Jump to content

ghostheadx2

Active Members
  • Posts

    21
  • Joined

  • Last visited

Recent Profile Visitors

1,153 profile views

ghostheadx2's Achievements

Newbie

Newbie (1/14)

  1. Lock picking is the art of mimicking the key. But to be the key, we must understand the key. - https://t.co/IjzDOPypN7

  2. I'm back on twitter. Muah.

  3. https://t.co/DrYnUHqNc6

  4. "but sir, do we not fight for freedom?"-Hamilton Who's leading the fight against ISIS? No one. Sure, when we figure out our true leader...

  5. RT @An0nKn0wledge: The Question is Will @HillaryClinton Leave a Trail of Election Fraud from the Primaries into the General Election too?

  6. @p5yc40naut @GingerLBrooks @realDonaldTrump @HillaryClinton good point. reason to vote trump

  7. Could someone please explain this? I don't get why the names of the networks will all show up but not the MAC addresses. And why can't I scroll through kismet individually as opposed to the whole linux command line.
  8. RT @C1TYofFL1NT: I don't care who you are or where you live on planet earth I will support your right for clean drinking water in 2016

  9. SSL stripping no longer works. I've been researching but gotten little results as to tutorials for other types of infusions. I want to get an infusion that can either get me wifi passwords or passwords to someone's accounts as they log into them. If possible, I would like some er infusions to start with downloading. I tried the wps infusion and it didn't work well with my router (which is why I want to use RubyReaver or Auto-Reaver). So, what other infusions could be used to monitor my other computer's web activities and the passwords that I get when I log in with my other computer (that I'm using as a target)? If possible, it would be nice if it was something I could use information I get from the PineAP log and input into such an infusion to get my passwords. I learned from this video about how to use the pineAP: https://www.youtube.com/watch?v=IdhuX4BEK6s&index=2&list=PLuXfzxj2yX_uCE8dPbP39rQIB0a8PkFHT So yeah, I don't want to buy too many new devices. I want to rely on my pineapple, but if possible I might want the documentation or something similar to learn to use such infusions. I might plug a wireless modem into my pineapple someday and go wardriving, but I want to learn to hack my own wifi first to learn before I go wardriving.
  10. https://t.co/K2xkT8StQJ People can now stalk you. Be aware.

  11. RT @4thAnon: Remarkable new sensor chip pulls power out of the air so it never needs to be charged https://t.co/2C9Ufl6Y4T https://t.co/WGn…

  12. I think this is a completely different subject from the previous thread, so forgive me is this is double posting. I found this program called auto-reaver for backtrack: https://code.google.com/p/auto-reaver/ I edited it, changing the mon0 to wlan0mon in one of the scripts, titled "wash". I'm trying to edit it to work with kali 2.0. I did what one of the guys in this thread did: https://forums.kali.org/showthread.php?19641-Reaver-WPS-Locked-Situation-and-Useful-Link/page4 And I quote: I know how to do the first part of that and I did. I did both commands. But I'm lost as to how to change all gawk entries to mawk. I'll research it, but I'm asking because when I look at the script, I don't want to screw up the script as is. I want to edit it correctly. There are also some changes I think need to be made to make this backtrack program work for kali 2.0. Could someone explain what I need to read or how to change this properly to fit kali 2.0? There are various scripts.
  13. for me it tries the same pin over and over. how do I change the arguments so it doesn't ignore it and tries a new pin even if it doesn't get a nack
  14. So, when I try this command: root@blackJesus:~# giskismet -csv ./Clarendon_Pineapple1-01.kismet.csv Unable to open ./Clarendon_Pineapple1-01.kismet.csv root@blackJesus:~# giskismet -csv ./Clarendon_Pineapple1-01.kismet Unable to open ./Clarendon_Pineapple1-01.kismet root@blackJesus:~# giskismet -csv ./Clarendon_Pineapple1.kismet.csv Unable to open ./Clarendon_Pineapple1.kismet.csv [/code] #I end up not being able to store results from my pineapple into a SQLite database. Here's what I'm doing before hand: [code] CH 5 ][ Elapsed: 6 s ][ 2015-12-28 22:15 BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID 34:12:98:08:25:44 -47 0 1 0 3 -1 WPA <length: 0> 00:25:00:FF:94:73 -1 0 0 0 -1 -1 <length: 0> 28:C6:8E:84:A1:FC -20 13 5 1 1 54e WPA2 CCMP PSK boogieboardb 94:F6:65:D6:EE:78 -45 3 0 0 1 54e. WPA2 CCMP PSK PALMER 36:44:25:08:98:10 -46 2 0 0 1 54e WPA2 CCMP PSK boogieboardb 02:13:37:A5:5D:22 -59 19 1 0 6 54e. WPA2 CCMP PSK Free Wifi 94:F6:65:56:4D:88 -58 8 0 0 11 54e. WPA2 CCMP PSK AV Wireless 94:F6:65:96:4D:88 -59 8 0 0 11 54e. WPA2 CCMP PSK Guest Wirele 94:F6:65:D6:4D:88 -57 7 0 0 11 54e. WPA2 CCMP PSK PALMER 88:1F:A1:32:3D:74 -62 10 0 0 1 54e WPA2 CCMP PSK Sierra 94:F6:65:16:4D:88 -63 11 0 0 11 54e. WPA2 CCMP PSK Data Wireles 94:F6:65:17:88:D8 -62 3 0 0 1 54e. WPA2 CCMP PSK Data Wireles 94:F6:65:D7:88:D8 -62 4 0 0 1 54e. WPA2 CCMP PSK PALMER 94:F6:65:97:88:D8 -62 4 0 0 1 54e. WPA2 CCMP PSK Guest Wirele 94:F6:65:97:9E:88 -65 2 0 0 11 54e. WPA2 CCMP PSK Guest Wirele 94:F6:65:57:88:D8 -63 3 0 0 1 54e. WPA2 CCMP PSK AV Wireless 28:CF:E9:82:3D:52 -64 3 0 0 1 54e. WPA2 CCMP PSK Sierra 94:F6:65:D7:9E:88 -66 2 0 0 11 54e. WPA2 CCMP PSK PALMER 6C:70:9F:E5:0E:46 -66 2 0 0 6 54e WPA2 CCMP PSK WiFiFour 94:F6:65:57:9E:88 -67 2 0 0 11 54e. WPA2 CCMP PSK AV Wireless 94:F6:65:17:9E:88 -67 2 0 0 11 54e. WPA2 CCMP PSK Data Wireles 6E:46:0E:E5:9F:70 -68 6 0 0 6 54e WPA2 CCMP PSK Guest Networ Caught signal 14 (SIGALRM). Please contact the author! Caught signal 14 (SIGALRM). Please contact the author! root@Pineapple:/sd/captures# That's my capture in my pineapple. So yeah, I'm having a lot of problems. Could someone tell me how to fix that? Should I just move onto the next port scanner the book is trying to familiarize me with? This is done on my home network, with my working computer (which I call my school computer even though its a computer I personally bought and my school doesn't own it) as the target. In this case though, its the wifi that's the target, not the computer. In general, I think it makes a pretty good target.
×
×
  • Create New...