Jump to content

The Power Company

Active Members
  • Content Count

    78
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by The Power Company

  1. Got it, script updated. I don't have my Alfa card on me atm, I'll test whether it works later. EDIT: Just tested it, updated script. It should work fine now.
  2. You right, you right. I changed the script to reflect this change, the old line is commented out just in case
  3. I'm a bit late to the party but I've always viewed the term "hacker" as a sort of title, something bestowed upon you by others. A person can't really decide that they are a hacker, that isn't for them to say. It isn't about what you think of yourself, since that shit is all in your head anyway. It's all mostly about how other people view you. (just my opinion obviously)
  4. Just a heads up, you can get CPEH (Certified Professional Ethical Hacker) and CEH (Certified Ethical Hacker, up to v9) from places like LimeTorrents and The Pirate Bay, their lab exercises are very hands-on and are a great way to expand your knowledge.
  5. Check that your module is actually saved in a directory called /lib/modules/4.15.0-kali2-amd64 (i.e. try to cd into it). The directory may have a different name due to kali updates, in which case you simply must change the directory to the current one.
  6. You can find lots of cameras that are publicly on the internet through shodan.io
  7. May sound like a dumb question, but is your pineapple connected to the internet? Either through WiFi client mode or an Ethernet cable? (you can check by trying to load the news on the dashboard or checking for updates)
  8. Really? I thought that hackers were supposed to be as noisy as possible when infiltrating a network!
  9. Is it possible to run Piratebox without OpenWrt? I know the Nano already supports OpenWrt, and I'm pretty sure that the Tetra also does, but it isn't in OpenWrt's Table of Hardware yet... EDIT: I wish I could say that I mean the stock version of OpenWrt, but honestly it was so late what I posted this that I completely forgot that both pineapples already run OpenWrt. I mean its not like it says "with OpenWrt" in the ascii art that appear when you ssh into one... oh wait...
  10. Most laptops don't fit in it, but it is great if you are traveling light (and I mean very light)
  11. I've gotten the web interface working on Ubuntu 17 but I haven't tried configuring it for pineapples yet.
  12. Hey guys, So I have been playing around with the newish web interface for Kismet and it is pretty great. I've just been using the standard wireless cards plugged into USB, however, when Darkmatter did his wifi cactus build, he used a bunch of pineapples connected to one pc using ethernet cables and hubs. Does anyone know if this method of interfacing with pineapples is available to the public yet? And if so, how to do it? I know I could just run Kismet on the pineapple itself, but then I won't get that shiny new web interface...
  13. Like many others, I bought myself an Alfa AWUS036ACH, only to find its drivers are not set up by default on the latest version of Kali (despite many if its more recent reviews pointing out this fact). I found that there are few guides on how to get this sexy dual-band interface going, so I made a quick shell script to do everything in one shot. A few things to note before we begin: You need an internet connection for this to work This script works great on a fresh installation of the latest version of Kali Linux (2018.1). I tried running the script on a live boot, but the kernel yelled at me when I was modprobe-ing. If you want this to work with live boot, you will probably need to set up persistence or a custom image. Neither of those options are that difficult. Some of the commands towards the end are not necessary for installation, but I used them while I was figuring out how to set everything up, so I left them in there in case anything breaks. If you are anything like me, you may have a few broken drivers polluting your /usr/src folder from previous failed attempts. Delete them before attempting. Once script has run, I recommend you add the following lines to your NetworkManager.conf [keyfile] unmanaged-devices=interface-name:wlan1;interface-name:wlan2 This prevents NetworkManager from trying to resolve the interface using its own stuff when you reboot again (real men keep NetworkManager disabled anyway, but whatever). If your PC already has a wlan0 assigned by default (i.e. is a laptop with built-in wifi), the keyfile above should work fine. Otherwise, just add interface-name:wlan0; before interface-name:wlan1; The reason I also disabled a second, nonexistent wlan2 at the end is because sometimes, if I unplug the interface and replug it into a different USB port, it will be assigned one number up. This measure adds one get-out-of-NetworkManager-free card to your hand, increasing your chance to pass go and collect that sweet $200. 