Jump to content

DoJo_Mast3r

Active Members
  • Content Count

    24
  • Joined

  • Last visited

About DoJo_Mast3r

  • Rank
    Hak5 Fan

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. The reason why Im not thinking its a driver issue is that plugging in any other usb is also not working. Ill check dmesg however
  2. Just noticed that my usb port on my nano is not working at all, no wlan2 shows up. I've tried multiple different usb's including a usb led however it seems the port is not working correctly. Could this be software? I reset the pineapple to factory firmware, could the port have burned out? Is replacing the usb port by hand fairly straight forward? I haven't seen any info online about taking apart a wifi pineapple nano, also If I do replace the port could it be possible to upgrade it to usb 3.0?
  3. I realize that now, I'm having trouble getting proper handshakes
  4. Trying to get wifiphisher on the pineapple working is a huge pain, instead its easier to just make a portal for evil portal that can work as an evil twin. Someone made a portal here: https://github.com/teabot5000/Evilportal-wifi-connect but its super janky, mainly because its 2 years old now. Would anyone be up to either updating it or creating a new portal? This is the referenced wifiphisher project that I love https://github.com/wifiphisher/wifiphisher If anyone wants to help or just give me some advice that would be awesome.
  5. Yep thats my issue, I set everything up to be 123456789 but for some reason its uncrackable
  6. Alright, so I installed ubuntu desktop with hcxpcaptool and performed the file conversion, this time I get "flawless" I then compared the hashes from my pineapple and it seems they are exactly the same. So the read errors yes seams to be a text glitch or something. However trying to use hashcat once again I still can't crack it with the password of 123456789, something must be going on when creating the dump file, have a look at this new dump if you want I also installed a new router and triple checked that the password was indeed 123456789. I'm guessing at this point it's specifically a pineapple problem and not a hashcat issue, I restored the pineapple and formatted the sd I even tried older builds with no luck at all. This here is the hash ac20d69c3f1cf3c11309fc9f306cd9e7*e84e063b1484*fcc233ee3edd*736869742077696669 It SHOULD be 123465789
  7. There is also a super simple themeing module if you want that old look, personally I like the new gui with green text
  8. Think I found the reason why my hashes are uncrackable haha file name....................: v4.pcapng file type....................: pcapng 1.0 file hardware information....: mips file os information..........: Linux 3.18.84 file application information.: hcxdumptool 5.0.0 network type.................: DLT_IEEE802_11_RADIO (127) endianess....................: big endian read errors..................: yes packets inside...............: 55 skipped packets..............: 0 packets with GPS data........: 0 packets with FCS.............: 50 beacons (with ESSID inside)..: 7 probe requests...............: 3 probe responses..............: 5 association requests.........: 1 association responses........: 2 authentications (OPEN SYSTEM): 21 authentications (BROADCOM)...: 4 EAPOL packets................: 16 EAPOL PMKIDs.................: 3 best handshakes..............: 1 (ap-less: 0) I'm guessing read errors yes is a bad thing... Something might have gone wrong during the conversion process and that's why my hashes are uncrackable (note: I literally made my wifi password 123456789)
  9. Hmmm, I think ive done everything correctly however I cant crack any hashes, i've tried the: hashcat -m 16800 test.16800 -a 3 -w 3 '?l?l?l?l?l?lt!' As Well as using some massive wordlist files however after hours of cracking I get no where, could be the wifi connections being targeted have some crazy passwords but I highly doubt that. (Side note: are you planning to update the wifiphisher addon for the pineapple? I'm still stuck on that XD)
  10. So far so good, but it's taking forever, I used the example command to create the file. Still logging after a few hours, that normal?
  11. I think so, the whole purpose is to mimic a login of a target Wifi by creating a clone and having the user saving the resulted password in clonned WiFi connection.
  12. I fixed a issue with my setup, using the didn't work, but when I specify like this then it installs, however I get errors when it comes to configuring them Im guessing its looking in the wrong directory for some reason, hence this error when trying to run the python setup Also is it important to install the setup on the sd? --dest sd?
  13. I guess this is a little too advanced for me then, well if a prepackaged module for the nano is released or maby a evil portal that has similar functionality then Ill try it out
  14. Collected errors: * pkg_init_from_file: Malformed package file certifi_2018.4.16-1_ar71xx.ipk. root@Pineapple2:/sd/modules/wifiphisher-openwrt# Collected errors: -ash: Collected: not found root@Pineapple2:/sd/modules/wifiphisher-openwrt# * pkg_init_from_file: Malforme d package file certifi_2018.4.16-1_ar71xx.ipk. -ash: *: not found But everything else seamed to install... Maby its fine, thanks for the help btw!
  15. I am really trying here, went into the wifiphisher-openwrt directory and ran "okg update && opkg install *.ipk" and I get the response of "okg:: not found" probably something super simple that Im missing here, any documentation on okg commands? Ive never heard of it before, having trouble figuring this out on my own
×
×
  • Create New...