Jump to content


Active Members
  • Posts

  • Joined

  • Last visited

  • Days Won


Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

Sidpicks's Achievements

  1. Might have fixed this. Stumbled across another thread. Now got nano connected to battery and usb WiFi dongle. I reset the nano and in the setup where I’d set ‘allow’ I changed it to ‘deny’ - can’t find the original post / poster but thank you for putting down how you did it! Connected to laptop Held down reset button for 7 seconds Waited (nervously) while the blue light flashed - for quite some time. When light went solid I put the ip 172 etc... into the search and the set up page popped up immediately. Followed all steps and changed access to deny for both drop down options. Got a warning about access to the pineapple, should have took more notice of this but was amazed that it was working and I’d not fried it not knowing what I’m doing! Accepted the T&C and it was straight in. Performed recon scan which worked and played about with the settings, all seemed to change. Seemed a bit slow but in the manual it does say that it may be a bit slower. Just got to test it out in the real world. Still be interested in how people set this up discreetly for a more mobile deployment. Hope this helps someone Cheers, Sid
  2. Hi all. I've searched through approximately 60 pages on this topic, checked out various websites, watched youtube tutorials and still coming up a blank, although I've learnt a fair bit of other info in the process! Set up - nano / laptop / iPhone -works fine, can get full access to pineapple on iphone - bingo! Set up 2 , nano, usb power pack (got one powerful enough to run the pineapple) Got the correct railink usb dongle and got blue light and the pineapple comes up on the wifi devices list - unable to connect either via phone or laptop. Set up 3 - as client (all settings correct when wired to laptop in the networking page, client mode, WLAN2 for the dongle, iPhone hotspot and password set up. Default interface updated. Iphone identifies as hotspot and the 'link' symbol appears - I can access via the phone. So, wired connections I have full functionality, can access updates, modules, perform scans, add notes etc etc but I'm trying to set up as a mobile device with minimum extra kit, Ideally, the pineapple connected just to the railink and battery, tucked into the pouch and then use the phone to control it / view scan etc etc. Am I missing a vital link? does the pineapple need the laptop to act as its internet connection (won't have one if wandering about on target) Do I need to get another item like a wifi router to connect the pineapple to? I thought it was passive and could work without internet connection. Is it the iPhone just blocking it somewhere. Do I switch to android now and be done with it? Whats the best minimalist (I'm talking pockets, not a tactical bag!) set up you guys are using? Thanks for looking and if anyone has any questions on the physical side I'm well versed in that and happy to help Cheers, Sid
  3. I’ll look into that, many thanks for the steer. I’ve got a lot to learn before I could even conceive a way of making my own program. Never say never though! Cheers, Sid
  4. Hi Dave. Not having much joy really. Found a few programs that are used in the construction industry for site surveys. I’m not too sure if they can actually detect WiFi signals or you add them to plans and the computer ‘theoretically’ works out its coverage from the surrounding construction / obstructions. If I find anything I’ll add it here, might help someone in the future. Cheers, Sid
  5. Unusual question probably but is there a way of making the nano (and tetra) more targeted. Ie. By physical shielding? I would be looking to recon for a specific SSID (router or client connected) If I were to get close enough to the target property and some way shield the device would it make the chance of obtaining the target details show up with their signal strength. Many of the engagements I have been on historically I’d looking for very specific clients attached to the SSID. I’ve been on the physical side of this for many years now, and just looking for cleaner options rather than actually disabling the devices (many engagements physical destruction has been in play) cutting wires, destructive entry to locks etc etc. Be nice to be able to add this gathered information to the initial site survey / recce for future exploitation’s Thanks for any pointers Sid
  6. Hi all. I’m looking for recommendations for software that will allow me to map an area and have the ability to have WiFi devices overlaid onto the map. This would be used as part of the recce phase of a site exploitation. Bit of google searching found some useful looking programs but mainly based around large enterprise firms. If there is something more suitable for pen testing out there (rather than drawing on a map!) then any pointers would be greatly appreciated. Thanks in advance Sid
  7. I’ve tried searching various terms and sub forums without much success. Is there a consolidated thread where people are putting images up of their kit set ups? I come from a long career in physical security, locks, safes and other mechanical devices and I’ve learnt a lot and found better ways of carrying kit from the posts of other kind people willing to share their ideas. I’ve been assisting with fairly interesting site exploitation’s for about 10 years now but I’m finally starting to scratch the surface when it comes to the electronic side of the house. Decent kit bags, pouches, power supplies / screens etc etc are all of interest. Overt or covert set ups would be interesting to see. If anyone has posted such a thread or knows a resource it would be much appreciated. Thanks in advance Sid
  8. I got my stuff from Lab401 in France. Really quick delivery. No import issues etc. Order I placed on Monday for some more kit will be here with UPS on Thursday.
  9. Set my tetra up yesterday to a raspberry pi 4. Typed in (did not need to type 1471) and it went straight to the set up page as described in both the book and the YouTube videos. Set up was immediate and I was using it straight away testing deauth attacks on client devices (what its has been bought for). Deauth worked within 10 seconds on all devices tested. I’ve not got onto all the other features as not really part of this project I’m working on so I can’t comment on how well that works. Was worried that I’d bought an expensive box after reading (after purchase!) some of the posts on this forum. I think if I’d have read them first I would have held off buying. USB cables plugged into extension on a USB 3 port on the Pi and then mains power. Did not use Ethernet cable for any of the setup. I’ve got very limited (I mean, computer science was just starting at school when I was there!) and I’m just scratching the surface of all this stuff. I’m not a programmer and can just about get round Microsoft excel. Found the set up easy and finding the interface (working with the manual) easy to use too. So, if its not working as per the video set up or the manual / field guide I would suspect something is up, unit or connection (thats how technical I am..) I literally followed step by step and it was running, fully updated and operational easily within 10 minutes. I would never be able to do some of the troubleshooting steps you guys are doing and maybe that helped me out. Pi was out of the box about an hour before set up. Fresh set up on that too. No time for me to mess it up.. Good luck with it, hope you get it working Cheers, Sid
  • Create New...