Jump to content

Decoy

Active Members
  • Posts

    248
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by Decoy

  1. Is this opkg packages repository the same for the Pineapple Mark VII as it was the Nano/Tetra? This is the one I have here: GitHub - hak5/pineapple-packages-community: WiFi Pineapple Community Packages Thanks!
  2. I had the same issue last week. I needed to revert back to an earlier version of the firmware. Same issues with my SD card in 2.7.0. Manually flashing 2.6.4 did the trick and now it works like a charm.
  3. I had to revert back to 2.6.4. For whatever reason the SD card just wouldn't work right in 2.7.0. Everything is working okay now.
  4. Hello, SSLSplit isn't installing appropriately for me either. I tried running dependencies.sh from the command line to see where the breakdown was, and all the other dependencies appear to work fine; however, sslsplit itself is not found in the repository: Downloading https://downloads.hak5.org/packages/mk6/1907/Packages.gz Updated list of available packages in /var/opkg-lists/1907_pineapple Downloading https://downloads.openwrt.org/releases/packages-19.07/mips_24kc/base /Packages.gz Updated list of available packages in /var/opkg-lists/1907_base Downloading https://downloads.openwrt.org/releases/packages-19.07/mips_24kc/pack ages/Packages.gz Updated list of available packages in /var/opkg-lists/1907_packages Downloading https://downloads.openwrt.org/releases/packages-19.07/mips_24kc/rout ing/Packages.gz Updated list of available packages in /var/opkg-lists/1907_routing Unknown package 'sslsplit'. Collected errors: * opkg_install_cmd: Cannot install package sslsplit. Package openssl-util (1.1.1g-1) installed in root is up to date. Package libevent2-7 (2.1.11-1) installed in root is up to date. Package libevent2-core7 (2.1.11-1) installed in root is up to date. Package libevent2-extra7 (2.1.11-1) installed in root is up to date. Package libevent2-openssl7 (2.1.11-1) installed in root is up to date. Package libevent2-pthreads7 (2.1.11-1) installed in root is up to date. Generating RSA private key, 1024 bit long modulus (2 primes) .......+++++ ....................+++++ e is 65537 (0x010001) Any idea how to fix this? No-one else is having this issue? Thanks!
  5. I am also having this issue. I might just roll all that way back to the version 1 releases. I have had nothing but problems since upgrading...
  6. I am having a series of funky issues though. Now the SD Card just hangs here formatting forever:
  7. This seems to have done the trick. Problem appears to be solved. 🙂
  8. Interestingly enough, I was able to SSH into the Pineapple, and the root password was still the same as it was before I flashed the new firmware... I downloaded the latest version directly to the Pineapple and ran sysupdate to do a manual firmware update. I'll post if this was or wasn't successful.
  9. Hi Everyone, My Pineapple sat for about 6 months since the last time I used it. I finally booted it up, and downloaded the latest firmware. All seemed to be fine as I installed a few modules, and then set everything up the way I wanted it. When I finally got around to using it today, I was unable to launch PineAP, the modules I had downloaded to my SD card had seemingly vanished, and there were various other issues. Pressing the Factory Reset button for 7 seconds does nothing, so I triggered this from the Configuration page. After it was finished, the screen came up saying it was still booting, but the light eventually went solid and it sat there for about 10 minutes. I refreshed, and now the initial setup page never comes up. I cannot factory reset again with the button. Has anyone else experienced this issue? Thanks, Decoy
  10. I've been off the forums for a bit. Getting caught up on some reading and this made me lol.
  11. Kismet is awesome for this imo. Here is a great writeup/video from Kody about it: https://null-byte.wonderhowto.com/how-to/use-kismet-watch-wi-fi-user-activity-through-walls-0182214/
  12. Hi @Foxtrot - the new firmware is great. Is there any chance we can modify '/etc/opkg.conf' in a future release to add the following line? dest usb /mnt I've been experimenting with installing required packages directly onto USB with some success so far and was hoping a firmware update wouldn't wipe it out or require others to add it for future payloads. Thanks! Decoy
