Jump to content

Aaron Outhier

Active Members
  • Posts

    139
  • Joined

  • Last visited

  • Days Won

    5

Everything posted by Aaron Outhier

  1. It's a popular video game series. Popular among teen-agers, because it teaches them what not to do. Popular among law enforcement, because if gives them work to do. You know, rounding up all of the gamers who thought it would be cool in real life... Don't try this at home, OR ANYWHERE ELSE!
  2. No idea. It’s 4 AM in my native California. I’ve been awake since 3. I think I’m going to attempt another 2-3 hours. Good night everyone.
  3. Yes, I saw another post by you elsewhere saying that. Sad, but then my Owl never could really do much. Lack of free space, and lack of installed software made it difficult to do much with it.
  4. Hello, I was just coming here to report this problem. I'm glad I'm not the only one having this trouble. For me, If I click on my Signal Owl, the tab does appear at the top of the screen. However, I am unable to activate it. If I try to click on the tab, it does appear to open momentarily, but then it automatically switches back to the "Home" tab. In other words, it doesn't "stay" on the Signal Owl tab. I'm using 3.0.1 version of C2.
  5. That’s fine, but still, that might or might not be a dead end. Officially, the only way to access the Pineapple as a network device via a wire is via the Pineapple’s USB-C interface. I highly recommend you try that first. If your phone has enough power, a simple USB-C to USB-C cable should get you the result you desire, without having to mess around with the firmware.
  6. For what its worth, the Old Pineapples (Nano and Tetra), while technically able to work from the USB-A host ports, the preferred method was the included USB splitter, and an OTG cable for your phone. Note that if you try to power your Phone and Pineapple via a USB 3-way cable, it needs to be USB 3.x capable for the entire run, as there is just no way to provide sufficient power to both devices over USB 2. If the above is not feasible in your situation, you might try the following. If you have access to a PC or Mac with a USB-C port on it, or have a USB-C Wall charger, you can try running a USB 3 A to C cable from that charger to the USB-A port on your Pineapple. This should supply power to the device, since most of these devices just need 5V to be supplied SOMEWHERE. If the device correctly powers up this way, it will free up the USB-C port on the Pineapple (which contains the Network Interface), and you can use an OTG cable, or even a direct USB-C to USB-C cable to connect your phone to your pineapple, assuming your phone has that type of charging port. I hope that helps.
  7. Either the Mark VII has a battery built-in, and I haven't heard about it yet, or you're not connecting the Pineapple to your phone correctly. You HAVE to connect to the Pineapple via the USB-C interface, or it won't connect. At least from my understanding. I could be wrong. If I'm not mistaken, the new Pineapple doesn't include the same drivers (AKA Kernel Modules) built-in that would be required to "see" a phone connected to the USB type A port on the Pineapple. I don't own a Mark VII to test with, but you could maybe check if you could add the required drivers via the command line: opkg list kmod | grep -i android That command is just off the top of my head, and could be wrong. Just sayin'
  8. Kali NetHunter has some support for WiFi pineapples in their app, but NetHunter is a bit of a drastic modification to make on a primary Android phone. NetHunter was never intended to be used as a “daily driver”. It is mostly stable, but between the replacement kernel, and other such software, they make no guarantees on stability. That said, I have had very few problems with it. Let me be clear, though: if you plan to install NetHunter for the sole purpose of connecting your pineapple, you’re probably looking at a week-long headache for your efforts. In my humble opinion, it’s probably not worth a full NetHunter install. Also, a full install of NetHunter isn’t really supported on most models of Android phone. That said, you MIGHT be able to install just the main NetHunter app, just to try and use the Pineapple connector feature - that particular feature may or may not require the rest of the NetHunter framework. That said, if you have an old OnePlus or Nexus 5/6 series phone laying around, and you’re feeling adventurous, or you’re learning pen testing, you might just want to try it. Then again, maybe read up on what NetHunter is before you try anything too drastic... Kali NetHunter homepage
