Jump to content

Struthian

Active Members
  • Content Count

    111
  • Joined

  • Last visited

Everything posted by Struthian

  1. Now that we have a later version of the Firmware, shouldn't the Dashboard Bulletins announce that and, in the future announce other things of interest? This could be a really nice feature if the server which serves it got updated. Right now, it's just a way to see if the Pineapple is on the public internet. Another thing would be announcing new Modules or updates to Modules.
  2. I'm more of a tell them there are fish than teach them to fish or hand them a fish kind of a guy :-)
  3. I connect to my LAN using the RJ45 connector. This is convenient for experiments at home. Not such a good idea outside where someone could get in to the Pineapple by that path (at least in some theories). Try this. The pineapple will be able to use your LAN as other computers you have do and you will be able to SSH to it. to /etc/config/firewall for Wan web and ssh access per: I enclosed the original firewall configuration and the one modified according to that post. firewall firewallOrig
  4. Which of the connectors did you use to connect to the internet? It does not appear you have a WiFi dongle? What is on the other end of which of those connections? The Bulletins will come through a public internet connection, when its connected. Simply connecting to the MAC is not sufficient. You must do something there to pass through that connection to your Mac's internet access. You can also use the RJ45 connection to get to a LAN switch, but you have to do a bit of configuring there if that's what you want. You can also tether your Pineapple to an Android phone. This is covered in
  5. The simplest is to simply get a bigger card. Also, you can look at the contents through an OpenVPN connection. You can modify the code to make your own module. Instead of exiting, it would simply wait a few minutes, check for the card and restart. That would be an interesting improvement.
  6. https://techcrunch.com/2018/01/02/these-psychedelic-stickers-blow-ai-minds/ This also demonstrates an interesting principle. Something small and weird can distract from something big and important. Similar ideas work in psychology and AI.
  7. Struthian

    VPN's

    I think there seems to be a confusion between"Censoring" the internet as a global interconnect and with an organization controlling access and use of it's own equipment. The organization, in this case, is a school for children. However Rayvn should understand that in work, in government there are also limitations. There is a difference between institutional or employment access and retail use from an internet provider. There is a legal and even moral difference. Rayvn would do well to put more effort into grammar, civics, and understanding the world around that is accessible rather th
  8. OpenVpn is software. It's not a server. Many servers run OpenVPN. You provide no real diagnostics, incomplete information. How can you possibly believe anyone will help you with so little effort on your part. I am starting to believe you simply don't know what you are doing. Here is a list of Servers. There are many more than this one. https://www.bestvpn.com/free-vpns/
  9. Anytime a Lithium battery is growing, that's not good. Take the support ticket from Foxtrot, keep it in some sort of plastic container that can let off pressure (eg: tupperware) and - keep it outside. Take a photo of it for documentation purposes and follow foxtrots instructions on returning it. These type of battery issues are usually not completely under the Vendors control. It's a part that they got from somewhere else.
  10. CES in Las Vegas lost power. I'm wondering if this was a hack. It seems localized. Any thoughts? I'll also say that the "Official answer" when we have one, may not be the truth.
  11. Seb - personally, I prefer that you don't have an auto sleep or if you do - the means to shorten it. In some cases, perhaps quicker could work and be preferable OR other things could be done while waiting. Also, Automatically would be a problem for those who actually followed your current recommendation. Just my thoughts, no big deal though.
  12. Most companies don't announce products before they have them ready to market. It's reasonable to think some future version would have that. It's also reasonable to think that, given Hak5 product cycle that such a product might happen in the foreseeable future. I think such speculations are all that could be known. In general, I suggest buying tech products that you will get good use of within a year. There will be better ones later. If you got your money's worth from one product, you won't mind buying the next one.
  13. What VPN Server are you connecting to? How did you set up to that connection? I don't think the Packet squirrel requires a router in between. From your question, I'm not sure that you understand what the modes and payloads are.
  14. USB supplies are typically 2- 2.5 amperes at most. The cables are not rated for more. Some computers don't have that much current available at the USB A ports. As stated, the Squirrel uses 120 ma. Whatever you get from the USB A port of the squirrel would be the available input current - 120ma used by the squirrel. Putting more than 2-2.5 amperes through any USB device could cause damage or even a fire. All of this is pretty much common sense and based on general USB specifications and basic concepts of electricity. I don't understand why you think the "output current is not grea
  15. The goal I'm exploring is windows based exploits. One advantage of Powershell being layered on the object oriented .Net library is that regular expressions are not as needed. Things are already set into properties within objects. There are also great list processing capabilities. I can think of few to none functions that are available in the windows GUI and not in Powershell. .Net shims can also be created for anything else. For Windows exploits, I think powershell is under utilized. I hope to have some more interesting (and involved) bits to share soon.
  16. It would be helpful to know where you connected which of the ports to what. There is a difference in how the device uses the two Ethernet ports. Why do you believe that there isn't IP? You didn't say. There is almost nothing to go on in helping you, given your post. What OVPN did you try to connect to?
  17. If the OS is Raspbian or even Debian, then it's all still true. A disk image is a disk image, that is to say, it represents the entire image of the disk. I don't know of a non image backup - though it might exist. A non image backup is complicated by creating the appropriate partitions within the disk and then restoring the proper files to those partitions. All this is exactly why (in addition to saving money) I use SD cards that are just enough to fulfill my needs. If that need increases, I step up to a larger SD card, restore to that and then expand into it.
  18. There is a utility in Raspbian that will duplicate your system to another SD card one that is mounted in a USB adapter. I know nothing of TRK but that's how I back up my Pi. Also the "Win32 Disk Imager" which I used to make SD card's for the PI, does the same thing, making an image from the disk which you store as a file. What might be jamming you in all cases, you can't create a disk image to a medium smaller than the disk. So - you can't put a 250gb image on a 128gb card. You can put a 250gb image on a 250gb file on your PC, then Zip it. I might add, I do just fine with a 32gb card
  19. For a larger project, I am exploring the use of Powershell to automate network tasks. In the enclosed script, I am assuming someone has a Raspberry Pi named PiM3.local with default username and password on my local network. I use Posh-SSH which can be installed within Powershell by Install-Module Posh-SSH . I then execute a command with SSH, grab the .bash-history and put a new file in the Pi. One could, of course, use nmap to find computers with port 22 and then proceed with something like this to see what happens. One could of course use the wifi pineapple to ... and so on. Are th
  20. His sister was Noor Inayat Khan, a spy during WWII who was murdered by the Nazis and never gave up her network.
  21. Here is something more peaceful that gets me in the zone.
  22. As far as I know, the only way to really destroy the data on a flash drive is to destroy internal configuration tables which redirect around bad sectors. To delete all data beyond recovery but, leaving a still useful drive would take significant time. If you really want to remove all evidence, it would be faster to simply take the ducky apart, remove the SD and destroy it.
  23. Yes, I think it would be best if there are two amplifiers. You are ordering the Boost, that's great. Now order another amplifier (to go with the dongle in the boost) and then the other kit with dongle, amplifier and a couple of accessories. So - yes you need both ends amplified to get the full benefit of amplifying in normal use. There are applications where the communications are just one way and may be the amplifier is not needed on the receiving end. In relation to the Tetra, you need two way. With specialized antennas and with the antennas higher above the ground you can ge
×
×
  • Create New...