Jump to content


Active Members
  • Posts

  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

Idk_Man's Achievements


Newbie (1/14)

  1. Yes, I can connect to the client's access point, but besides that, can anything else be done with that information? Perhaps stage a future attack against the client in the future?
  2. *For educational purposes* What is the next step after a clients access point password has been found? I've been spinning around in circles and can't seem to figure out where to go from here. Can anyone please point me in the right direction? Or maybe point me to another forum/website that would help? Thanks guys!
  3. Idk_Man


    Thanks for the info @digininja I appreciate it buddy.
  4. Idk_Man


    Anyone know how to use Wireshark to decrypt a clients internet traffic once you find the accesspoint password? This is as far as I get: Open Wireshark> start wlan0mon> Edit> Preferences> Protocols> IEEE 802.11> Decryption Keys> Edit...> Create a new entry> wpa-pwd> Enter the accesspoint name/password> Okay. What do I do from here? I know it can read HTTP websites, but what about HTTPS?
  5. Github has a program for Kali Linux to target routers called RouterSploit.
  6. For education purposes, what's generally the next step after an access point's password is cracked? I'm just confused. I've seen countless posts about how to get 4-way handshakes, crack passwords, etc. but to what end? What can be done with a cracked PW?
  7. Try a simple reset (wait for your Nano's blue LED to be steady blue, press the reset button for 7 seconds then release) and do the initial setup again.
  8. I'd recommend for learning the basics (and free), look into running Kali Linux on a virtual machine. It'll teach you a lot on the subject matter and it comes pre-loaded with tools to help you grab packets, handshakes, etc.
  9. https://docs.hak5.org/hc/en-us/articles/360010471774-Firmware-Recovery https://www.wifipineapple.com/downloads
  10. You don't need a custom rig. Outsource it. GPUhash.me (That's the website URL) offers up their own custom server to specifically crack passwords. They charge $10 (in Bitcoin - BTC) if they're able to successfully crack a password for you; free if they cant. You don't have to pay up front either. Only if they tell you the password has been cracked, then you can pay to unlock the password. It generally takes 5-15 min. to crack a password. I tried the service out myself and it works 100%. I used my own, old WiFi password (13 characters long; alpha-numeric) and it was able to find it.
  11. Windows 10 To anyone finding this page in the future, I was able to successfully flash Twin Duck to my USB Rubber Ducky by following this YouTube video. https://www.youtube.com/watch?v=GYpikuKNg7A (Video tutorial) https://github.com/midnitesnake/usb-rubber-ducky (Twin duck software) **Tips: Don't use the c_duck_v2.1.hex file the guy says to use in the video (your duck will flash green/red, or at least mine did) instead, use the c_duck_v2_S002.hex file and you'll be good (Solid green). Also, if you're pressing shift + right click and don't see an option for "Open CMD terminal here", simply go to the address bar in the window you want to open the CMD terminal in and click a few times until the text turns blue and then just type CMD and press enter; it will open a CMD terminal in that windows location**
  12. On it. Thank you for the guidance @digininja
  13. Host OS: Windows 10 Pineapple Nano v. 2.7.0 VirtualBox v. 6.1.6 Kali Linux v. 2020.2 **Forward: I've been doing all this on my own private router, WiFi signal, computer, etc. Nothing illegal. Just trying to learn a new skill.** So I've been able to successfully capture a 4-way handshake (Both .CAP and.PCAP) using either the Pineapple Nano or Kali Linux> Successfully cracked the password of the WiFi AP using www.GPUHASH.me> And I can log into the "client" AP. I just don't know where to go from here and feel pretty dumb. How do I actually exploit the target from here? Over the last week I've been trying to learn Metasploit in Kali, thinking that this was the next logical step in the attack process. (I've also tried Armitage, but it seems like it's outdated and doesn't support Windows 10?) I understand the workflow of Metasploit: 1. Recon the target with various nmap scans: nmap -v -T4 -PA -sV --version-all --osscan-guess -A -sS -Pn 1-65535 <Target IP address> 2. Note the open port numbers/software & version numbers, etc. 3. (THIS IS WHERE I GET LOST) Search Exploit-Database.com for vulnerabilities on the open ports or services being run (See attached picture) 4. Load the Exploit> Set options> Run. I keep getting confused as to how to actually find known vulnerabilities given the data from the nmap scans. Has anyone else been in my position or am I just failing to understand something simple here? Thank you very much for any feedback guys!
  • Create New...