Jump to content


Active Members
  • Content Count

  • Joined

  • Last visited

About Idk_Man

  • Rank
    Hak5 Fan +

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Yes, I can connect to the client's access point, but besides that, can anything else be done with that information? Perhaps stage a future attack against the client in the future?
  2. *For educational purposes* What is the next step after a clients access point password has been found? I've been spinning around in circles and can't seem to figure out where to go from here. Can anyone please point me in the right direction? Or maybe point me to another forum/website that would help? Thanks guys!
  3. Idk_Man


    Thanks for the info @digininja I appreciate it buddy.
  4. Idk_Man


    Anyone know how to use Wireshark to decrypt a clients internet traffic once you find the accesspoint password? This is as far as I get: Open Wireshark> start wlan0mon> Edit> Preferences> Protocols> IEEE 802.11> Decryption Keys> Edit...> Create a new entry> wpa-pwd> Enter the accesspoint name/password> Okay. What do I do from here? I know it can read HTTP websites, but what about HTTPS?
  5. Github has a program for Kali Linux to target routers called RouterSploit.
  6. For education purposes, what's generally the next step after an access point's password is cracked? I'm just confused. I've seen countless posts about how to get 4-way handshakes, crack passwords, etc. but to what end? What can be done with a cracked PW?
  7. Try a simple reset (wait for your Nano's blue LED to be steady blue, press the reset button for 7 seconds then release) and do the initial setup again.
  8. I'd recommend for learning the basics (and free), look into running Kali Linux on a virtual machine. It'll teach you a lot on the subject matter and it comes pre-loaded with tools to help you grab packets, handshakes, etc.
  9. https://docs.hak5.org/hc/en-us/articles/360010471774-Firmware-Recovery https://www.wifipineapple.com/downloads
  10. You don't need a custom rig. Outsource it. GPUhash.me (That's the website URL) offers up their own custom server to specifically crack passwords. They charge $10 (in Bitcoin - BTC) if they're able to successfully crack a password for you; free if they cant. You don't have to pay up front either. Only if they tell you the password has been cracked, then you can pay to unlock the password. It generally takes 5-15 min. to crack a password. I tried the service out myself and it works 100%. I used my own, old WiFi password (13 characters long; alpha-numeric) and it was able to find it.
  11. Windows 10 To anyone finding this page in the future, I was able to successfully flash Twin Duck to my USB Rubber Ducky by following this YouTube video. https://www.youtube.com/watch?v=GYpikuKNg7A (Video tutorial) https://github.com/midnitesnake/usb-rubber-ducky (Twin duck software) **Tips: Don't use the c_duck_v2.1.hex file the guy says to use in the video (your duck will flash green/red, or at least mine did) instead, use the c_duck_v2_S002.hex file and you'll be good (Solid green). Also, if you're pressing shift + right click and don't see an option for "Open
  12. On it. Thank you for the guidance @digininja
  13. Host OS: Windows 10 Pineapple Nano v. 2.7.0 VirtualBox v. 6.1.6 Kali Linux v. 2020.2 **Forward: I've been doing all this on my own private router, WiFi signal, computer, etc. Nothing illegal. Just trying to learn a new skill.** So I've been able to successfully capture a 4-way handshake (Both .CAP and.PCAP) using either the Pineapple Nano or Kali Linux> Successfully cracked the password of the WiFi AP using www.GPUHASH.me> And I can log into the "client" AP. I just don't know where to go from here and feel pretty dumb. How do I actually exploit the
  • Create New...