  9. That’s great, but what does it have to do with the OP’s question.
  10. No, since Apple disables the data connection on the iPhone until the device is unlocked.
  11. Personally, if it didn’t capture the audio, it wouldn’t kill me. I do really need it to pass through the audio to the TV, if I am going to be covert. Also, part of most HDMI setups is being able to transmit HDCP. I know you can’t capture HDCP data legally, but is there a way to detect if HDCP is trying to start, and pass the raw data stream through from HDMI in to HDMI out in that instance? I don’t know if that would even work. The idea, is to avoid suspicion, and thereby avoid detection. Its not going to be undetected if the client checks their HDMI cable because they suddenly are unable to get audio or play Blue-Ray discs. Just sayin’
  12. The people to call regarding hacking and cyberterrorism is the FBI.
  13. Dear @Darren Kitchen and Shannon “Squirrel” Morse, and any other individuals who might want to know... In at least 2 episodes, something called the Hamster dance is mentioned. Despite having been alive in the nineties, I hadn’t heard of this prior to watching the podcasts. So, I looked it up on the tubes. You might be interested to know, that I highly doubt you’ll get in any trouble for playing that tune, considering that the folks behind the hamster dance never did. You see, it wasn’t their tune. I listened to it, and immediately recognized it as the Whistle-stop theme from Disney’s Robin Hood animated classic from 1973. Although it was released a few years before I was born, I still enjoyed it as a young’n. See for yourself: Hamster dance: https://youtu.be/H9K8-3PHZOU Whistle stop: https://youtu.be/gxnvxtYfsd4 Music starts a short while in on the whistle stop.
  14. I even went so far as to modify the script that runs when I push the button underneath my Nano, to shutdown the device instead of rebooting it. The button is much more useful to me that way.
  15. Yes. Your mileage may vary, but I have had less issues with my pineapple when I do it that way. You can also type “poweroff” from an ssh or serial prompt, or from a C2 remote shell.
  16. Update: It’s not scan_ssid. I was remembering incorrectly. The term is ap_scan. Thus, it should be: ap_scan 1
  17. Personally, I have had similar issues if the Pineapple wasn’t shutdown properly before disconnecting the power. The file system on the device and/or on the MicroSD card gets corrupted otherwise.
  18. Great work-around, but not very practical if I ever need to do an actual pen test where I need to leave the pineapple at a site for a few days on end, and need to issue a remote reboot command via C2. I have yet to do my first pen test, so time will tell if this will be an issue.
  19. Ahh. I see. I posted the fix that worked for me. Perhaps an explanation is in order. The “-d sd” at the end instructs opkg to install the library to my SD card. If you didn’t install the nmap assets to the SD card, then this isn’t going to work for you. Simply omit the -d sd part if nmap assets are stored on internal storage.
  20. Somehow, my Wlan1 and Wlan2 devices are being somehow switched! When I plug in a NetGear USB Wifi device using the rtl8192cu chipset, everything works great for a while. After that my Nano starts to be unable to put wlan1 into monitor mode. When I check, Wlan 1 has the MAC address of my NetGear device, while Wlan2 has a MAC address of 00:C0:CA:91:XX:XX. I'm no expert on this, but something seems a bit off here... Also, when I unplug my USB WiFi adapter, Wlan1 disappears. @Darren Kitchen: What on earth is going on?? After a factory reset, it goes back to normal for a few days. I have not figured out yet what triggers the reversal of the network IFs as of yet. br-lan Link encap:Ethernet HWaddr 00:C0:CA:91:36:B7 inet addr:172.16.42.1 Bcast:172.16.42.255 Mask:255.255.255.0 inet6 addr: fe80::2c0:caff:fe91:36b7/64 Scope:Link inet6 addr: fde3:7467:10a7::1/60 Scope:Global UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:861 errors:0 dropped:0 overruns:0 frame:0 TX packets:768 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:186885 (182.5 KiB) TX bytes:598534 (584.5 KiB) eth0 Link encap:Ethernet HWaddr 