Jump to content

Zajt

Active Members
  • Content Count

    11
  • Joined

  • Last visited

About Zajt

  • Rank
    Hackling

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Hi! Sorry for the bad link, here is the correct one https://github.com/mfontanini/libtins . We cross-compiled it to the WiFi pineapple but when we run it on the pineapple, we get "Cannot resolve symbol "_ZdlPvj". On the libtins, it says that it only requires the dependencies libpcap and openssl. So this error comes probably because of some g++ runtime error, but what could be wrong? Feels like this library should be compatible with WiFi pinapple.
  2. Hello! Has anyone here succeeded to compile libtins( https://github.com/mfontanini/libtins ) on WiFi pineapple? Thanks in advance!
  3. Update: We tried the setup where the pineapple is acting "target AP" and running monitor mode on our laptop while generating traffic on a mobile phone, connected to the pineapple AP, and the pineapple being connected to another phone's hotspot. With this setup we could see the ICMP requests and responses both in an open hotspot and WPA2 configuration. However, the problem arises when we let the mobile device be the target AP and set the Pineapple in monitor mode. Then we are not able to see almost any data at all, at least not originating from the mobile device running ping on 8.8.8.8
  4. Why could it not be heard? Is it because they are on different WiFi channels?
  5. We tried with br-lan now so first we set br-lan to be in promisc mode. Then we run: tcpdump -w output.pcap -i br-lan , and then on WiFi pineapple we are conneted to our WiFi-hotspot. Then I connect to the same hotspot from my phone, then send ping requests from a terminal app on my phone. But we do not see these ICMP requests in the pcap. It seems like there is only packets from the host(the computer where we ssh into the Pineapple and run the tcpdump command)
  6. But br-lan is USB for ethernet to host, so if we ping there we will see it, but this will only work if we ping from the host computer. We wanna ping from other devices, like my phone connected to the same WiFi and then receive it and see the requests in Wireshark after we have run tcpdump. Is this possible?
  7. Hey! I am running "tcpdump -w output.pcap -i wlan1" on my WiFi Pineapple, then "ping -s 1000 8.8.8.8" from my phone which is connected to the same WiFi as wlan1 is from the Pineapple dashboard. But I don't see any ICMP requests with large size in wireshark. Before I run the tcpdump command on the WiFi pineapple after ssh:ing into it, I set it to promiscuous mode with "ifconfig wlan1 promisc" This is the output of "ifconfig wlan1" wlan1 Link encap:Ethernet HWaddr 00:C0:CA:A5:C9:59 UP BROADCAST PROMISC MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) Anyone know why I don't see any ICMP requests after opening output.pcap in Wireshark? Thanks in advance!
  8. Hi! Does anyone know how I can compile g++ and other stuff to my WiFi pineapple? Wanna get some stuff on there which I need. If this is possible, it would be awesome with tutorial. Thanks in advance!
  9. Hi! I plan to create a module which maybe should be able to detect attacks in some way, like an IDS. But since most of the stuff is encrypted, I'm not sure what kind of stuff it can detect. It feels like it only can detect if there is lots of traffic or not. Or is there anything something like that could detect that is interesting?
  10. I am thinking of making some module with something for a large project in school, and wonder about what is missing today with the modules available. Anything have some thoughts that would be cool to make? Maybe some detection of some attack or something similar?
×
×
  • Create New...