Jump to content

plub

Members
  • Posts

    3
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

plub's Achievements

Newbie

Newbie (1/14)

  1. I've been using the I'm using the module "Site Survey" to capture handshakes, in order to fetch the password hash and then crack it using hashcat with a number of different dictionaries... My problem is that "Site Survey" hasn't been able to capture a single WPA2 handshake, even though I've been deauthing and manually reconnecting my devices like a madman... I guess I'll just use kali to capture handshakes, since pineapple doesn't make it easy :(
  2. You're probably right. What a shame, I was hoping to MITM my family without messing with my router settings or physically getting my hand on their devices. At work though, we have an open AC. When we connect, we are presented a landing page where we have to input credentials before being able to surf... I guess I will be able to MITM my colleagues :-) Will try tomorrow.
  3. I've borrowed my friend's Pineapple Nano. I was going to buy the Tetra but now I'm in doubt. My laptop is connected to my own encrypted AC. My Pineapple is getting access to the internet through my laptop. I've done a recon and found all the "target" devices I own and which is connected to my encrypted AC. I then spoof my own AC (unencrypted). And successfully deauth all my target devices, but none of them reconnects to my spoofed AC. Even if I shutdown my encrypted AC, none of the devices connect to my spoofed AC. What am I missing? :( I know the AC is encrypted, but shouldn't that be irrelevant since the Pineapple is already connected to that AC?
×
×
  • Create New...