Jump to content

Teabot 5000

Active Members
  • Posts

    51
  • Joined

  • Last visited

  • Days Won

    2

Posts posted by Teabot 5000

  1. No papers as far as I'm aware but there are books. You can cite those books and any online media. Online media is fine to reference so long as you note the date you accessed that media and as long as it's content on a 'static' page (I.e. the pineapple site) and not a forum post.

    • Upvote 1
  2. I assume by an 'nmap' you mean a portscan. SANs have a nice document on a portscanner called IOSMap. It's capable of performing some basic portscans from Cisco IOS. IOScat is a port of netcat for IOS. If you need service discovery you can use that to perform banner grabbing.

  3. I'd say start off with some Web app exploitation, so SQLI, XSS, CSRF, file upload vulnerabilities, etc. That stuff helps get you in the mindset for looking at other areas like network security and binary exploitation.

     

    That said, if you don't have any programming skills I'd recommend starting with that. Learn HTML, javascript, PHP, maybe C or Java, and Python. After that understanding some networking basics would go a long way too.

  4. Send a continuous stream of deauths to the legitimate network. That'll prevent hosts from maintaining a connection with the legitimate access point. However, as far as I'm aware a user would still have to manually select to join the illegitimate network.

  5. You'll need to at least sit down with the director and agree what's in scope for the test. Also, you should get a signed letter from the director permitting you to run tests against the items you decided were in scope. There could be some data protection laws in your country that should be taken into account as well.

  6. I'd imagine the sqli is going to be visible in data in a Web request, so filtering for http should help you find that. You might be able to filter the data somehow to check for common strings associated with sqli.
     

    For the buffer overflow it'll probably be visible as a long string containing some hex at the end. Maybe it would be easier to filter out the other traffic first using "!". So you could get rid of arp with "!arp" and so on. Do the same with dns and any other noise that might be in the capture and take a look through what's left afterward.

  7. 20 hours ago, PorkNBeans said:

    Is the only way to connect Pineapple over wifi with an adapter plugged into the Pineapple? I ask because I have my laptop configured to use wifi, when I ran the wh6 I expected the Pineapple to share the wifi with the laptop but that's not the case, only way I've gotten it to work is to use a wifi adapter and set the Pineapple to access the external adapter. 

    If I enable the USB Ethernet my wifi for the laptop doesn't function and cannot access the bulletin.  Is this intentional by design?

    You can connect the Pineapple to the internet through your computer's WiFi connection. The wp6 script should work. Are you running it on your Pineapple or on your Laptop?

    Try running this script instead anyway

    #!/bin/bash
    
    #Run about 10 seconds after the Pineapple has been plugged in.
    #Use like "sudo ./script.sh <pineapple_interface> <computer_wifi_interface> <wifi_router_address>" 
    #Example: sudo ./script.sh eth1 wlan0 192.168.1.254
    
    IFACE_IN=$1
    IFACE_EX=$2
    GW=$3
    
    ifconfig $IFACE_IN up
    ifconfig $IFACE_IN 172.16.42.42 netmask 255.255.255.0
    
    route del default gw Pineapple.lan
    route add default gw $GW netmask 0.0.0.0
    
    echo 1 > /proc/sys/net/ipv4/ip_forward
    
    iptables -t nat -A POSTROUTING -o $IFACE_EX -j MASQUERADE
    iptables -A FORWARD -i $IFACE_EX -o $IFACE_IN -m state --state RELATED,ESTABLISHED -j ACCEPT
    iptables -A FORWARD -i $IFACE_IN -o $IFACE_EX -j ACCEPT
  8. The black piece goes under the PCB, the white rectangular piece goes over the PCB then. The contacts for the SD card should line up with contacts on the PCB. That all fits into the metal USB head and the dark transparent piece fits onto the back them. I can't post any pictures of it right now so I hope the above was clear.

  9. You might have to set the default route on the pineapple. SSH into the pineapple and run "route" on the pineapple and see if the IP address of your WiFi router is set as the default gateway. If it isn't you can set it like so "route add default gw <router_ip> netmask 0.0.0.0". You may need to remove the one that's there by default. You can do that with a command like so "route del default gw 172.16.42.42" assuming that the route in there by default is pointing to 172.16.42.42.

    After writing that I just remembered that there should be a method of changing the default gateway from the pineapple's GUI. Check the networking menu and you should find it :)

  10. Here's the script I mentioned in the other post

    #!/bin/bash
    
    IFACE_IN=$1
    IFACE_EX=$2
    GW=$3
    
    ifconfig $IFACE_IN up
    ifconfig $IFACE_IN 172.16.42.42 netmask 255.255.255.0
    
    route del default gw Pineapple.lan
    route add default gw $GW netmask 0.0.0.0
    
    echo 1 > /proc/sys/net/ipv4/ip_forward
    
    iptables -t nat -A POSTROUTING -o $IFACE_EX -j MASQUERADE
    iptables -A FORWARD -i $IFACE_EX -o $IFACE_IN -m state --state RELATED,ESTABLISHED -j ACCEPT
    iptables -A FORWARD -i $IFACE_IN -o $IFACE_EX -j ACCEPT

    Use like "sudo ./script <pineapple_interface> <computer_wifi_interface> <wifi_router_address>"

    It sets the IP address for the pineapple's interface to 172.16.42.42, then removes the route added by the pineapple and adds in the correct default route. After that it enables IP forwarding and sets up NAT using iptables.

    Try running it ~10 seconds after you connect the pineapple. Hopefully it will solve your issue.

  11. If the legitimate access point is secured (i.e. uses WPA, WPA2, etc) then the host will not automatically join the fake access point. A user would have to manually connect to the fake access point.

×
×
  • Create New...