Jump to content

Void-Byte

Active Members
  • Posts

    64
  • Joined

  • Last visited

  • Days Won

    3

Everything posted by Void-Byte

  1. Hi Ed, You should be able to retain your .db file and use it with the Pro edition.
  2. If I'm not mistaken this is a byproduct of Allow Associations and Beacon Response. What happens is your device probes for these specific SSIDs, and the WiFiPineapple responds send a targeted beacon response to the device acknowledging that the Pineapple is that probe. If you were to 'Forget' these networks on your device, or add this device to the DENY list on the pineapple it shouldn't occur anymore (less you connect to more networks again without forgetting them).
  3. Hi @FruitNinja, Could you please be a bit more descriptive of the issue? I can't ascertain if you're referring to the WiFi Pineapple MKVII's logging of beacons, or something else.
  4. Just to help echo what @jholbrookftl said. You most definitely are collecting SSID's and rebroadcasting them hence the same MAC.
  5. Hey@newbi3, I had my Pineapple MKVII off for a couple of days, and when I booted it back up to make another video I got [Module Response Was Empty] error when accessing the Evil Portal module. I just refreshed the page, and it worked again, but I promised you I'd give you an error log. 2020-10-08 13:37:17,289 - evilportal - DEBUG - Initializing module evilportal. (module.py:24) 2020-10-08 13:37:17,315 - evilportal - INFO - Starting module... (module.py:188) 2020-10-08 13:37:17,322 - evilportal - DEBUG - Binding to socket /tmp/modules/evilportal.sock (module.py:190) 2020-10-08 13:37:17,329 - evilportal - DEBUG - Listening on socket! (module.py:193) 2020-10-08 13:37:17,335 - evilportal - DEBUG - Calling 1 startup handlers. (module.py:195) 2020-10-08 13:37:17,390 - evilportal - DEBUG - Processing request. (module.py:210) 2020-10-08 13:37:18,274 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2020-10-08 13:37:18,281 - evilportal - DEBUG - Sending response {"payload": {"installed": true, "installing": false, "job_id": null}} (module.py:83) 2020-10-08 13:37:18,361 - evilportal - DEBUG - Processing request. (module.py:210) 2020-10-08 13:37:18,372 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2020-10-08 13:37:18,379 - evilportal - DEBUG - Sending response {"payload": "172.16.42.42\n"} (module.py:83) 2020-10-08 13:37:18,471 - evilportal - DEBUG - Processing request. (module.py:210) 2020-10-08 13:37:18,497 - evilportal - ERROR - Exception occurred while reading file: (module.py:462) 2020-10-08 13:37:18,522 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2020-10-08 13:37:18,553 - evilportal - DEBUG - Sending response {"error": ""} (module.py:83) 2020-10-08 13:37:18,699 - evilportal - DEBUG - Processing request. (module.py:210) 2020-10-08 13:37:18,716 - evilportal - DEBUG - Creating portal folder (module.py:473) 2020-10-08 13:37:18,732 - evilportal - DEBUG - Listing directories (module.py:476) 2020-10-08 13:37:18,756 - evilportal - DEBUG - Building list (module.py:479) 2020-10-08 13:37:18,796 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2020-10-08 13:37:18,802 - evilportal - DEBUG - Sending response {"payload": [{"title": "google-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/google-login", "active": false}, {"title": "facebook-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/facebook-login", "active": false}, {"title": "yahoo-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/yahoo-login", "active": false}, {"title": "cliqq-payload", "portal_type": "basic", "size": 4096, "location": "/root/portals/cliqq-payload", "active": false}, {"title": "TestPortal", "portal_type": "basic", "size": 4096, "location": "/root/portals/TestPortal", "active": false}, {"title": "twitter-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/twitter-login", "active": false}, {"title": "starbucks-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/starbucks-login", "active": false}, {"title": "o2-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/o2-login", "active": false}]} (module.py:83) 2020-10-08 13:37:25,690 - evilportal - WARNING - Non-JSON Received (module.py:68) 2020-10-08 13:37:25,696 - evilportal - DEBUG - Received non-json data over the socket. (module.py:207) 2020-10-08 13:37:34,903 - evilportal - DEBUG - Processing request. (module.py:210) 2020-10-08 13:37:35,586 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2020-10-08 13:37:35,594 - evilportal - DEBUG - Sending response {"payload": {"installed": true, "installing": false, "job_id": null}} (module.py:83) 2020-10-08 13:37:35,671 - evilportal - DEBUG - Processing request. (module.py:210) 2020-10-08 13:37:35,715 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2020-10-08 13:37:35,740 - evilportal - DEBUG - Sending response {"payload": "172.16.42.42\n"} (module.py:83) 2020-10-08 13:37:35,988 - evilportal - DEBUG - Processing request. (module.py:210) 2020-10-08 13:37:36,015 - evilportal - DEBUG - Creating portal folder (module.py:473) 2020-10-08 13:37:36,073 - evilportal - DEBUG - Listing directories (module.py:476) 2020-10-08 13:37:36,157 - evilportal - DEBUG - Building list (module.py:479) 2020-10-08 13:37:36,291 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2020-10-08 13:37:36,324 - evilportal - DEBUG - Sending response {"payload": [{"title": "google-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/google-login", "active": false}, {"title": "facebook-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/facebook-login", "active": false}, {"title": "yahoo-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/yahoo-login", "active": false}, {"title": "cliqq-payload", "portal_type": "basic", "size": 