA <-- Authentication Response --- AP ASSOCIATION STAGE STA --- Association Request --> AP STA <-- Association Response --- AP Probe 1.1 STA sends a probe on all channels to find the AP (ff:ff:ff:ff:ff:ff) 1.2 APs in range answer the probe request Authentication 2.1 STA authenticates to the AP - the strongest signal wins 2.2 Authentication process takes place 2.3 AP sends a response to the authentication (success or failure) Association 3.1 STA sends association request 3.2 AP sends association response 3.3 STA now has communication ability with network Data exchanges do not happen until this entire process completes I hope this can help some people
  6. I would recommend ssh'ing into the pineapple and looking around for those files. See if the directory: /usr/lib/opkg exists and what contents it has. run a command similar to this find / -type f -name "*.control" -print This will list where any files that end with .control in the name. May be the files are in a different directory, have a different name, etc. Good luck, Jim
  7. I am no sure of your depth of understanding of wireless, but there are also a series of free WiFi videos available online at: http://www.securitytube.net/groups?operation=view&groupId=9. The videos are good and will help you to understand WiFi workings, security and tools. Without a solid understanding of wireless using a pineapple can be frustrating. Once yo understand tools available and wireless, reading the description and purpose of the modules is easier to understand, implement and troubleshoot. Good luck. Jim
  8. You don't use PineAP - PineAP is for use with open networks, not WPA/WEP/WPA2 networks. If PineAP impersonates a network you have in your PNL that is WPA, it will advertise it as an open network. As the other guy said use aircrack-ng. It would be easier to use a Kali instance with an Alpha card using the aircrack-ng suite. Jim
  9. The other day I was doing a technical demo at a large gathering in a large dense packed city and was using a Tetra for part of it. On setup day the Tetra worked great, I had people connecting into the pineapple and it worked great. On the demonstration day, there were a couple of hundred people in the room, the Tetra could not keep up and stopped collecting SSID's. The scan function worked well, but PineAP did not work. Anyone else try to use a pineapple in a large densely attended area? Jim
  10. Can you post output from ifconfig or the text displayed after you run the Tetra setup scripts?
  11. Hi Jsync: In my case I have both and use both, but I am becoming vey fond of the Tetra. I like the tactical option because it gives you all the extra gear plus the backpack which I really like. The book is helpful if you are new. That said, if you research the forums and have a good Wi-Fi base you can get by without it. You will need an Internet connection to provide connectivity to clients and you need a source to connect and configure. I use both Linux and Windows without any issues, never used a phone. The Tetra is very powerful and does both 2.4 and 5 frequencies. The Nano is smaller and only does 2.4 One last word of caution to set your expectations. You will need Wi-Fi understanding to use the Pineapple, it is not as easy as plug it in and own everything. It seems there are people who buy a pineapple and have unrealistic expectations. Good luck, Jim
  12. Zylla: I want to test this on my Tetra and Nano's tonight. Based on what you said above, I get your code and follow the directions it should work without issues on the Tetra and Nano. Is that correct? The current sslstrip for the Nano/Tetra does not work due to the certificate. :( I am really excited to try this - I will let you know how I make out.
  13. I have both the Tetra and Nano and have been using them for quite a while. I am now running current firmware and modules on both. I am finding that the modules and results are much better on the Tetra than the Nano. Anyone else have this experience?
  14. Thanks Foxtrot - will implement tonight!
  15. RandomRoll works well for me and it is humorous to all but my family. :) It works like a champ on the Tetra. I plan on using this for a demo and would like to replace a Roll with one of my own. Based on what I see this should be pretty easy by just swapping out some file. Correct?
×
×
  • Create New...