Jump to content

Traxxas

Active Members
  • Posts

    10
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by Traxxas

  1. i Love new update thanks for this, keep making pineapple mark 7 the best option to pentest wifi. thanks
  2. Hi, sorry for you loss, You can try to remove the hard disk or the solid state hard disk, connect it to your computer with a sata adapter and using a linux OS, use the CHNTPW command to blank your password and enter windows, if not you could also use the koon-boot tool to blank your password, if your child had activated the option of fast startup of windows your best option will be the first. if you need more information: https://whatisgon.wordpress.com/2010/01/28/chntpw-tutorial-resetting-windows-passwords-editing-registry-linux/ https://kon-boot.com/docs/ you can also try a helper operating system like rescatux or trinity rescue kit. https://trinityhome.org/ https://www.supergrubdisk.org/rescatux/
  3. i think you can do it on the pineAP filthering section and them u can set the blacklist option on mdk4 module on.
  4. Perhaps what you need is to identify what type of RF the drone uses or if it is Bluetooth and in which channel it connects to make noise on that channel, there are several techniques to make noise on a transmission channel but they depend on how they connect.
  5. Hello @newbi3 , I have many problems with the evil portal module. At the beginning it was working great for me, but after creating a captive portal and trying to use others like https://github.com/JonnyBanana/Netflix_EVIL_PORTAL the evil portal starts to behave unusual. It began to create symbolic links that can’t be modify after deactivating the portal and leave them completely fixed, so you have to change them manually with the command ln -sfn. If you don´t make these manual changes the evil portal can’t start the web server and the captive portals. The truth is, I do not know to which files the symbolic links should be directed. I tried to reinstall the firmware of the pineapple, the module and the dependencies and I still have errors with the evil portal. Please, can you help me? 1) The version of Evil Portal you are using: 1.1 2) The firmware version your pineapple is running: 1.0.2 3) Are you connected to the internet? Yes 4) The output of the module log file located at: /tmp/modules/evilportal.log on your pineapple. root@mk7:/tmp/modules# cat evilportal.log 2021-02-18 20:55:25,735 - evilportal - DEBUG - Initializing module evilportal. (module.py:24) 2021-02-18 20:55:25,758 - evilportal - INFO - Starting module... (module.py:189) 2021-02-18 20:55:25,764 - evilportal - DEBUG - Binding to socket /tmp/modules/evilportal.sock (module.py:191) 2021-02-18 20:55:25,769 - evilportal - DEBUG - Listening on socket! (module.py:194) 2021-02-18 20:55:25,774 - evilportal - DEBUG - Calling 1 startup handlers. (module.py:196) 2021-02-18 20:55:25,835 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 20:55:25,854 - evilportal - DEBUG - Calling handler for action check_dependencies and passing {'module': 'evilportal', 'action': 'check_dependencies'} (module.py:108) 2021-02-18 20:55:26,711 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 20:55:26,719 - evilportal - DEBUG - Sending response {"payload": {"installed": true, "installing": false, "job_id": null}} (module.py:83) 2021-02-18 20:55:26,832 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 20:55:26,859 - evilportal - DEBUG - Calling handler for action load_file and passing {'module': 'evilportal', 'action': 'load_file', 'path': '/pineapple/ui/modules/evilportal/assets/permanentclients.txt'} (module.py:108) 2021-02-18 20:55:26,917 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 20:55:26,954 - evilportal - DEBUG - Sending response {"payload": "172.16.42.42\n172.16.42.178\n"} (module.py:83) 2021-02-18 20:55:27,112 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 20:55:27,131 - evilportal - DEBUG - Calling handler for action status and passing {'module': 'evilportal', 'action': 'status'} (module.py:108) 2021-02-18 20:55:27,556 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 20:55:27,563 - evilportal - DEBUG - Sending response {"payload": {"running": false, "webserver": true, "start_on_boot": false}} (module.py:83) 