Jump to content

Teabot 5000

Active Members
  • Content Count

  • Joined

  • Last visited

  • Days Won


About Teabot 5000

  • Rank
    Hak5 Fan +

Profile Information

  • Gender
  • Location

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. The Pineapple autossh module will automatically create an SSH tunnel back to a server. If you want to forward all traffic through that tunnel I'd imagine you might need to just add in an IPTables rule to do it. You might need to set up NAT using IPTables on the SSH server. It's strange that didn't work with OpenVPN.
  2. I got caught with that on a test run. It's really something to see a few pings grow to a 200MB+ pcap file after a few seconds! I think saving a pcap to a remote host would be useful for the Turtle too. I'll put together a module for the Turtle first and I'll port the functionality over to a Packet Squirrel payload some time in the future, unless someone beats me to it :)
  3. Could the option to added to the tcpdump launch script to save the packet capture to another host rather than having to save on the USB? For example you can pipe the output of tcpdump to an SSH session and append the capture to a file on the SSH server like so: tcpdump -w - | ssh -t user@ "cat >> coolcap.pcap" That'll append new packets to the capture saved on the other host. You can read the capture live on the other side like this: tail -n +1 -f coolcap.pcap | tcpdump -r - Of course you don't need to read the capture live, it's just kinda cool to be able t
  4. It's probably not activating because the .ep file is the wrong name, will fix that now. jQuery is included but it's in the "static" folder which doesn't show up in the evilportal GUI. I just changed some of the javascript in the behavious.js file (also in the static directory). I changed the "vanilla" javascript to use jQuery because I thought it seemed to be causing some problems for me. I'd recommend looking at the link to W3schools I gave earlier in the thread. It covers everything from HTML, to Javascript, to PHP. It's worth taking a look at.
  5. Ok, @Kn0wledge and @mercredi here's a quick port of the wifiphisher "wifi connect" module: https://github.com/teabot5000/Evilportal-wifi-connect Instructions are in the readme. I ended up changing some of the javascript to use jQuery (which is provided by evilportal). I merged the index.php file (created by evilportal when you make a new module) with the index.html page in the wifiphisher template. Other than that it was just a case of pointing the form in the template to <?=$destination?>/captiveportal/index.php so evilportal could catch it. I just added some lines to MyPorta
  6. I have an interest in getting something similar to the WiFi connect phishing page (this one) working with evilportal, so I'll take a look at it tonight or tomorrow at some point. It should just be a case of moving stuff around to get it working. Do you have a github page for what you managed to do so far?
  7. You mean the templates are html and php? php can be used to just print html, and as far as I know the evilportal module outputs that php wrapped in html like a normal php web page. One being html and the other using php isn't an issue. Take a look here for a good resource on web development. f you really want the exact same template, you can use the resources to port it yourself, or rebuild it. What wifiphisher does can be done on the pineapple using PineAP, evilportal, and deauths. As far as I remember, there isn't anything special that wifiphisher does that can't be done on the pineappl
  8. You can connect the Pineapple to the internet through your computer's WiFi connection. The wp6 script should work. Are you running it on your Pineapple or on your Laptop? Try running this script instead anyway #!/bin/bash #Run about 10 seconds after the Pineapple has been plugged in. #Use like "sudo ./script.sh <pineapple_interface> <computer_wifi_interface> <wifi_router_address>" #Example: sudo ./script.sh eth1 wlan0 IFACE_IN=$1 IFACE_EX=$2 GW=$3 ifconfig $IFACE_IN up ifconfig $IFACE_IN netmask route del default gw Pinea
  9. Try this script instead of the wp6 one #!/bin/bash IFACE_IN=$1 IFACE_EX=$2 GW=$3 ifconfig $IFACE_IN up ifconfig $IFACE_IN netmask route del default gw Pineapple.lan route add default gw $GW netmask echo 1 > /proc/sys/net/ipv4/ip_forward iptables -t nat -A POSTROUTING -o $IFACE_EX -j MASQUERADE iptables -A FORWARD -i $IFACE_EX -o $IFACE_IN -m state --state RELATED,ESTABLISHED -j ACCEPT iptables -A FORWARD -i $IFACE_IN -o $IFACE_EX -j ACCEPT Run that about 10 seconds after connecting the Pineapple. Use like "sudo ./script <pineapple_interface&
  10. After it boots can you run "iwconfig" and "dmesg" and see if there's any sign of wlan0? If it's not detected there could be a hardware issue or maybe a firmware issue. dmesg should show any errors that are happpening with the interface. You could try updating with the latest firmware and see if that makes any difference
  11. Try connecting to the pineapple over SSH and running "ifconfig wlan0 up"
  • Create New...