Jump to content

Just_a_User

Dedicated Members
  • Posts

    1,822
  • Joined

  • Last visited

  • Days Won

    54

6 Followers

Profile Information

  • Gender
    Male
  • Location
    Earth
  • Interests
    Lock Picking, SDR, Hak5 toys

Recent Profile Visitors

7,551 profile views
  1. My thinking was that in some cases clients were still able to use https or VPN while associated with the pineapple using Evilportal. I guess in an indirect way it is to try and apply some gentle pressure to complete the (more optional these days) network/portal registration.
  2. Would it be possible to have some form of timer, to watch associated pineapple clients not on the Allowed client list and kick them automatically after xx time without registration? Or maybe throttle limit clients and lift restrictions on joining Allowed client list?
  3. @newbi3 I believe its @kbeflotemplates https://github.com/kbeflo/evilportals From my own testing I found the notify command was killing the whole process by somehow hanging. I tried many deviations of the same to try and get notify to work from php. Still no joy although i haven't given up completely yet, suggestions and reading welcome. I have got the templates to work while still giving a notification, but it is by using something that may not be on the pineapple for much longer. And that's /usr/sbin/pineutil Right @Foxtrot? Either way its there atm. Currently if you replace the $this->execBackground("notify $email' - '$pwd"); with $this->execBackground("pineutil notify 0 'Evilportal got creds! $email - $pwd'"); Then in general most of the NANO/TETRA templates seem to work, some with other minor tweaks required. So for backward compatibility and having some basic templates to test in home labs early on - its a quick and dirty way to get something up and working. But going forward new portals should probably be made from scratch for the MKVII using the best from the available firmware & module.
  4. Would be super cool if the portal Work Bench can go one folder further depth if poss
  5. It does not always work, if different versions implement new features or remove old then things can still break. But sometimes you get lucky. Sorry i got the link back to front, was working from memory away from kit. Glad your semi sorted though.
  6. Did you try a symbolic link to fool reaver into thinking its using its preferred version of libpcap? ln -s /usr/lib/libpcap.so /usr/lib/libpcap.so.1.3 #or maybe ln -s /usr/lib/libpcap.so.1 /usr/lib/libpcap.so.1.3 #or maybe ln -s /usr/lib/libpcap.so.0.8 /usr/lib/libpcap.so.1.3
  7. You can update from within the menu system Or you can download it to the LT /tmp/ which as its located in RAM has more space.
  8. maybe this? https://support.google.com/accounts/answer/6010255?hl=en
  9. Did you try the post about it? Also, I see manual install of infusions should be possible on old FW version. If you're using it heavily then maybe it's time to upgrade.
  10. Blue hydra.
  11. Maybe try an existing payload that does something similar, in this example the script looks for the drive letter to run an exe IIRC. https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Payload---runexe-from-sd Maybe that gives at least a starting point even if it no longer works as it is.
  12. Does it plug in and power on? sure. The question should be "does the console recognize USB Ethernet gadget devices, keyboards and storage?" Don't know, never tried, if you do try report back here.
  13. I think they have built it in or are building it into wifite2 also, so worth a look if you prefer an automated tool. https://github.com/derv82/wifite2
  14. Tool = https://github.com/ZerBea/hcxdumptool https://online-it.nu/how-to-attack-wpa-wpa2-pmkid-kali-linux-2018-4/ I'm sure there are others if you google, this was first result.
  15. PMKID attack can get you a hash to crack with zero clients.
×
×
  • Create New...