Jump to content

Jtyle6

Active Members
  • Content Count

    108
  • Joined

  • Last visited

  • Days Won

    1

Posts posted by Jtyle6


  1. 12 hours ago, Bob123 said:

    I get that but I guess what confuses me are two things; 1 is the wifi pineapple is the only device sold by hak5 that has ever been EOLd.  And 2 (and I really don't want to upset you) but a true hacker would use every tool they own.  And if a tool is EOLd then they'll be crafty enough to find a way to continue to use it.  I find it very hard to believe and sad that Hak5 just assumes we should all throw them away because they are EOLd.  I have routers that are EOLd that I specifically hold onto because of the holes in their firmware.  I hold onto a hub that someone else threw in the garbage because it's perfect for wiretapping a network.  So I'm sorry but EOL doesn't compute with me.  Not in the computer world and definitely not in the hacker world.  I will say though that I am glad to see that others have continued to work on the mark V.

    Say the system on the chip gets end of life by the manufacturer; can you still make the product?

    Nope..


  2. The basics are Here..

    Quote

    LED Status Indications

    LED Status
    Green (blinking) Booting up
    Blue (blinking) Charging
    Blue (solid) Fully Charged
    Yellow (blinking) Arming Mode
    Red (blinking) Error - no payload found

    I would like to get hold of one some day.


  3. It's a bit different to do it. 

    Quote

    Arming Mode

    In Arming Mode, the Signal Owl will present the user with an open access point named Owl_xxxx (where xxxx is the last two octets of the devices MAC address) and will be accessible via SSH.

    The open access point may be configured with WPA security by editing the /etc/config/wireless file and adding the following options to the config 'wifi-iface' section:

    
    option 'encryption' 'psk2'
    option 'key' 'secret passphrase'

    More information is Here.


  4. 2 hours ago, luke776 said:

    Are you able to login to the squirrel from the LAN side and run a uname -a to see what version is running now?

    There's easyer way to do it. 

    Just 

    cat VERSION

    In /. 


  5. Did you follow the instructions on this Page?

    Quote

    To install the latest firmware:

    1. Download the upgrade file. Make sure that the filename is upgrade-version.bin (where version is the firmware version, e.g. 1.2) and check that the SHA-256 sum matches.
    2. Copy the upgrade file to the root of an NTFS or EXT4 formatted USB flash drive. Do not rename, unpack or otherwise alter this file.
    3. Plug the USB drive into the powered-off Packet Squirrel
    4. Flip the Packet Squirrel payload select switch to Arming mode (far right, closest to the USB flash drive)
    5. Power on the Packet Squirrel from a reliable USB power source. This process takes 5-10 minutes and will be indicated by a series of LED lights. Do not power-off or otherwise interrupt the device until the flashing process completes.

    During the firmware flashing process, the LED will indicate the following states:

    1. Green flashing – booting up
    2. Red/Blue alternating – beginning firmware flash
    3. Solid Red or Blue – firmware flash in progress
    4. Green flashing – rebooting
    5. Blue flashing – upgrade complete, arming mode ready

     

×
×
  • Create New...