Jump to content

n3d.b0y

Active Members
  • Content Count

    10
  • Joined

  • Last visited

About n3d.b0y

  • Rank
    Hackling
  • Birthday January 6

Profile Information

  • Gender
    Male
  • Interests
    Information Security, Programming, System administration
  1. n3d.b0y

    [Module] PMKIDAttack

    Hello. This does not work under NANO.
  2. n3d.b0y

    [Module] PMKIDAttack

    Name: PMKIDAttackAuthor: n3d.b0yPlatform: TetraVersion: 1.0GitHub: https://github.com/n3d-b0y/PMKIDAttackDescription: This module makes it easy to capture PMKID. We scan the network, click the attack button opposite the attacked access point and wait for the result. After we receive PMKID, attacks it will automatically stop and the file with hashes will go to the Captured block where you can download it. Installation process: opkg update && opkg install git git-http cd /pineapple/modules/ git clone https://github.com/n3d-b0y/PMKIDAttack.git PMKIDAttack chmod +x -R /pineapple/modules/PMKIDAttack/scripts I have no possibility to adapt the module for NANO 'cause I don't have this device. It's complicated to develop that functionality without the device and testing, but if I had more people in my team, I'd try to do it. You're very free to send me code changes or ideas how to improve the module. You can also contact me in this thread: https://codeby.net/threads/6-wifi-pineapple-pmkidattack.66709/ p.s Sorry for my English 😉
  3. Name: HandshakeCrack Author: n3d.b0y Platform: Tetra Version: 1.0 GitHub: https://github.com/n3d-b0y/HandshakeCrack Description: The module allows you to send the intercepted handshake to the online service of decrypting hashes www.onlinehashcrack.com. Also there is a functional for cavitation handshake. Installation process: opkg update && opkg install git git-http cd /pineapple/modules/ git clone https://github.com/n3d-b0y/HandshakeCrack.git HandshakeCrack chmod +x -R /pineapple/modules/HandshakeCrack/scripts I have no possibility to adapt the module for NANO 'cause I don't have this device. It's complicated to develop that functionality without the device and testing, but if I had more people in my team, I'd try to do it. You're very free to send me code changes or ideas how to improve the module. You can also contact me in this thread: https://codeby.net/threads/5-wifi-pineapple-handshakecrack.66700/ p.s Sorry for my English 😉
  4. n3d.b0y

    PMKID Attack on WiFi Pineapples

    My tetra falls. When i use hcxdumptool. What could be the problem?
  5. Hi, can anyone explain to me how to install airmon-ng 1.4 or higher? p.s I do not understand why the developers have not yet updated in the official firmware : (
  6. n3d.b0y

    PMKID Attack

    Great job. I will definitely try this module and write about its operation.
  7. n3d.b0y

    [Official] Online Hash Crack

    There is one drawback, you can not send a handshake that was received through standard feed. The model is looking for a handshake only in the modules folder. Standard functionality saves in tmp/handshake. I can fix it but probably these changes will not get into the release. Please correct this.
  8. n3d.b0y

    PineAP

    Found the answer, new devices not subject to this type of attack. If I misunderstand correct. What devices does Karma work against? Karma works by intercepting probe requests from potential wireless clients. Unfortunately, in recent years many software developers have patched wireless drivers in their Operating Systems to not actively broadcast probe requests whilst connected to an Access Point. This is most prevalent among mobile phone manufacturers such as Apple and Google, whose flagship software products are iOS and Android. NT-Based operating systems such as Windows are mostly unaffected due to their inability to modify wireless drivers through the "Windows Update" feature. As a general rule, almost every device running an embedded or mobile OS developed after 2012 will not work with Karma. Currently the main use of Karma is an opportunistic attack vector rather than a specific one. Meaning that it is better to run karma to investigate susceptible devices and proceed from there, as opposed to targeting a specific device or user. https://wiki.wifipineapple.com/legacy/#!karma.md
  9. n3d.b0y

    PineAP

    Here are my settings: https://ibb.co/6DtQ8TY https://ibb.co/8KXrrx3
  10. n3d.b0y

    PineAP

    Hi. Help me to understand. I added the network I needed to the pool. I throw users out of the access point which is added to the pool. But they connects back to its network and not to my access point. What can I do wrong or does it not work as I think?
×