Jump to content

ishmmoo

Members
  • Posts

    5
  • Joined

  • Last visited

Everything posted by ishmmoo

  1. I'm using probeSniffer to log probe requests. I'm on Kali 2.0 using an Alfa AWUSO36NH wireless adapter in monitor mode. Everything works, but about an hour in, the process is "Killed." And it stops logging probe requests. My goal is to run this for several days, non-stop. Is the adapter going into a power management induced sleep? And how would I achieve fixing that so I can collect my data? https://github.com/xdavidhu/probeSniffer Cheers
  2. My morning became strangely poetic. Thanks for the link. From the Cisco link, I read, "Additionally the tool will enter into preventive mode in which the tool will DoS the users of the legitimate wireless network from connecting to the discovered Evil AP." Arguably, if I started this as a project, I suppose the goal would be to get the system to DoS its users from connecting to itself. Interesting concept, research away. Cheers!
  3. I have a pineapple tetra and am currently interning with an I.T. admin. We decided to see how the Cisco AP's would react to the tetra. I booted up Kali and the pineapple on my laptop (which was connected to the guest network) and immediately, the admin received texts and emails that a rogue AP had been detected. When I tried to deauth the AP's for the guest network, they blocked it and sent another email saying the attacks were "contained." As I come to understand wireless networks, I assume being on the guest wifi helped detect the tetra, but I also assume that a wifi adapter in monitor mode could pick up devices without the Cisco AP's flagging it... The goal is to get to the hidden wlan- pineapple or not, any suggestions would be great for accessing the wlan. Cheers
  4. I purchased an Alfa NH for this, over the Yagi (price/use-ability). I think once I complete this project, I'm going to work on wifi triangulation. Cheers!
  5. Greetings, Recently, Mozilla sponsored an "art show" in NYC called "The Glass Room." The topic was privacy and data. One of the exhibits, by "Critical Engineering Working Group", had yagi-uda antennas passively scanning and collecting wifi enabled devices (phones, laptops, etc), that were looking to connect to a network. The data they were able to collect were things like device name, MAC address, preferred network list, and location. I want to recreate this exhibit. Ideally, the collected data would dump into a database where it could be interpreted later to establish a pattern. In the community's mind, what is the best way to complete this project? Here's the link to "The Glass Room" https://theglassroomnyc.org/artists-2/ Any information would be huge! Cheers
×
×
  • Create New...