Jump to content

Kapu Lanai

Active Members
  • Posts

    102
  • Joined

  • Last visited

  • Days Won

    2

Posts posted by Kapu Lanai

  1. Just wanted to note here that cracking with cluster computing methods would be the method here

    On 10/27/2016 at 0:23 PM, nsmarshal said:

    Hi folks,
    I haven't bought this product yet, but i am really interested to buy it. But before actually buying it if some body can explain how it is helpful in wifi password cracking (specially WPA2)it would be great.

    In kali 2.0 with Alfa Wifi adapter:
    1. Put alfa wifi adapter in monitor
    2. start airmon-ng
    3. capture packet of target
    4. de-auth some client and capture the handshake when client connect to the AP
    5. BF the captured handshacke with either aircrack-ng or hashcat (definately hashcat becuase with aircrack-ng you are not reaching anywhere.) becuase aircrack-ng is hell slow.
     
    BF is not useful at all these days, No-one is using those simple passwords at all and with minimum length of 8 characters for wifi even with hashcat (100,000 hashes per second) it need 22 days for a 8 character brute force.
     
    So the question is from above simple five steps in kali, how  Nano is  useful. At which step nano comes in and helps cracking WPA2 password.
     
    Thanks,

    Serious cracking is not gonna be a nanos forte. Capture, monitor and injections are what the nano is good at. 

    If you want to discuss a sister system to crack with the pineapple. Id look into cluster computing methods. In theory a rasp pi bramble could come in handy with options for portability. 

  2. One cannot buy something like the pineapple and expect all methods to work like day one. Security flaws are meant to be patched.

    For a brief demonstration, you can configure an AP with weak security just to show a scenario. 

    There are plenty of methods to gain access with a pineapple. The easy ones like pixie are not going to beat an advanced method in terms of overall effectiveness. If you want to talk about the real threats, they are probably at least 50% or more a social engineering technique that would give up info from anyone that is a victim of their bias blindspots. 

    So if you want a good cyber security presentation, incorporate the social hacking. That part is not going to change anytime soon. 

    Advanced wireless password cracking may not even be needed to gain access. Its a facepalm situation if your drilling the backdoor of the vault when the side patio door is open.

    The side patio door is always going to be an easier access, especially if the target believes the front of the vault is strong enough. 

  3. Nano only sees 2.4ghz. There is a note from Cisco it says 

    ""

    • In some deployments, multiple SSIDs are enabled on an a single AP. Some SSIDs may have legacy bit rates disabled which shortens the coverage radius on 2.4GHz or the SSID may only have 5GHz enabled. The site survey should measure the coverage cells of each SSID independently within the extended service set to determine if adequate coverage is met. "
  4. Alright. :wink: 

    Free WiFi folks. I believe in tesla's dream. However free isn't free. If you are on reading this post and don't understand that. Then move along. 

    Building a wireless mesh for public access is rather complicated when commercial interests are involved. 

    I just happen to live in a place where...idk...somewhere around 90% of the population doesn't get concepts like tech or even medical (though honestly medical these days ain't even straight up). Now 10% of the taxable population pays for well most everything the 90% can't afford. Ya know? No complaints life is good. 

    But if I was taxed a tiny bit less...a fair bit less...I could be funding free WiFi all over da place. 

    But the people here are afraid. And the political hoops abound. So...this is what is up. 

    I want to maintain zones of WiFi in my state and sell ads to local businesses. Nope. I don't want to pay business for their access. I want to mount my units on public property without paying any fees. Offer the public a basic WiFi service and community hub landing page. I'll buy equipment, maintain the network and sell the ad stock.  While providing everyone with a little bit of service, local business who desperately need this advertising to boost revenue through promotions.

    If anyone wants to help email slam the representative(s) please pm me. Something is being organized right now and if y'all want to put forward any initiative to do this in your state. Please PM to join the cause. We will be mounting petitions, email slams and other various campaigns to FREE the WIFI!!!

    Tesla is probably tearing up 

  5. There was a few times my pnpl was like that. After messing around with the features the hardware limits are very easy to spot. You can get the pnpl doing some multi-tasking but you should be careful putting too much on the nano. 

     

    It's under that higher load that there seems to be situations of "the straw that broke the camels back" and weird things may occur.

    I've not tried the tetra yet but I imagine for a lot of things that is the better device to develop on. More meat and potatoes included in that package. 

    Good luck

  6. Wlan 0 on the WiFi Pineapple Nano is for recon and hosts access point. Wlan1 is for deauth, monitoring. Wlan0-1 is a virtual access point used to manage the device. 

    Wlan2...if you are using one...is for connecting to ap plus it can be used for many other functions. 

    You can repurpose the Wlanz to do other things but for the most part this describes how it is designed to be. 

  7. I haven't. I have two companion machines that run beef. I'd imagine that it would run as smoothly as all the other modules...debugging aside...I find reliable class 10 sds are the best way to guarantee performance. Transcend 16gbs...do the trick in speed/performance/bang for buck

  8. Uhh. My androids have been accomplishing this same mechanism via PryFi and probably even a little more because that app rocks. It does work well. However this may be a great feature for Apple, right now; there is still a way to provide a signature. Easily so. It would involve triggering the device with the beacon response to reveal it's true mac. This can be done without a module already but the process can be refined with one. Since this is a trend likely to appear across operating systems pineapple devs should learn more of this concept in its infancy.

×
×
  • Create New...