Jump to content

b0N3z

Dedicated Members
  • Content Count

    1,433
  • Joined

  • Last visited

  • Days Won

    37

About b0N3z

  • Rank
    Gorilla Squad
  • Birthday January 19

Profile Information

  • Gender
    Male
  • Location
    en0
  • Interests
    Linux,Android,OS X, Hackintosh, Ethical Hacking, Learning anything I can and The F.Y.G.S.

Recent Profile Visitors

5,569 profile views
  1. also learning how linux works and the programs being used by BB is very important. If you have no idea how nmap works, how are you going to do a scan to get the info needed. granted this is something that the extensions that hak5 has made help you out
  2. @hoppler almost all of the payloads are developed by 3rd party developers, meaning they dont work for hak5. hak5 does not update these payloads. They provide the tools ( the Bashbunny ) for the pentester to do what they want to do with it. This means for the most part, you need to have a general knowledge of how the payload works. Myself, I have gone through different payloads and read the code and changed things to make it do what I want it to do. Also realize that these are made for a Business style attack, meaning your home machine most likely wont work for these because some ports might not be open or you dont have the required tools setup on the BB. I personally was able to acquire an old machine from where I work ( I bought it for cheap from them ) and a lot of the payloads do work and I have setup the payloads to work with that version of windows running. The BB is not just a plug and play. You need to do your research on the machine your attacking and edit the payload to that. Most people that us the BB are familiar with coding and just make there own payloads for there situation and never upload them to github because maybe they dont want to.
  3. you will need to install it to the sd and them symlink it to the nano. Also kismet on its own will not run right on the nano, it doesnt have enough ram to support it. it is best used as a remote capture device. The same goes with the tetra, it does not have enough ram to run it to the fullest, it is also best if used as a remote capture device.
  4. any progress on updating besides-ng module for pineapple and uploading for official module?

     

  5. Any modules are 3rd party and PMKID is not on the official Hak5 wifipineapple module list so its up to @n3d.b0y to get this update for the latest FW update which has changed from openwrt 15.05 to 19.07 Ive also asked n3d.b0y if he was going to update his PMKID module earlier today
  6. I have been trying Dwall on every firmware since release and have not been able to get it working for quite some time. This is a module that SEB made,so he will have to fix it. I highly doubt that will happen since he is not with hak5 anymore and moved on to google.
  7. I havent been able to get this module to work since FW 2.2, somewhere around there. Needs major updates, but I doubt it will happen since Seb is not with hak5 anymore
  8. Try to do a search first. A lot of basic questions have been answered at some point in time. Hope this helps 🙂
  9. have you updated the modules in the module manager
  10. As long as everything is setup correctly, it should work just fine
  11. a lot has been fixed with the modules, if thats what your looking for
  12. b0N3z

    kismet?

    This device will not run kismet on the device but more of a remote kismet device meaning you will need a kismet server for the signal owl to connect to so you can gather results.
  13. @Foxtrot Im having the same issue. After upgrading to 3.0, Im getting shotty results. Sometimes it will connect in arming mode and other times it wont. TCPdump payload is not working or giving results. Is there any sort of debug I could do to help you guys out with this?
×
×
  • Create New...