Jump to content


Active Members
  • Content Count

  • Joined

  • Last visited

  • Days Won


About Onus

  • Rank
    Hak5 Fan ++
  • Birthday March 9

Profile Information

  • Gender
  • Location
    Boston, MA

Recent Profile Visitors

1,906 profile views
  1. @icarus255 Here is your first update. I have migrated to hcxdump and published my first major version! Thanks again for inspiring me to take another look at that tool set. It proved to be a huge improvement in so many ways. And as a thanks for your constructive feedback, by all means feel free to throw some hashes my way, that won't kill my electric bill with some unreasonable permutations that take a year or 11, lol
  2. Lol yeah I have a rig set up with 3 1080s and 5 1070s so I'm all set. But thanks. FYI I was just about done migrating to hxcdump and then I corrupted my boot image while trying to fix an auto mounting USB issue.. lol, but it was considerably cleaner and faster. Update coming soon
  3. @icarus , looking into hcxdumptool a little further this morning, i am seeing that i indeed am getting and able to sort handshakes and pmkid with rather ease. Im wondering though how that tool gets handshakes? is it passive? does it still use deauths? I will have to investigate a little more as to how long on average i should let it run, and if i there is an efficent way for me to monitor it. Definitely going to migrate in that direction.. Now that i really look into it, it definitely seems a bit more robust and would make my attack script rather clean. thanks again
  4. @icarus255 all very good feedback and thank you. To your negatives: * I am NOT looking to commercialize it. Really just built it for fun and to play around / make use of the plethora of pi zeros i have laying around. thus the github repo. * yeah i thought about that. That is why it only deauths for like 10 seconds on APs with clients and then reverts back to a ready mode. with no attacking. I wanted to make it as automated as possible. I guess i could make the deauth specific to a client on that AP instead of the AP itself.. (thoughts?) The use case i imagine is that you h
  5. Well I could use besside-ng in my script sure, instead of aircrack suite directly. I really just wanted a handshake device. I love my nano and my tetra but some times it's a little more like a flame thrower in that unless I manually set it specifically for this task in advance it's likely going to start broadcasting open APS. This device would serve just that one purpose and merely needs to be powered on and it's ready to go. Plus I wanted to build something!
  6. Hello all. I have been a fan of the hak5 team for a while and over the last 2-3 years have collected pretty much everything in the hak5 shop. I have all the things that do the things. ? Recently during a fever dream, I imagined that I had a new device. One that magically grabbed 4 way WPA handshakes with the push of a button and was small enough to hold in my tiny pen testing fist. We have all been there right? We know there is a network with clients but we are just too far away to effectively do a deauth airodump attack. Sure we could get closer and open our Linux laptop, plug in a wo
  7. Are there any demos for the new enterprise feature.. seems like the security drop down in recon results is always blocked for me, and i can't seem to figure out how to clone an enterprise ap and harvest the rewards..
  8. How can I install git and responder and such via the terminal/ssh. I tried apt-get only to realize I don't have that.. :/ the responder that comes in module doesn't seem up to date..
  9. I have not tried that.. wonder if responder works better that way as well, and maybe I can install bettercap that way.. :)
  10. I just got a brand new tetra a few days ago and am noticing a slight electric clicking sound coming from it.. almost sounds like Morse code (dot dot dot dot dot dash, dot dot dot dot dash) is this normal? everything seems to be working fine, accept i did notice that if i want to use the eth1 usb port i have to initially unplug tha c adapter to get my machine to see it.. hoping i don't have a short/defective tetra,
  11. I don't see any documentation on the db of the antennas that ship with the Tetra. I am guessing they are around 5 db? Wondering if people have upgraded the antennas on the Tetra and if so what antennas are you using. I have two 7db antenna lying around that i bought for my nano, but not 4, so if i were to try to boost my signal, i wouldn't know which of the 4 antennas to replace, since i only have 2 9bd antennas. I ssh-ed into the pineapple and noticed that only three wireless adapters are actually up: root@Pineapple:~# iwconfig lo no wireless extensions. eth1 no wi
  12. Yeah.. never had much luck with ettercap so went with something better ;) it's great.. yeah I tried connecting to the secured AP as well even tried running the scan from different interfaces... Can only detect the gateway and any computer directly connected to the pine AP. Oh well
  • Create New...