4096, "location": "/root/portals/cliqq-payload", "active": false}, {"title": "TestPortal", "portal_type": "basic", "size": 4096, "location": "/root/portals/TestPortal", "active": false}, {"title": "twitter-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/twitter-login", "active": false}, {"title": "starbucks-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/starbucks-login", "active": false}, {"title": "o2-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/o2-login", "active": false}]} (module.py:83) 2020-10-08 13:37:36,427 - evilportal - DEBUG - Processing request. (module.py:210) 2020-10-08 13:37:36,455 - evilportal - ERROR - Exception occurred while reading file: (module.py:462) 2020-10-08 13:37:36,481 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2020-10-08 13:37:36,507 - evilportal - DEBUG - Sending response {"error": ""} (module.py:83) 2020-10-08 13:37:36,837 - evilportal - DEBUG - Processing request. (module.py:210) 2020-10-08 13:37:37,261 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2020-10-08 13:37:37,269 - evilportal - DEBUG - Sending response {"payload": {"running": false, "webserver": true, "start_on_boot": false}} (module.py:83)
  6. Hey @Dragorn, Any plans on releasing a guide for the LED module?
  7. Hi @samy, Please remember to never perform malicious or illegal activities. In order to help you on your journey of cracking YOUR WiFi you can follow one of Null Bytes articles here. https://null-byte.wonderhowto.com/how-to/crack-wpa-wpa2-wi-fi-passwords-with-pyrit-0196782/
  8. Hi Piney, When you assigned the Static IP via terminal did you verify that the WiFi Pineapple MKVII was en1?
  9. Hi @curis9929, On the WiFi Pineapple MKVII to begin firmware recovery you must first first unplug the WiFiPineapple MKVII from all power, hold down the button, plug it back in, and wait for "3 RED FLASHES", and then let go of the button. This will put it into firmware recovery mode. Where you can assign it the IP of 172.16.42.42 and gateway of 255.255.255.0 then visit http://172.16.42.1 and select the "Recovery" tab to upload the RECOVERY file. This will reflash the firmware. -VB
  10. Hi Alberttt, When you use the WiFi PineApple MarkVII make sure you utilize it's web interface via http://172.16.42.1:1471. Currently the Hak5 Cloud C2 platform does not support the WiFi PineApple MKVII. Once you are at the WiFi Pineapples web interface you can ensure that it was a internet connection by going to the settings > networking tab, and making sure you are connected. Now you should be able to view the modules tab, and download modules. -VB
  11. Hey @newbi3, I wasn't able to get EvilPortal running on 1.0.1 BETA (reverting back to 1.0.0 worked later). It would install, but would skip the "Install Dependencies" page, and hang (with constant loading circles). I tried to pull from the log you mentioned, but it didn't exist... I even ran a search (find) and manually went through all the directories. Ended up flashing the firmware back to 1.0.0 and it then worked again. I forgot to mention. I originally flashed the recovery firmware because after uninstalling and then reinstalling the module it caused the exact same issue that I originally wrote to you about. It also made it so the portals couldn't be activated, previewed, etc... along with hanging of the "Start web server". Wish I had logs to give to you. If I encounter these issues again I'll make sure to dump them for you. Thank you for your hard work!
  12. Hey @newbi3, I already reflashed a few times since your post. It worked after another 2 reflashes (from 1.0 to 1.0.1 back to 1.0 worked). If it breaks again I'll dump the logs for you.
  13. Hey @newbi3, Was installing your module on a reflashed WiFi Pineapple MKVII when I ran into these two errors when attempting to "Install Dependencies".
  14. Hey @Darren Kitchen has the MKVII module made it out of design yet?
  15. New updated video has been added. Major quality improvements.
  16. Hello Everyone, I'm super excited to have finally received my WiFi Pineapple MKVII. While I work on updated all of my guides on the Hak5 Community forums feel free to take a look at my video if you're on the fence about a purchase.
  17. Hi Cursor, Please reference this guide. It's specifically made for Ubuntu.
  18. Perform a factory reset. https://docs.hak5.org/hc/en-us/articles/360010471774-Firmware-Recovery
  19. Here's a couple examples. Command Copy file from remote host to local host. scp [user]@[host]:[path] [path] Copy file from local host to remote host. scp [path] [user]@[host]:[path] Copy file from remote host to remote host. scp [user]@[host]:[path] [user]@<host>:<path> Example Running the command (remote to local). scp user@123.46.67.89:/file/to/copy.txt /path/to/save.txt Running the command (local to remote). scp /file/to/copy.txt user@123.46.67.89:/path/to/save.txt Running the command (remote to remote). scp user@123.46.67.89:/file/to/copy.txt user@987.65.43.21:/path/to/save.txt
  20. Hey Semaj, Are you running the script as a service (systemD)?
  21. I think it's time you start taking dumps to see where it's getting held up. I only work with AWS/GCP so my expertise ends here. Sorry!
  22. Hey Shanimal, So Google Cloud Platform (GCP) uses two sets of firewalls by default. The VM's firewall, and the Virtual Private Cloud (VPC) firewall. In order to host Cloud C2 you will need to adjust your VPC firewalls rules through the VPC > Firewall tool. You should have something set like this below... You will create a network tag to apply to the VM of your choosing. Add/Remove ports as needed. If you want some hands on assistance just send me a message.
  23. Hi netfoo, Certbot will need 80 (can use 443, but not if invalidated) to validate certificates. -VB
×
×
  • Create New...