Jump to content

Idk_Man

Active Members
  • Posts

    52
  • Joined

  • Last visited

Everything posted by Idk_Man

  1. Yes, I can connect to the client's access point, but besides that, can anything else be done with that information? Perhaps stage a future attack against the client in the future?
  2. *For educational purposes* What is the next step after a clients access point password has been found? I've been spinning around in circles and can't seem to figure out where to go from here. Can anyone please point me in the right direction? Or maybe point me to another forum/website that would help? Thanks guys!
  3. Idk_Man

    Wireshark

    Thanks for the info @digininja I appreciate it buddy.
  4. Idk_Man

    Wireshark

    Anyone know how to use Wireshark to decrypt a clients internet traffic once you find the accesspoint password? This is as far as I get: Open Wireshark> start wlan0mon> Edit> Preferences> Protocols> IEEE 802.11> Decryption Keys> Edit...> Create a new entry> wpa-pwd> Enter the accesspoint name/password> Okay. What do I do from here? I know it can read HTTP websites, but what about HTTPS?
  5. Github has a program for Kali Linux to target routers called RouterSploit.
  6. For education purposes, what's generally the next step after an access point's password is cracked? I'm just confused. I've seen countless posts about how to get 4-way handshakes, crack passwords, etc. but to what end? What can be done with a cracked PW?
  7. Try a simple reset (wait for your Nano's blue LED to be steady blue, press the reset button for 7 seconds then release) and do the initial setup again.
  8. I'd recommend for learning the basics (and free), look into running Kali Linux on a virtual machine. It'll teach you a lot on the subject matter and it comes pre-loaded with tools to help you grab packets, handshakes, etc.
  9. https://docs.hak5.org/hc/en-us/articles/360010471774-Firmware-Recovery https://www.wifipineapple.com/downloads
  10. You don't need a custom rig. Outsource it. GPUhash.me (That's the website URL) offers up their own custom server to specifically crack passwords. They charge $10 (in Bitcoin - BTC) if they're able to successfully crack a password for you; free if they cant. You don't have to pay up front either. Only if they tell you the password has been cracked, then you can pay to unlock the password. It generally takes 5-15 min. to crack a password. I tried the service out myself and it works 100%. I used my own, old WiFi password (13 characters long; alpha-numeric) and it was able to find it.
  11. Windows 10 To anyone finding this page in the future, I was able to successfully flash Twin Duck to my USB Rubber Ducky by following this YouTube video. https://www.youtube.com/watch?v=GYpikuKNg7A (Video tutorial) https://github.com/midnitesnake/usb-rubber-ducky (Twin duck software) **Tips: Don't use the c_duck_v2.1.hex file the guy says to use in the video (your duck will flash green/red, or at least mine did) instead, use the c_duck_v2_S002.hex file and you'll be good (Solid green). Also, if you're pressing shift + right click and don't see an option for "Open CMD terminal here", simply go to the address bar in the window you want to open the CMD terminal in and click a few times until the text turns blue and then just type CMD and press enter; it will open a CMD terminal in that windows location**
  12. On it. Thank you for the guidance @digininja
  13. Host OS: Windows 10 Pineapple Nano v. 2.7.0 VirtualBox v. 6.1.6 Kali Linux v. 2020.2 **Forward: I've been doing all this on my own private router, WiFi signal, computer, etc. Nothing illegal. Just trying to learn a new skill.** So I've been able to successfully capture a 4-way handshake (Both .CAP and.PCAP) using either the Pineapple Nano or Kali Linux> Successfully cracked the password of the WiFi AP using www.GPUHASH.me> And I can log into the "client" AP. I just don't know where to go from here and feel pretty dumb. How do I actually exploit the target from here? Over the last week I've been trying to learn Metasploit in Kali, thinking that this was the next logical step in the attack process. (I've also tried Armitage, but it seems like it's outdated and doesn't support Windows 10?) I understand the workflow of Metasploit: 1. Recon the target with various nmap scans: nmap -v -T4 -PA -sV --version-all --osscan-guess -A -sS -Pn 1-65535 <Target IP address> 2. Note the open port numbers/software & version numbers, etc. 3. (THIS IS WHERE I GET LOST) Search Exploit-Database.com for vulnerabilities on the open ports or services being run (See attached picture) 4. Load the Exploit> Set options> Run. I keep getting confused as to how to actually find known vulnerabilities given the data from the nmap scans. Has anyone else been in my position or am I just failing to understand something simple here? Thank you very much for any feedback guys!
  14. Thanks for the reply Cap_Sig. That was helpful. Gave me a little bit more insight. Anyone else in the future coming across this post, look at learning Metasploit - Kali Linux.
  15. Just curious... Everyone seems to want to crack a clients WiFi password, but to what end? What can be done once you find an access-points WiFi password? I understand that you can use the client WiFi to surf the web anonymously, but what else can be done??
  16. It's a fairly easy process to flash the Nano's firmware. Only takes bout 10 minuets. https://docs.hak5.org/hc/en-us/articles/360010471774-Firmware-Recovery
  17. Have you already tried changing out your SD card for a different one? If that doesn't help, have you tried doing a reset of your Nano? Wait until your Nano's LED is solid blue> press and hold the reset button on the bottom for 7 seconds> let go> wait about 1-2 min for your Nano to reset. If that doesn't work, perhaps look into trying to revert your firmware back to 2.6.2 - the SD card functionality seemed to be stable in that release. https://www.wifipineapple.com/downloads
  18. OS: Win 10 Nano v. 2.7.0 I have a list of saved SSID's from previous recon scans in the area that I downloaded locally. Had to do a reset of the Nano (No SSID pool anymore) Now I'm trying to load the saved SSID list back into the Nano's SSID pool and having issues doing so. What I've tried: - Using the "Cabinets" module I went into /etc/pineapple/ssid_file and pasted in my saved SSID list and pressed save. Nothing populated in the Nano's SSID pool. - Tried using the "SSID Manager" module, but no buttons are clickable besides "Clear Editor".
  19. When on your client device (your phone) which Nano access point are you trying to connect to? Under the "Access Point" section in the Network page, there's two access points that you created when you did the initial setup for the Nano. One is under "Management SSID" and the other is "Open SSID". Make sure your client device (phone) is trying to connect to the "Open SSID" one. Furthermore, looking at the pic you provided, it looks like your Nano doesn't have internet access. To see if I'm right or not, go to the "Dashboard" page and click on "Load Bulletins" button. Do you get an error message or do you see a bunch of text load? Essentially, if your Nano doesn't have internet access, neither will the access points you're client device is trying to connect too.
  20. Can you post a screenshot of your Pineapples "Networking" tab? Omit any personal data.
  21. If anyone's looking for a step-by-step guide on how to install and get the EvilPortal working, here you go 🙂 How To Install EvilPortal.txt How to Delete Traces of EvilPortal to Re-Install.txt
  22. Looking at your "WiFi Client Mode" section, I'm guessing that you don't have an external WiFi adapter plugged into your NANO? Here is a 100% compatible (and pretty affordable - $5 + shipping) choice. The WiFi adapter lets you connect your NANO to your local WiFi signal. https://shop.hak5.org/products/ralink-usb-wifi-rt5370
  23. @Madan Bimali Can you take a screenshot of your NANO's website portal (Networking tab)
×
×
  • Create New...