Jump to content

Predator

Active Members
  • Posts

    29
  • Joined

  • Last visited

Everything posted by Predator

  1. Updated my Signal Owl to latest firmware, but as soon as I run any payloads it keeps booting into that payload and after a few tries to get into ARMING mode the unit resets. I can never get the loot htat way... How do I know when to push the button?
  2. Ran into a problem yesterday, hooked my Shark Jack to an unguarded jack. It could not finish the scan before battery died. After hooking up my laptop i could se a giant landscape. Would probably need 5 more minutes to finish this simple scan. Battery life is way to strict for this unit to reach full potential. Version 2 need at least 5x longer time as I see it.
  3. Predator

    Shell Access

    All device configs should be in /etc
  4. Check this short video of the first life sigh I got, this should be the dead Signal Owl if I'm correct and I haven't even got that far that I could fuck my unit up by flashing it etc. My Shark Jack worked as it should but my Signal Owl is so dead, I really hope they have a replacement policy for DOA units. https://gofile.io/?c=es7F7m
  5. It doesn't boot at all, no way to get in to the firmware flashing part.
  6. Hooked up my brand new Signal Owl to a USB power source and it slowly blink red with nothing else connected. Why? Is there anyway I can try to get it online?
  7. SiteSurvey 1.6 keeps resetting wan2 interface when running a long scan with AP & clients FW: 2.6.2
  8. Weird, I have Bitdefender Total Security 2020 too but mine stops everything, it even immunize the USB-drive when inserted disabling every script it finds that can be harmful etc.
  9. FW: 2.6.2 SiteSurvey v 1.6 When trying to capture handshakes it never stops aireplay-ng and airodump-ng, they will run forever even when canceled from GUI and block everything else until reboot of the Pineapple
  10. I'll check this out and do what I can to support the module creators.
  11. Then I should be able to get loot, only problem is to retrieve it after the test to make the complete proof of concept šŸ˜
  12. How do I delete old obsolete Recon scans? It would also be nice if settings in PineappleAP would syncronize it's settings, right now I can have broadcast SSID pool to true in C2 and disabled in Pineapple GUI.
  13. The situation is physical access with access to network. They should not really let me in at all but I do have access right now. They are nitified that I will try to get access and that I will try to get hold of information from network. So maybe PS is the way to go since we will test IT if they notice equipment that should not be there.
  14. Maybe but it won't detect a pure HID device, if I run Rubber Ducky on HID, Masstorage it won't detect it. Probably it detect BB just because it shows entire filsystem while in masstorage mode. Have to run more tests with this, when running pure HID BB is undetected.
  15. Screen time on average is 20h/day, behind a real computer is maybe 15h/day
  16. Just my experience here... WiFi Pineapple TETRA draws pretty much juice, I had to connect an external micro-USB power adapter to UART to make my unit have a stable source of power. Not even the battery package could sustain it during setup so plug it in to a wall socket before trying to set it up is what I would recommend.
  17. When doing a recon scan it defaults to 2.4GHz scan and this is just annoying. If leaving the recon scan tab and return while a recon is still running it says it is on 2.4GHz scanning even if you choosed 2.4 and 5GHz scanning. When setting the Pineapple up it just plain ignore the management spot, no matter what I name it it defaults to Management, not a biggy but annoying to say the least. After I connected the Pineapple in client mode it just forgot it's management WiFi name and reset to Management, this is just weird, why does it do this? Not about the GUI but WOW, it draws way more than my USB-port could serve so I had a few hairs pulled before I finally plugged in a Micro USB power adapter to UART and after that it booted nice and clean and I could continue with setup.
  18. It would be really nice if mods could pinned list of working modules allways refering the latest firmware, that would make it easier to know where to start helping with modules not working etc. Example: FW: 2.6.2 DWall 1.3 Works if you upgrade package x and y and restart your device. And so on.
  19. Just got my WiFi Pineapple TETRA and had a few problems get it up and running (was lack of W in powersupply ;)) I noticed there are not many 3:rd party modules working with the latest firmware and instead of starting to complain that they don't work I thought this is a good place to start learning doing modules myself. So to help module creators speed up the development, where do I start to learn? The core Pineapple works as it should except a few bugs that is really annoying and I'm pretty sure they wil be fixed by Hak5 so left is the many not working modules... So guide me to a good place to learn except from what's allready in the docs for Pineapple product.
  20. Tomorrow I will get my unit, anything I should know about modules not working etc? What is a good basic set of modules to start with?
  21. I use immortal from https://immortal.run/ Make an immortaldir script and your service will never die and is autostarted when the server comes online.
  22. How will antennas rise attention against you? I wear all kinds of weird stuff that use antennas and I have so far got no question at all, could be that the people in my country doesn't speak to strangers šŸ˜‰ Anyway, then just hide them and everything else that will tell someone you carry a WiFi equipment but as some said, do NOT remove the antennas since it will damage your Pineapple in the long run.
  23. If I want to have a constant access to packets, should I buy PB or PS? Any pros/cons for the units that I need to know before I make my decission?
  24. I played around with my Bash Bunny and most attacks that involve copying scripts to target will be stopped by Bitdefender AV. So if targeting a computer that might have ESET, Bitdefender etc you should never use attackmode STORAGE since your Bash Bunny's payload dir will be whiped by these two AV. Had a hard fight to even update the payload dir with bunnyupdater with the Bitdefender running šŸ˜‰ But this is a nice device if used for the right purpose and you need to keep in mind that the target might have a nasty AV that can and will immunize your Bash Bunny instantly. If you do want to test humans you should use Rubber Ducky and Bash Bunny for quick plugin/plugout operations.
×
×
  • Create New...