00:C0:CA:91:36:B7 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:861 errors:0 dropped:0 overruns:0 frame:0 TX packets:768 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:198939 (194.2 KiB) TX bytes:598534 (584.5 KiB) Interrupt:4 lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:65536 Metric:1 RX packets:220 errors:0 dropped:0 overruns:0 frame:0 TX packets:220 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:25802 (25.1 KiB) TX bytes:25802 (25.1 KiB) wlan0 Link encap:Ethernet HWaddr 00:C0:CA:91:07:1A inet6 addr: fe80::2c0:caff:fe91:71a/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:79 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:14922 (14.5 KiB) wlan0-1 Link encap:Ethernet HWaddr 02:C0:CA:91:07:1A inet6 addr: fe80::c0:caff:fe91:71a/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:77 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:14502 (14.1 KiB) wlan1 Link encap:Ethernet HWaddr 00:E0:4C:81:92:B2 UP BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) wlan2 Link encap:Ethernet HWaddr 02:C0:CA:91:1A:34 inet addr:XXX.XXX.XXX.XXX Bcast:XXX.XXX.XXX.255 Mask:255.255.255.0 inet6 addr: fe80::c0:caff:fe91:1a34/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:1143 errors:0 dropped:0 overruns:0 frame:0 TX packets:1106 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:701250 (684.8 KiB) TX bytes:251759 (245.8 KiB)
  21. Hello, Has anyone else noticed that the KeyCroc can’t connect to open or hidden networks? I was hoping to test my implants using my nearby Pineapple connected to my own Internet uplink, so that I don’t have to know the targets WiFi key - I could setup my own WiFi and sit in an unmarked vehicle, etc. Unfortunately, in my testing, this doesn’t work. WiFi Pineapples don’t currently support configuring encryption, and it would seem that KeyCrocs don’t support connecting to unencrypted networks. I checked the documentation for wpa_supplicant.conf (amount others), and discovered that when trying to connect to an open network, there needs to be a line that says key_mgmt NONE In addition, in order to connect to a hidden network, the line scan_ssid 1 Needs to be present. I have contacted support twice now, but have received no response. Not sure if @Darren Kitchen and crew are just busy, ignoring me, or if one of us isn’t getting the other’s emails. Hopefully, they’re just too busy working on Hak5 stuff and haven’t had a chance to get back to me yet. BTW, the issue appears to affect the ScreenCrab and SignalOwl also, but I was only able to test the fix on the KeyCroc.
  22. Ok, so let me elaborate a bit: The underlying Linux operating system fully supports what you want to do. The fine folks at Hak5 haven’t implemented this yet in their web configuration interface for the Pineapple. The short answer is: you could set that up, but it won’t be easy for a beginner. You would have to go to a command prompt (ie. Ssh terminal), and turn off the web server, and probably other things too. Then you would need to configure things by hand. No point and click here. In the future, the developers of the Pineapple plan to add support for setting-up password protected access points. For now, it isn’t officially supported, and you’ll be on your own for that. Also, regarding impersonating an existing router, you would have to either physically turn off the existing router, or somehow exploit & crash it. I’ve said it before elsewhere, and I’ll say it again here: if it’s not your network, and you don’t have permission to be messing with it, and you start messing with it, you’re liable to get a one-way trip to federal prison! Do yourself a big favor: set yourself up with a test network, and play around with that!
  23. Turtle Pics I have highlighted the two set of solder points on the top and bottom sides. I hope that helps. Unfortunately, I have zero soldering skills, so removing the top board to peek at what is underneath is not an option for me. Note, I purposely took the first photo at a sight angle, because otherwise, it was difficult to see where the daughter board started. Ie. It all looked like one flat board if I took the photo straight down from above.
  24. Unlike the Nano, the Tetras have built-in storage, but no SD slot. The Tetras just have a bunch of internal storage to make up for the lack of SD storage. They both have a USB port, so a flash drive could be used if needed.
×
×
  • Create New...