Jump to content

JAL21

Active Members
  • Posts

    22
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

JAL21's Achievements

Newbie

Newbie (1/14)

  1. also, why is there an etc folder with everything in it on the sd card?
  2. I've had my pineapple for a few days now, and still learning what to do with it, but with the recon and PineAP, PineAP will not start most of the time, maybe the first time, but not any other time... Any Advice?
  3. The original idea was to do something like kismet, however on the owl, it only does a client kismet and needs a server, but I have no idea how to do that and since the owl is supposed to be stationary, I don’t know if that would be a good idea, I originally got the owl as a cheap way to start coding and start using Hak5 gear! The owl was more of a challenge than I first realized, due to a few bugs in the original firmware and not understanding the proper way to do payloads. (I’m waiting for the pineapple so at this time I only know the owl) one idea with the owl I had was to have it at a location, let’s say home or a friends house, that I would whitelist there current network and it would periodically Nmap the network and anything that doesn’t match mine or his stuff, to somehow notify us. but since I’m still learning about the pineapple before I have hands on experience, I don’t know what kind of projects I can apply for both
  4. Thank you for responding, the original idea was when for example when I got home, I would turn on my owl and have it automatically exfil my loot to c2, if I was elsewhere, it would start the attack. However I’m having issues trying to automatically exfil the files. I like the umbrella idea, but I don’t know how to do that, the signal owl is a payload based item, where the pineapple for example has the ability to have a GUI and have several attacks/recons available for you, but the owl’s primary goal is to do exactly what the payload says, no more, no less. (Like the shark jack, I think) that’s why I attempted to have each payload as a function, and a simple script like if you don’t connect to home, attack, but I’m still learning. home || test
  5. I recently bought a WIFI Pineapple Nano and FINALLY got the signal owl to work! I'd like to do a project that combines both of them and C2, however I am not knowledgeable on what I can do with both, any thoughts are welcome!
  6. ok, so I'm new to this, but if I want to combine a couple of the payloads that's available at hak5 GitHub, can I for example make one payload that has wifi connect payload and the open ap Nmap my thought was to copy the payloads into a single payload and make the individual payload a function! Any tips or tricks would be nice! My goal is that if it connects to a specific network when it boots up, it will dump the loot to C2, but if it doesn't connect, it will automatically start the Open AP Nmap Scan this is what I have so far: ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- #!/bin/bash # This is a test to see if my network is in range, it will connect home and export the loot to C2 # if my network is out of range or can't connect to it, it will do the Open AP Attack! # Title: Simple WiFi Connection Example # Author: Hak5Darren # Version: 1.0 function Home() { # WiFi Client Setup WIFI_SSID="SSID" WIFI_PASS="Password" LED SETUP WIFI_CONNECT # optionally start SSH server # /etc/init.d/sshd start LED ATTACK C2CONNECT && C2EXFIL } function OpenAP() { # Title: Open AP Nmap Scanner # Author: Hak5Darren # Version: 1.0 # # Description: Scans for open access points, then connects to each and runs an Nmap scan saving logs to the loot folder # # LED SETUP: Scanning # LED ATTACK: Connected, running nmap scan # # See nmap --help for options. Default "-sP" ping scans the address space for fast host discovery. NMAP_OPTIONS="-sP" LOOT_DIR=/root/loot/open_ap_nmap_scan MAX_CIDR=20 DEBUG=1 function scan_wifi() { [[ $DEBUG == 1 ]] && echo Scanning for open access points | tee -a /tmp/payload.log iwlist wlan0 scan > /tmp/wifi_scan cat /tmp/wifi_scan | grep "Encryption key:off" -A1 | grep ESSID | sort | uniq | cut -c 28- | sed "s/.