Jump to content

Sierra Juliet

Active Members
  • Posts

    7
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by Sierra Juliet

  1. Regardless of what frequency I am using the HackRF One shows what I would call white noise. The noise resembles static, the noise commonly observed between radio stations. This is a recent occurrence and I am not sure if this is caused from device failure or some user error. The last time the device was used was a couple months ago and it worked fine for radio stations via GQRX and SDR Sharp, and transmitting a prerecorded audio file via GNU Radio. My question is how do I test if device is operating properly and not a user error? If the damage is caused by perpetrators then it is concerning considering I have fully encased the device in metal shield and added aftermarket cans to the device to prevent electromagnetic interference. The Light Emitting Diodes (LEDs) light up as they are supposed to. The first three LEDs (1v8, RF, USB) light up when the device is plugged into USB, the second to last LED (Rx) lights up when SDR Sharp is turned on, and last LED (Tx) lights up when transmitting with GNU Radio but nothing appears to emit similarly to nothing being picked up from standard radio stations. My concern is the HackRF One is damaged due to neighbors, who are participating in gangstalking, have caused damage to my device from what can be described as Directed Energy Weapon (DEW), which causes a static discharge similarly to an Electromagnetic Pulse (EMP). I know it sounds insane but so are those participating in the activity as they appear to be part of some lunatic fringe organizations with various ideological motivations. Please see "HackRF One Troubleshooting (13JAN2019).mp4" for a short video clip of issue here - https://drive.google.com/drive/folders/1xpOV6MV0Xsz1-hgk3oj-m8QhTx2cJgVW
  2. I have detected a frequency in 440 MHz range with GNU Radio. I am assuming you are referring to decoding the signal and it may or may not be highly inaccurate when capturing the signal. In my circumstance it was a poor transmitter emitting the signal and not exactly a clean signal by any stretch of imagination. The OOK was a mess and unable to decode the signal. The solution is to try a different transmitter device that has a clean RF signal when transmitting and not a cheap / poorly constructed device.
  3. Just to ensure I understand your question. You would like to use the HackRF down to a frequency of 6 MHz, based on your 50 meter reference? You can use a Linux distro running "gqrx" that allows HackRF to operate down to 4 MHz. I tested it and it works. Alternatively you can use an upconverter, such as "Ham It Up" v1.3, which is a hardware add-on. Using an upconverter, such as the one mentioned, you simply attach to the HackRF and add 125MHz to whatever your desired frequency is because of how the upconverter offsets frequencies to achieve the lower frequencies (down into the KHz range). Just make sure you calibrate the upconverter mentioned when you first use it otherwise you will experience a lot of frustration. In addition, bandwidth is a whole other discussion and may or may not be important consideration for your application.
  4. Manually Loading Infusions / Modules on USB for Pineapple IV Download Infusions / Modules: from here https://github.com/WhistleMaster/Pineapple-MK4, or here http://securityninja.tech/pineapple/mark4/infusions/ (as mentioned in other posts) Format USB: Insert USB into computer and then partition it with two partitions (one for storage [remaining GB] and other for swap [2 GB]) formatted in "ext4" Add folder to USB: The folder name will be "Infusions" in the main storage partition (NOT swap partition) and copy/paste the files from previous links into that folder. You do not need the entire folder for each Infusion. If you look in each of those folders there are sub folders right next to a file that lists the contributors information, version, and executable file. You only need the folder that is sitting immediately next to that file and nothing else. Extract that folder and toss the rest if you are using the # moduleNav and # moduleList I provided in last post as the information is already accurate for firmware version 2.8.1. Once the files are loaded onto USB, then dismount it and plug it into the Pineapple and then wait a couple minutes. SSH Terminal into the Pineapple: Type: mkswap /dev/sda2 Should see the device register...and NOT an error, if error occurs then remove USB, reboot device, reinsert USB after it reboots, and then reattempt. Type: swapoff -a Type: swapon -a Logon to Pineapple's web browser interface: Navigate to "USB" and make all the options "1" except for "fchk" then click "Update fstab" and then under "Advanced" click "Reboot" button. Once it reboots and you are logged in again go to "Advanced" and type "free" in the "Execute Commands" window. Go to "Resources" and view the storage information, should see the "/dev/sda1" storage folder and an area listing "Swap" storage showing "0 0 0" but will fluctuate as it is being used, so check on it occasionally and make sure you see the "0 0 0" changing, which indicates everything is operational. Go into "Pineapple Bar" and the Infusions should be listed. Click the name of infusion to view content or click "Pin to Navbar" bu remember from last post it will clutter things up. When you view each Infusion / Module you will notice some need to be installed, which should be installed onto the USB drive whenever possible. You will need to do the following thing: SSH Terminal into the Pineapple: Type: nano /etc/opkg.conf Edit the URL by adding this: http://cloud.wifipineapple.com/mk5/packages then Ctrl + O and press enter to save and then Ctrl + X to exit back into SSH terminal Type: opkg update Now go back into Pineapple's web browser GUI, browse through each Infusion / Module and select "Install". This should not return any errors but it will take a while for some Infusions to install on the USB (preferred) or internally to the device (not preferred). ***Note: I recommend leaving "Cron Job" enabled in the "Status" page because this will purge obsolete records at an interval of 5 minutes (default). This will come in handy for when your Pineapple suddenly stops responding because it ran out of space from utilities running. Hope this helps!