6. Once you have gotten the interface set up, I would recommend using ifconfig to put it into monitor mode, instead of airmon-ng. I've found that airmon-ng tends to have issues with manually installed drivers on occasion. In case you don't know, here is how its done (assuming your Alfa is assigned wlan1): ifconfig wlan1 down iwconfig wlan1 mode monitor ifconfig wlan1 up Anyway, here is the script in question. As you probably already know, you can copy it to a text file called coolfilename.sh, set it to executable, and give that baby a run from the terminal. Or you could always just manually run the following commands one at a time. #!/bin/sh # Shell script to set up drivers for Alfa AWUS036ACH # You must have an internet connection. # update your repositories apt-get update # install dkms if it isn't already apt-get install dkms # change directory to /usr/src cd /usr/src # if you have any other drivers installed,remove them like so: rm -r rtl8812AU-4.3.22/ # get latest driver from github # used to be: git clone https://github.com/aircrack-ng/rtl8812au git clone https://github.com/gordboy/rtl8812au.git # move into downloaded driver folder cd rtl8812au/ # update files in working tree to match files in the index # this step doesn't seem to be necessary anymore, commented out # git checkout --track remotes/origin/v5.2.20 # make drivers make # move into parent directory cd .. # debugging dkms status # rename file for use with dkms mv rtl8812au/ rtl8812au-5.2.20 # dkms add driver dkms add -m rtl8812au -v 5.2.20 # build drivers dkms build -m rtl8812au -v 5.2.20 # install drivers dkms install -m rtl8812au -v 5.2.20 # debugging lsmod # summon new interface from the depths of the kernel modprobe 8812au # wifi interface should now appear. ip link EDIT 10-17-2018 As per the driver's Github page, added the following line to dkms build steps: dkms add -m rtl8812au -v 5.2.20 Script was successful for Debian, should now work again for any Debian-based linux distro.
  14. Sweet, thanks for the info. You wouldn't happen to know what wlan0-1 is used for, would you?
  15. I guess I should post here now that I've been here for a little while. Favorite game: entire Dark Souls series Favorite OS: Despite its flaws, I really do like Windows for daily use. I use Kali a lot, but Peppermint Linux is the only Linux that matters Favorite console: Nintendo Switch Nationality: half Cuban, half European, born and raised in America Favourite band: Nine Inch Nails or Gorillaz Other hobbies: amateur HAM radio operator, wardriver, climbing/hiking/biking Occupation: definitely not a FED Other random facts: I am Fluent in English and Spanish, can read Japanese, Russian, and a bit of Chinese. Last summer my friends and I spend two months hiking across the diameter of Spain, from Pamplona to Fistera, and it seems that all the WiFi in the entire country is insecure for the most part. It's like all the data packets collectively get drunk and tend to just stumble into your house by mistake The Pokemon Go fad was great because I could wardrive all over the place and if anyone questioned what I was doing I could just say Pokemon Go, even though there were WiFi radios poking out of my bags, and it was suddenly socially acceptable! I unironically plan to replace my legs with bionic prosthetics the moment they begin to fail me. Possibly my arms as well, not as sure about those though. I'm gonna keep running till the day I die, baby. Maybe I can even program them to automatically walk my corpse to the grave, that would be fun.
  16. Greetings fellow humans, Where/How can I figure out which of the radios on a Tetra is associated with which pineapple function? My shallow understanding is that the Wifi Pineapple Tetra has four radios in it, which are each used for different tasks by default (pineAP, open and management APs, etc). Most people are satisfied with using the dipole antennas that come with the pineapple, but imagine for a second that you wanted to use, say, a directional antenna with PineAP, but you only have one. Which knobs are attached to which wifi interface?
