Jump to content

Rainman_34

Active Members
  • Posts

    281
  • Joined

  • Last visited

  • Days Won

    2

Posts posted by Rainman_34

  1. 1 hour ago, i8igmac said:

    I have also been interested in this. do any of these nexus devices have autheros wifi chip? packet injection works with internal chip?

     

    I'm not interested if I have to carry around usb wifi card.

    The nexus 5 does but the 5X requires an external usb wifi adapter

  2. 12 hours ago, Dave-ee Jones said:

    Ah well, Windows it is then :(

    You know, they said they had that issue when this thing came out - it seems silly that they haven't fixed it yet.

    The reason it isnt fixed yet is broadcom is the chip in it and they dont release their firmware. 

  3. So we did a class one time and were having issues with a tp-link router. After firing up wireshark we were able to see every time we tried to deauth a client on the tp-link router it would send a deauth packet back at us. I bet if you fire up wireshark on another computer you will see the same. 

  4. I was able to get a bunch of stickers of the new Hak5 logos for all of their devices while at Defcon but I can't find any digital copies of the new ones.  Does anyone know where I can find them on digits?  I would love to add the wifi pineapple one to my wifi pineapple web page.

  5. So I am currently doing some research with the Rubber Duck and of course whenever you plug it into a MAC it wants you  to hit key strokes so it can identify the keyboard.  This can be avoided by making it looking like an apple keyboard.  I have found that there is a vid_pid swapper exe file which will pull from a list on a .txt file.  I can not however find any tutorial or information on how to properly use this.  Can someone please point me in the right direction for this please.

  6. I know I saw this before and as part of our training that we are doing we want students to take a computer that is currently connected to the network by ethernet and make it connect to the rogue access point they generate. From there students will have to work around the system remotely.  So basically what I am looking for is directions on where to look as I can't find any for a ducky script that will tell the windows machine to connect to a specific access point with the specific password.  Thanks in advance for any help.

  7. 1 hour ago, maara said:

    When reading the last post - any idea if some update is planned for nano / tetra? - its been a while since the last release (almost a year)... It would be shame to let these devices die due to lack of support.... :(

    @Sebkinne has said they are currently working on a new firmware update but no ETA on when it will be released.

  8. 17 minutes ago, i8igmac said:

    Is This null pin vulnerability working on US hardware.

     

    I agree. There are times it just worked. most of the time the routes just lockup.

    I personally have not tried  the null pin but I can't see it working since the majority of routers come with it pre-programmed in.  It might work on a printer though.  Honestly this is the first I have heard of the null pin option.

  9. 22 minutes ago, i8igmac said:

    whata the config.log show. Pastebin

     

    any US wifi routers effected by this null pin?

    Is anything in the US really still vulnerable to reaver?  Yes but few and far between.  Personally if the router appears to be anything within the last 4 years reaver becomes a last ditch effort and if it locks after just a few tries I don't even waste time trying more with reaver.

×
×
  • Create New...