  5. This is a continuation from other contributors, not my original thought but I made some modifications for my specific purpose, which may or may not help someone else. This is what I had to use/modify to get Wi-Fi Pineapple IV running firmware 2.8.1 to work. SSH into Wi-Fi Pineapple: puTTy (Windows) or Terminal (Linux/Debian distro <== this is what I used) Terminal example: ssh 172.16.42.1 Enter password when prompted: "pineapplesareyummy" or whatever your none default password is # moduleNav: this adds Infusions/Modules to Navbar, this is in lieu of "Pin to Navbar" located in "Pineapple Bar" and it may not work. If you cannot click on the Infusion in the Navbar and it works then just go back and delete these entries but DO NOT delete the "moduleNav" file. Once that is done you can manually add via "Pin to Navbar". I DO NOT recommend doing this. It may be easier at first but may turn out to be more time consuming later. -------------------------------------------------------------------------------------- type this in terminal: nano /pineapple/includes/moduleNav --------------------------------------------------------------------------------------- # add the following lines: <b><a href=/usb/infusion/usbInfusions/uwui/uwui.php><font color=black>uwui</font></a></b> <b><a href=/usb/infusion/usbInfusions/bartender/bartender.php><font color=black>bartender</font></a></b> <b><a href=/usb/infusion/usbInfusions/blacklister/blacklister.php><font color=black>blacklister</font></a></b> <b><a href=/usb/infusion/usbInfusions/button/button.php><font color=black>nmap</font></a></b> <b><a href=/usb/infusion/usbInfusions/dnsspoof/dnsspoof.php><font color=black>urlsnarf</font></a></b> <b><a href=/usb/infusion/usbInfusions/ettercap/ettercap.php><font color=black>ettercap</font></a></b> <b><a href=/usb/infusion/usbInfusions/eviljava/index.php><font color=black>eviljava</font></a></b> <b><a href=/usb/infusion/usbInfusions/get/get_all.php><font color=black>get</font></a></b> <b><a href=/usb/infusions/usbInfusions/interceptor/interceptor.php><font color=black>sslstrip</font></a></b> <b><a href=/usb/infusion/usbInfusions/iptools/index.php><font color=black>iptools</font></a></b> <b><a href=/usb/infusion/usbInfusions/jammer/jammer.php><font color=black>status</font></a></b> <b><a href=/usb/infusions/usbInfusions/karmastats/karmastats.php><font color=black>sitesurvey</font></a></b> <b><a href=/usb/infusion/usbInfusions/keylogger/keylogger.php><font color=black>randomroll</font></a></b> <b><a href=/usb/infusion/usbInfusions/logchecker/logcheck.php><font color=black>dnsspoof</font></a></b> <b><a href=/usb/infusion/usbInfusions/mitm/mitm.php><font color=black>dnsspoof</font></a></b> <b><a href=/usb/infusion/usbInfusions/monitor/monitor.php><font color=black>dnsspoofmonitor</font></a></b> <b><a href=/usb/infusion/usbInfusions/status/status.php><font color=black>status</font></a></b> <b><a href=/usb/infusion/usbInfusions/networkmanager/networkmanager.php><font color=black>dnsspoof</font></a></b> <b><a href=/usb/infusion/usbInfusions/nmap/nmap.php><font color=black>dnsspoof</font></a></b> <b><a href=/usb/infusion/usbInfusions/occupineapple/occupineapple.php><font color=black>dnsspoof</font></a></b> <b><a href=/usb/infusion/usbInfusions/opkgmanager/opkgmanager.php><font color=black>dnsspoof</font></a></b> <b><a href=/usb/infusion/usbInfusions/randomroll/randomroll.php><font color=black>randomroll</font></a></b> <b><a href=/usb/infusion/usbInfusions/reaver/reaver.php><font color=black>reaver</font></a></b> <b><a href=/usb/infusion/usbInfusions/sitesurvey/site_survey.php><font