Jump to content


Active Members
  • Content Count

  • Joined

  • Last visited

  • Days Won


Everything posted by Skinny

  1. The easiest way to pull this off is to buy a cheap USB wifi adapter off of amazon and plug it into your nano. This will give you a wlan2. Use wlan2 in the client mode setup box. This dedicates a radio to exclusively connecting you to the internet. Just to make sure this works, I tested it out myself after your last post. The bulletins load for the pineapple, and my controlling device connected to the wireless management port was granted internet access through the pineapple. If you try to use the existing radios on the pineapple, you will lose some functionality with PineAP. PineAP controls the open SSIDs that are beaconed out, so you wouldn't be able to use those to connect. I'm sure there is a way to do it if you still want, but it is outside of my knowledge level.
  2. Try not to install the modules locally. There's not a lot of storage and the nano needs a certain amount of space just to operate. You could have messed it up by filling the drive. Another factory reset should erase everything.
  3. Yes, look under Logging. You'll need to have PineAP enabled and have the Log Probe Requests option activated. Be sure to save your settings in PineAP. The log should show the clients and the SSIDs for which they are searching.
  4. Exactly how do you have your Nano connected to your home router? What did you do to obtain this connection?
  5. Tonight I had the opportunity to deploy the Tetra during a fun event. I'll be making a video about it this weekend. In a very nerdy way, it was absurdly fun because of this: Turns out to be 18.5 SSIDs per minute. Just kinda made me giggle.
  6. You need to initially setup the pineapple by using the internet either through tethering with a personal electronic device or with a laptop. It is necessary to do so in order to download the latest firmware and to complete the nano setup process. After this is complete, you really do not need the internet to operate the nano. Also, after setup you can use the IP address above. 99% percent of the work I do with the nano does not require me to have an internet connection. There is plenty to do without it. I'm sure you may already know about this webpage, but a compilation of all the setup tutorials can be found here: https://www.wifipineapple.com/pages/faq
  7. I'm assuming you're asking how to see the user interface without having to physically connect it to a device. In that case connect to the management access point and go to this IP address:
  8. No problem. Hope you can get it worked out.
  9. As far as question #1 with your Android, I've noticed something similar. Here is an example regarding the conditions that cause a similar behavior. First, I use my android device to connect to an access point called GOODGRAVY with WPA2 security. Next, I kill that access point and bring up the pineapple using the same SSID. The android device will not show that it sees the pineapple because in its list of approved SSIDs, it sees an access point already called GOODGRAVY. Furthermore, the legitimate access point required a password, whereas the new one does not. If I tell my android device to forget the first access point (the legitimate one), then it will see the pineapple beaconing out the unsecure version(s). I believe you are correct regarding your assumption for question #2. If you are trying to deauth clients from a secure network and then get them to reconnect to you via an unsecure connection, you may have issues. WPA2 encryption is implemented so that both the client and the AP can verify the legitimacy of each other via a 4-way handshake. Your clients may not be seeing your spoofed AP as legitimate because it can't participate in this process as the clients expect. Past this point is where my knowledge abruptly ends. I think someone mentioned on this forum that if you capture that 4-way handshake and crack the password, there might be a way to get the pineapple to legitimize itself to a client using the APs credentials.
  10. Something isn't adding up here. If the device you are trying to snag is unassociated, then there is no need to deauthenticate it from an access point. Furthermore, if you want the client to automatically connect to a spoofed SSID via the pineapple, that target device will have needed to associate with an SSID of the same name in the past. Otherwise, you will need to wait for the user to manually connect to your pineapple. Another thing to consider is that if the legitimate access point you are trying to spoof was WPA2 protected, then the pineapple will not be able to participate in the 4-way authentication handshake with the client. Therefore, it is easier to trick a client to connect to the pineapple using common, open access, SSID names such as hhonors, attwifi, or Starbucks.
  11. It could be due to 100 different reasons. Could you give more detail? Are you wanting to capture unassociated or associated clients? Are you trying to Deauth a client? Do you want any client to connect or a certain client to connect? Are you posing as an AP that is using WPA2 or as an open AP? It's hard to help without a scenario.
  12. I don't know that anyone is working on a module. The one line of bash script that fugu wrote works just fine.
