Jump to content
Hak5 Forums


Active Members
  • Content count

  • Joined

  • Last visited

  • Days Won


About Rainman_34

  • Rank
    Lost in the sauce

Recent Profile Visitors

1,457 profile views
  1. Open VPN Issue

    On the ubuntu server forward ipv4 packets so vpn clients can get out.
  2. Snowday hackaday

    When work is cancelled due to snow and you need to stay home what else do you do but hack things. Time to work on updating the css and presentation of my pineapple and settings on my turtle.
  3. [Official] EvilPortal

    I think it might be my code because when I click accept in the portal it just keeps cycling back to the same page. Any advice on how to forward them to their original page request?
  4. [Official] EvilPortal

    Not sure if this has to do with the updated firmware or not but I have Evil portal running and I have found two issues. The first issue is that it won't read the symlinks I create so that I can store stuff on my sd card and not need to take up valuable space on the pineapple. The second issue is that once I click accept on my portal instead of directing me to say forums.hak5.org it keeps repeating the captive portal but once I type in a new web address it lets me visit web pages but I have to input a new web address first or it keeps repeating the captive portal.
  5. [RELEASE] WiFi Pineapple Firmware v2.0.2

    Awesome. I have been waiting for this. I will be updating as soon as I get back to my pineapple.
  6. Modern routers imune to deauth packets?

    So we did a class one time and were having issues with a tp-link router. After firing up wireshark we were able to see every time we tried to deauth a client on the tp-link router it would send a deauth packet back at us. I bet if you fire up wireshark on another computer you will see the same.
  7. I have to vent

    Where is this payloads video?
  8. Blueborne Exploit

    Exploiting your neighbors tv is illegal
  9. Firmware upgrade?

    From the mentions before on the goal of the new firmware. I recently had to reset my pineapple because of forgetting my password and I have been holding off on redoing my web interface and captive portal for once I have the nee firmware.
  10. New Logos

    I was able to get a bunch of stickers of the new Hak5 logos for all of their devices while at Defcon but I can't find any digital copies of the new ones. Does anyone know where I can find them on digits? I would love to add the wifi pineapple one to my wifi pineapple web page.
  11. VID_PID Swapper

    Thanks I really appreciate the help with this. Do I need the detour duck firmware or will the original firmware work for this?
  12. VID_PID Swapper

    So I am currently doing some research with the Rubber Duck and of course whenever you plug it into a MAC it wants you to hit key strokes so it can identify the keyboard. This can be avoided by making it looking like an apple keyboard. I have found that there is a vid_pid swapper exe file which will pull from a list on a .txt file. I can not however find any tutorial or information on how to properly use this. Can someone please point me in the right direction for this please.
  13. making the payload fatser

    you would have to save the results to a .txt file on the computer first and then export them that way. Check out ducktoolkit.com. You can check some things you want done and it will show you the coding and take the ideas from that.
  14. making the payload fatser

    You can also e-mail them to yourself or exfiltrate them over ftp
  15. I know I saw this before and as part of our training that we are doing we want students to take a computer that is currently connected to the network by ethernet and make it connect to the rogue access point they generate. From there students will have to work around the system remotely. So basically what I am looking for is directions on where to look as I can't find any for a ducky script that will tell the windows machine to connect to a specific access point with the specific password. Thanks in advance for any help.