color=black>sitesurvey</font></a></b> <b><a href=/usb/infusion/usbInfusions/smser/SMSer.php><font color=black>smser</font></a></b> <b><a href=/usb/infusion/usbInfusions/sslstrip/sslstrip.php><font color=black>sslstrip</font></a></b> <b><a href=/usb/infusion/usbInfusions/tcpdump/tcpdump.php><font color=black>tcpdump</font></a></b> <b><a href=/usb/infusion/usbInfusions/trapcookies/trapcookies.php><font color=black>tcpdump</font></a></b> <b><a href=/usb/infusion/usbInfusions/urlsnarf/urlsnarf.php><font color=black>urlsnarf</font></a></b> # moduleList: this adds Infusions/Modules to "Pineapple Bar" so you can "Pin to Navbar" your favorite tools or rotate them. Alternatively just click the names to access those utilities, which is important if you are somehow tethering to the Pineapple via a small device (i.e. phone/tablet) and cannot afford to have a menu consuming half your screen. The last portion of each line is "n/a" and you can replace those entries (if you want) with a URL that you find useful for referencing, such as reaver's official website or some how to website for using a tool. --------------------------------------------------------------------------------------- type this in terminal: nano /pineapple/infusions/moduleList ---------------------------------------------------------------------------------------- # add the following lines: bartender|1.0|usb/infusions|bartender.php|n/a blacklister|1.0|usb/infusions|blacklister.php|n/a button|2.5|usb/infusions|button.php|n/a dnsspoof|1.6|usb/infusions|dnsspoof.php|n/a ettercap|1.5|usb/infusions|ettercap.php|n/a eviljava|1.0|usb/infusions|index.php|n/a get|1.0|usb/infusions|index.php|n/a interceptor|1.0|usb/infusions|interceptor.php|n/a iptools|1.0|usb/infusions|index.php|n/a jammer|3.1|usb/infusions|jammer.php|n/a karmastats|1.0|usb/infusions|karmastats.php|n/a keylogger|1.1|usb/infusions|keylogger.php|n/a logcheck|2.3|usb/infusions|logcheck.php|n/a mitm|1.3|usb/infusions|mitm.php|n/a monitor|2.3|usb/infusions|monitor.php|n/a networkmanager|1.9|usb/infusions|networkmanager.php|n/a nmap|2.4|usb/infusions|nmap.php|n/a occupineapple|1.6|usb/infusions|occupineapple.php|n/a opkgmanager|2.3|usb/infusions|opkg_manager.php|n/a randomroll|1.0|usb/infusions|randomroll.php|n/a reaver|1.0|usb/infusions|reaver.php|n/a sitesurvey|2.6|usb/infusions|site_survey.php|n/a smser|1.0|usb/infusions|SMSer.php|n/a sslstrip|2.9|usb/infusions|sslstrip.php|n/a status|1.4|usb/infusions|status.php|n/a tcpdump|2.4|usb/infusions|tcpdump.php|n/a trapcookies|1.0|usb/infusions|trapcookies.php|n/a urlsnarf|2.8|usb/infusions|urlsnarf.php|n/a uwui|1.0|usb/infusions|uwui.php|n/a # symlink: This will create a symbol link between your Pineapple and the USB drive for storing/transferring/referencing data. ------------------------------------------------------------------------------------------------------------ type this in terminal: ln -s /usb/infusions/ /pineapple/infusions/usbInfusions ------------------------------------------------------------------------------------------------------------- You can verify the symbolic linking was successful by using SSH Terminal to view "cd /usb/infusions/" and "cd /pineapple/infusions/". The file labelled "Infusions" will be in the first directory and the file labelled "usbInfusions" will be in the second directory and both will be ~bluish in color. To finish, SSH Terminal type: "reboot"
  6. I have all the infusions you list to include "What we also like"
  7. I have infusions and the entire file structure for Mk4. I cannot upload on here because of attachment size limit. Uploading 17.7 MB file is not asking much.
×
×
  • Create New...