  13. Thanks for bringing up the question. You shouldn't be able to cause a client to connect to the pineapple if that client is looking for SSIDs that have a WPA2 key associated with them. After your question, I ran this test on two devices: a Nexus 7 tablet and a laptop running Ubuntu. I had both devices connect to an access point requiring a WPA2 password. I then powered down the access point. I booted the pineapple and only had the SSID of the previous access point available in the PineAP module. The pineapple only beckoned out the SSID of the previous access point. Neither device would automatically connect. I was pleasantly surprised this was the case but then thought about the nature of WPA2. For WPA2 a four way handshake is needed. During this process both client and AP are trying to prove their legitimacy to each other. It follows then that the pineapple might not be successful in the case you stated. However, my test was a sample set of 2. I believe any device that is implementing decent WiFi security measures would follow suit but it would be interesting to see if there are any exceptions out there. I'll probably be testing Windows based systems later. This piece of knowledge is going to make me cut my SSID pool down. If APs / SSIDs requiring WPA2 aren't going to help me snag client devices, I might as well cut them from the pool.
  14. I have virtually the same battery: http://www.amazon.com/Poweradd-Pilot-2GS-Portable-External/dp/B00ITILPZ4/ref=sr_1_1?ie=UTF8&qid=1463023566&sr=8-1&keywords=poweradd+battery I should work fine if it's true to the specs.
  15. It depends on if the client is in idle/sleep mode or not. If it's in sleep mode, I have not been able to get any response from the client. If the client is not in sleep mode, then you can get the real MAC address if the client connects to the Pineapple. When an apple client is associated with an AP, it will use it's real MAC address.
  16. Hi venu413, There is an option to download the list in PineAP. Navigate to the PineAP module. Scroll down to the SSID Pool portion. Next to the SSID Pool title is a drop-down arrow. Click the arrow. Select Download SSID Pool. If you are looking to interface it with an app, then you might want to SSH in and look in the /etc/pineapple/ directory. There you will find a file called ssid_file. It contains the list.
  17. I can't speak to newer Apple devices but just as an example my old iPod has a setting that says "Ask to Join Networks". With this enabled even if everything is in my favor per my previous post, the user has to take a specific action to join the Nano. If they are at work and all the sudden their phone asks them if they want to connected to the McDonalds access point, I doubt my day will be successful.
  18. Not so with Apple. Newer Apple devices roll their MAC address every minute or so if they are not associated with an AP. It makes it a bit more difficult to track a phone based on just its MAC address. When it associates, it's true MAC is revealed. This is not the hardest part about getting an unassociated Apple to connect with the pineapple. When most of these devices are in idle/sleep mode, they beacon out using these random MAC addresses, however they never beacon out any SSIDs for which they are searching. So you need to have the SSID it wants already in your PineAP pool or make sure to have Beacon Response activiated in PineAP. In addition, if you do have the correct SSID in the pool, it will not connect to the pineapple or any AP until it awakes from sleep mode. In fact, it's been my experience that you will get no response what-so-ever from the device until it is awakened. Finally, everything I've said so far goes out the window if the user manually changes the settings making it less or more secure. I am sometimes happily surprised when I'm able to grab a newer apple product. I suspect it's because the user played with the settings or awakened the device at some point during my activities.
  19. If the apple client associates with the pineapple (aka it becomes a client), then it will do so with the real MAC address. If you are running recon and just looking to see what's out there, you will more than likely get the random MAC addresses.
  20. Seb, The fix works great! I'm running a Nexus 7 with Android version 6.0.1. The tethering process worked without a problem and I'm navigating the Nano gui with no issue. Thanks for all your hard work!
  21. Yes, the pineapple can let you know the devices in the area according to their MAC address without using the internet.
  22. This is a known issue that should be corrected with the next firmware update. This generally happens to me when there is no client or AP to be detected in an area, but others have had other reasons.
  23. Great job fugu! Checked out the results from both this morning and this one-liner has the exact functionality as the python script. The python script produces two files. The first is just like you've made here. It shows the rankings. The second is the same as the first, it eliminates the ranking and just has the list of SSIDs. This second file is what gets put in /etc/pineapple/ for the PineAP pool. I believe you're just one cut command from having that file as well. Thanks for posting this. I've learned a few things about formatting output from you. Seeing your one line of commands made me feel like an idiot after building a script in python for 6 hours. If you don't mind, I might contact you later in regards to some ubertooth-rx output I've been trying to shape. Have a great day and thanks again!
  24. Thanks fugu. It's getting late, so I'll give it a try tomorrow.
  • Create New...