  17. Keep in mind: Allow Mode means that only clients with their SSID or MAC in the filter will be able to connect. This means if your set filters to Allow and your filters are empty, no devices will be able to connect. Deny Mode means that clients with their SSID or MAC in the filter will not be able to connect. This means if your filters are set to Deny and your filters are empty, all devices will be able to connect. It took me longer than I care to admit to figure this out, hope it helps
  18. The best way to protect the rogue AP is using the Filters tab. With proper recon, you should be able to identify the MACs or SSIDs of the target devices and add them to the filter. With the filters set to "allow" mode, only devices with a MAC address or SSID in one of the pools will be able to connect. If you are looking to minimize collateral damage then filters are a good choice. One of the benefits of a rogue AP attack is that you don't necessarily have to be inside of the building for it to be successful. If the employees have directly received instructions to connect to the rogue access point then that means a) the hacker has physical access to the building or b) has social-engineered someone into providing the credentials to employees. In either case, the hacker is already far beyond rogue access points in terms of potential harm to the company.
  19. So, are you trying to share your internet connection with your pineapple? There are several ways you can do this. If your wired network is a standard home network, you can plug a cable from the wall straight into the pineapple's standard ethernet port, and it should be connected just like that. The best way to check if your pineapple is connected to the internet is to try and load the bulletins from the first tab, try to load the modules pane, or check for firmware updates. If you can do those, than great job, your pinecone has internet. It is also possible to connect to a wifi network using the pineapple, but this prevents you from using PineAP unless you have a USB wifi adapter that is compatible with the pineapple. Just go to the networking tab in the pineapple menu and input the info in the "Wifi Client Mode" section. If you are using a corporate network or a university network (these generally require both a username and a password to connect, not just a password) then you can share a desktop or laptop's internet with your pineapple. If your pc has multiple ethernet ports, or wifi and an ethernet port, or if you have various usb-wifi or usb-ethernet interfaces, or any combination of those, you should be set. Go to your windows network settings, find the "change adapter options" panel, and right-click on the interface that is providing internet to your pc . Click "properties", then "sharing", and check the "enable sharing" box and select the interface that is connected from your pc to your pineapple. You should then be connected properly. Any one of these options will connect your pineapple to the internet. If what you mean by internet sharing is simply using your pineapple as a normal router to connect wifi devices to, go to the networking settings and enable the Management AP. Give it a nice name, a memorable but hard to guess password, and uncheck the "disable" and "hide" boxes. You may want to disable the open AP as well, since anyone can connect to it, but you could also just use the open AP itself. I think that's everything.
  20. I mean, did you accidentally deauth yourself? But really, I have had connection issues where either my pineapple was too close to the antenna on my desktop or the internet connection leading to my pineapple gave up for some reason. Playing with pineapples is fun, but with its long range, you actually can accidentally knock yourself off the network if you aren't using the filters. What exactly are you running when this happens, or does it just happen passively? Also, what is your interface's name? Sometimes having a non wlan-something interface name causes this issue.
  21. I'm also no expert, but to start, make sure you are following standard security conventions, such as WPA2 on every thing, proper passwords, etc. Check all of your pcs for malware, the intruder may have installed a backdoor into something directly connected to it. Possibly consider backing up personal data and doing clean installs. As for the Pineapple, it is pretty great for packet capturing and monitoring wireless network traffic. If you think the person is using wireless attacks on your modem (unlikely unless it is someone nearby) software such as tcpdump can help you monitor what is going on. There are lots of tutorials and threads on this forum that can help to that end. If the backdoor is in the modem itself, try resetting it, installing latest firmware, or consider getting a different one. You could also simply use the pineapple as your main wifi hotspot. Personally I wouldn't recommend using wifi for telecommuting anyway, since it can be finicky. If you haven't already, I would recommend setting aside one computer for work purposes only, no games or even social media, to minimize the chances of getting viruses from random web pages. Use Ethernet and a VPN on this machine to connect to your workplace.
×
×
  • Create New...