  13. Different architecture I guess. I thought they were both Mips?
  14. Updated to reflect new payload location.
  15. If you're looking at Packet Squirrel pcap files, check out my response from a few days ago on this post:
  16. I suppose anyone could answer this question. I just wasn't sure if there were any development plans up the road. Thanks!
  17. Hi Darren and Seb, Is there any reason I couldn't use the following repository for opkg on the packet squirrel? I'm not sure if I would have issue with any of the binaries. If nothing else, I'd like to pull the libnet source. I've got some payloads I am working on and was curious as to what packages might be available; however the feeds appear to be the OpenWRT official out of the box? Maybe we should start a community repository for the squirrel as well? https://github.com/hak5/pineapple-packages-community https://www.wifipineapple.com/nano/packages/Packages.gz Decoy @Darren Kitchen, @Sebkinne
  18. You could use CLONE as opposed to TRANSPARENT to see if that resolves your issue. Modify the payload and try it? Here is a description of CLONE: NETMODE CLONE This network mode clones the MAC address of the target device from the Ethernet In port, spoofing it for use on the LAN from the Packet Squirrel’s Ethernet Out ports. In practice, when deploying a Packet Squirrel payload with NETMODE CLONE, the MAC address is sniffed from the target (IN) and will change the MAC address on the LAN (OUT) side. This is done by inspecting sniffed packets from the target device and is typically done in just a few seconds. For stealth deployments, have the Packet Squirrel clone the MAC address of the target device from its Ethernet IN port before connecting the cable to the Ethernet OUT port. The Packet Squirrel will indicate that the MAC address has been successfully cloned by several seconds of rapid white blinking on its LED.
  19. Are you performing any attacks in the network? Or just running tcpdump?
  20. I've actually been toying with the idea of trying to get SSLSplit on the Squirrel. Just as Whistle Master has done for the Pineapple. Why not? It seems possible in theory.
  21. I know this post is super old - but a quick fix (which I just used recently) is to modify the payload changing NETMODE from TRANSPARENT to BRIDGE. Obviously this won't work if you're looking to keep the device hidden as you will be assigned an IP address from the target; however for my purposes I was simply monitoring one node on my network. This allowed me to track time appropriately. Payload modification: function run() { # Create loot directory mkdir -p /mnt/loot/tcpdump &> /dev/null # Set networking to TRANSPARENT mode and wait five seconds #NETMODE TRANSPARENT # Set networking to BRIDGE to allow for correct timestamp on caps NETMODE BRIDGE sleep 5 # Start tcpdump on the bridge interface tcpdump -i br-lan -s 0 -w /mnt/loot/tcpdump/dump_$(date +%Y-%m-%d-%H%M%S).pcap &>/dev/null & tpid=$! # Wait for button to be pressed (disable button LED) NO_LED=true BUTTON finish $tpid }
  22. Sweeeeet! I can't wait to add this one to my collection! I know in the introduction video you just posted you mentioned a plugin system. Will there be additional documentation on how to customize these and create payloads/plugins? Also - is there any onboard storage? Can I tap and grab my captures later? Any chance this will work with C2 as well?? :)
  23. Hi Everyone, So my latest obsession has been with embedded device hacking/reverse engineering. I've been having tons of fun discovering UART/JTAG ports/pins, dumping firmware, and walking the file systems. As far as binary analysis goes - I am looking for something comparable to IDA Pro. I've used it and like it, and from what I have read - it's considered the best; however it is also the most expensive. Does anyone know of any good alternatives the have a comparable feature set? I've been looking into Binary Ninja which is about $150 for a Hobbyist license - I am leaning towards that one so far. Any suggestions would be greatly appreciated. Thanks, D
×
×
  • Create New...