$//g" > /tmp/open total_aps=$(cat /tmp/open | wc -l) [[ $DEBUG == 1 ]] && echo Found "$total_aps" open access points | tee -a /tmp/payload.log } function check_ap() { current_ap=$(sed -n "$on"p /tmp/open) [[ $DEBUG == 1 ]] && echo "-------------------------------" | tee -a /tmp/payload.log current_ap_mac=$(cat /tmp/wifi_scan | grep "$current_ap" -B5 | grep Address | awk {'print $5'} | head -1) [[ $DEBUG == 1 ]] && echo Selected AP MAC: "$current_ap_mac" | tee -a /tmp/payload.log if grep -i -q "$current_ap_mac" /tmp/nmap_scanned; then [[ $DEBUG == 1 ]] && echo Skipping - Already scanned AP: "$current_ap" with MAC: "$current_ap_mac" | tee -a /tmp/payload.log else connect_wifi scan_network fi } function connect_wifi() { LED STAGE1 [[ $DEBUG == 1 ]] && echo Connecting to Open WiFi AP: "$current_ap" | tee -a /tmp/payload.log ifconfig wlan0 down iwconfig wlan0 mode Managed essid "$current_ap" ifconfig wlan0 up while(iwconfig wlan0 | grep Not-Associated); do sleep 1; done [[ $DEBUG == 1 ]] && echo "Connected to AP number $on with SSID $current_ap" | tee -a /tmp/payload.log udhcpc -i wlan0 while [ -z "$SUBNET" ]; do sleep 1 && find_subnet done APMAC=$(iw wlan0 link | grep Connected | awk {print'$3'}) [[ $DEBUG == 1 ]] && echo "AP MAC Address/BSSID: $APMAC" | tee -a /tmp/payload.log [[ $DEBUG == 1 ]] && iwconfig wlan0 | grep ESSID | tee -a /tmp/payload.log [[ $DEBUG == 1 ]] && ifconfig wlan0 | grep inet | tee -a /tmp/payload.log } function scan_network() { LED STAGE2 find_subnet [[ $DEBUG == 1 ]] && echo "Found Subnet: $SUBNET" | tee -a /tmp/payload.log CIDR=$(echo $SUBNET | cut -d '/' -f 2) [[ $DEBUG == 1 ]] && echo "CIDR: $CIDR" | tee -a /tmp/payload.log if [ "$CIDR" -ge "$MAX_CIDR" ] then [[ $DEBUG == 1 ]] && echo "Starting network scan" | tee -a /tmp/payload.log nmap $NMAP_OPTIONS $SUBNET -oN "$LOOT_DIR/$current_ap-$APMAC.txt" &>/dev/null else [[ $DEBUG == 1 ]] && echo "Network too large - skipping scan" | tee -a /tmp/payload.log fi echo $APMAC >> /tmp/nmap_scanned } function find_subnet() { SUBNET=$(ip addr | grep -i wlan0 | grep -i inet | grep -E -o "([0-9]{1,3}[\.]){3}[0-9]{1,3}[\/]{1}[0-9]{1,2}" | sed 's/\.[0-9]*\//\.0\//') [[ $DEBUG == 1 ]] && echo "Found subet for network $current_ap as $SUBNET" | tee -a /tmp/payload.log } function run() { while true; do setup scan_wifi while [ "$on" -le "$total_aps" ] do if [ "$on" -ge 1 ]; then check_ap; fi let on=on+1 done sleep 5 [[ $DEBUG == 1 ]] && echo Completed recon. Restarting... | tee -a /tmp/payload.log done } function setup() { LED SETUP mkdir -p $LOOT_DIR touch /tmp/nmap_scanned on=0 killall wpa_supplicant } # Run payload run } Home && poweroff || OpenAP
  7. I have a similar issue, after I updated my owl, I couldn't get it to work properly, It would do the boot process then eventually go dark, if I push the button on the back, it would go into arming mode, but never attack. even a simple wifi_connect script isn't working....
  8. Would reinstalling the update potentially fix my problem? If so, how can I reinstall the update (basically wiping it and starting from scratch)???
  9. it didn't work, my owl just goes off after ~30 seconds
  10. Ok, so you are saying, all I need to do is to copy that script (payload.txt) to a USB drive and plug it in the owl and it should work, but i don't have to change the python script (changing the #!/bin/bash to #!/usr/bin/python) correct, and it should work yes???
  11. Do I need to do this, will this help?: chmod+x payload.txt and do I need to do the same thing for WIFI_CONNECT.py????? I'm going to wait to do this in case I might mess something else up....
  12. I forgot to mention that I did have that too, this is what I have: #!/bin/bash # Title: Simple WiFi Connection Example # Author: Hak5Darren # Version: 1.0 # WiFi Client Setup WIFI_SSID="Starfleet" WIFI_PASS="" LED SETUP WIFI_CONNECT # optionally start SSH server # /etc/init.d/sshd start LED ATTACK I thought I would do an open wifi network to test out, but it still fails
  13. I'm also confused with something, and if I get this wrong, I'm new at this..... on this document: https://docs.hak5.org/hc/en-us/articles/360033504014-Payload-Development-Basics it states that a .txt needs #!/bin/bash and a .py needs #!/usr/bin/python There are 2 things that are confusing me at this point, on the github, the extension says it's a python document, but when you look at it, it says #!/bin/bash https://github.com/hak5/signalowl-payloads/blob/master/payloads/extensions/wifi_connect.sh The Second thing that confuses me is that browsing to see what was on my owl, I looked at /bin and /usr/bin/ I didn't find a file/folder named python! Do I need to change any of this information that I came across or has that been fixed? Any advice/questions would be helpful!!!
  14. Ok, so a while back I updated the owl and now I can't seem to get it to do anything! I'm trying to connect it to wifi, but it won't work! It goes through the boot process, then it stops blinking all together! I don't know why it won't work, I don't know how I can erase it to start over in case it was something I did trying to get it to work... when I push the button on the back, it does work to put it into arming mode. Any help would be fantastic!
×
×
  • Create New...