2021-02-18 20:55:27,646 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 20:55:27,677 - evilportal - DEBUG - Calling handler for action list_portals and passing {'module': 'evilportal', 'action': 'list_portals'} (module.py:108) 2021-02-18 20:55:27,708 - evilportal - DEBUG - Creating portal folder (module.py:473) 2021-02-18 20:55:27,766 - evilportal - DEBUG - Listing directories (module.py:476) 2021-02-18 20:55:27,853 - evilportal - DEBUG - Building list (module.py:479) 2021-02-18 20:55:27,928 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 20:55:27,934 - evilportal - DEBUG - Sending response {"payload": [{"title": "twitter-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/twitter-login", "active": false}, {"title": "google-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/google-login", "active": false}, {"title": "facebook-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/facebook-login", "active": false}, {"title": "cliqq-payload", "portal_type": "basic", "size": 4096, "location": "/root/portals/cliqq-payload", "active": false}, {"title": "Cisco-Update", "portal_type": "targeted", "size": 4096, "location": "/root/portals/Cisco-Update", "active": false}, {"title": "Prueba", "portal_type": "basic", "size": 4096, "location": "/root/portals/Prueba", "active": false}, {"title": "o2-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/o2-login", "active": false}, {"title": "yahoo-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/yahoo-login", "active": false}, {"title": "Cisco", "portal_type": "basic", "size": 4096, "location": "/root/portals/Cisco", "active": false}, {"title": "starbucks-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/starbucks-login", "active": false}, {"title": "Netflix", "portal_type": "basic", "size": 4096, "location": "/root/portals/Netflix", "active": false}]} (module.py:83) 2021-02-18 20:55:27,975 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 20:55:27,997 - evilportal - DEBUG - Calling handler for action load_file and passing {'module': 'evilportal', 'action': 'load_file', 'path': '/tmp/EVILPORTAL_CLIENTS.txt'} (module.py:108) 2021-02-18 20:55:28,032 - evilportal - ERROR - Exception occurred while reading file: (module.py:462) 2021-02-18 20:55:28,062 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 20:55:28,090 - evilportal - DEBUG - Sending response {"error": ""} (module.py:83) 2021-02-18 20:55:37,569 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 20:55:37,594 - evilportal - DEBUG - Calling handler for action load_file and passing {'module': 'evilportal', 'action': 'load_file', 'path': '/tmp/EVILPORTAL_CLIENTS.txt'} (module.py:108) 2021-02-18 20:55:37,625 - evilportal - ERROR - Exception occurred while reading file: (module.py:462) 2021-02-18 20:55:37,656 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 20:55:37,688 - evilportal - DEBUG - Sending response {"error": ""} (module.py:83) 2021-02-18 21:20:27,874 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 21:20:27,880 - evilportal - DEBUG - Calling handler for action load_file and passing {'module': 'evilportal', 'action': 'load_file', 'path': '/tmp/EVILPORTAL_CLIENTS.txt'} (module.py:108) 2021-02-18 21:20:27,930 - evilportal - ERROR - Exception occurred while reading file: (module.py:462) 2021-02-18 21:20:27,936 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 21:20:27,979 - evilportal - DEBUG - Sending response {"error": ""} (module.py:83) 2021-02-18 21:20:28,462 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 21:20:28,467 - evilportal - DEBUG - Calling handler for action status and passing {'module': 'evilportal', 'action': 'status'} (module.py:108) 2021-02-18 21:20:29,068 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 21:20:29,101 - evilportal - DEBUG - Sending response {"payload": {"running": false, "webserver": true, "start_on_boot": false}} (module.py:83) 2021-02-18 21:20:29,353 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 21:20:29,358 - evilportal - DEBUG - Calling handler for action list_portals and passing {'module': 'evilportal', 'action': 'list_portals'} (module.py:108) 2021-02-18 21:20:29,382 - evilportal - DEBUG - Creating portal folder (module.py:473) 2021-02-18 21:20:29,468 - evilportal - DEBUG - Listing directories (module.py:476) 2021-02-18 21:20:29,603 - evilportal - DEBUG - Building list (module.py:479) 2021-02-18 21:20:29,774 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 21:20:29,814 - evilportal - DEBUG - Sending response {"payload": [{"title": "twitter-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/twitter-login", "active": false}, {"title": "google-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/google-login", "active": false}, {"title": "facebook-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/facebook-login", "active": false}, {"title": "cliqq-payload", "portal_type": "basic", "size": 4096, "location": "/root/portals/cliqq-payload", "active": false}, {"title": "Cisco-Update", "portal_type": "targeted", "size": 4096, "location": "/root/portals/Cisco-Update", "active": false}, {"title": "Prueba", "portal_type": "basic", "size": 4096, "location": "/root/portals/Prueba", "active": false}, {"title": "o2-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/o2-login", "active": false}, {"title": "yahoo-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/yahoo-login", "active": false}, {"title": "Cisco", "portal_type": "basic", "size": 4096, "location": "/root/portals/Cisco", "active": false}, {"title": "starbucks-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/starbucks-login", "active": false}, {"title": "Netflix", "portal_type": "basic", "size": 4096, "location": "/root/portals/Netflix", "active": false}]} (module.py:83) 2021-02-18 21:20:30,002 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 21:20:30,007 - evilportal - DEBUG - Calling handler for action check_dependencies and passing {'module': 'evilportal', 'action': 'check_dependencies'} (module.py:108) 2021-02-18 21:20:31,575 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 21:20:31,592 - evilportal - DEBUG - Sending response {"payload": {"installed": true, "installing": false, "job_id": null}} (module.py:83) 2021-02-18 21:20:31,643 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 21:20:31,648 - evilportal - DEBUG - Calling handler for action load_file and passing {'module': 'evilportal', 'action': 'load_file', 'path': '/pineapple/ui/modules/evilportal/assets/permanentclients.txt'} (module.py:108) 2021-02-18 21:20:31,711 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 21:20:31,751 - evilportal - DEBUG - Sending response {"payload": "172.16.42.42\n172.16.42.178\n"} (module.py:83) 2021-02-18 21:21:01,403 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 21:21:01,425 - evilportal - DEBUG - Calling handler for action toggle_evilportal and passing {'module': 'evilportal', 'action': 'toggle_evilportal'} (module.py:108) 2021-02-18 21:21:01,543 - evilportal - DEBUG - Starting Evil Portal (module.py:337) 2021-02-18 21:21:02,674 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 21:21:02,681 - evilportal - DEBUG - Sending response {"payload": "Evil Portal started."} (module.py:83) 2021-02-18 21:21:02,705 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 21:21:02,732 - evilportal - DEBUG - Calling handler for action status and passing {'module': 'evilportal', 'action': 'status'} (module.py:108) 2021-02-18 21:21:05,678 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 21:21:05,685 - evilportal - DEBUG - Sending response {"payload": {"running": true, "webserver": true, "start_on_boot": false}} (module.py:83) 2021-02-18 21:21:05,798 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 21:21:05,829 - evilportal - DEBUG - Calling handler for action load_file and passing {'module': 'evilportal', 'action': 'load_file', 'path': '/tmp/EVILPORTAL_CLIENTS.txt'} (module.py:108) 2021-02-18 21:21:05,873 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 21:21:05,903 - evilportal - DEBUG - Sending response {"payload": "172.16.42.42\n\n172.16.42.178\n\n"} (module.py:83) 2021-02-18 21:21:28,896 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 21:21:28,910 - evilportal - DEBUG - Calling handler for action toggle_portal and passing {'module': 'evilportal', 'action': 'toggle_portal', 'portal': 'Netflix'} (module.py:108) 2021-02-18 21:21:28,953 - evilportal - WARNING - Portal API already exists under /www/captiveportal. This is probably not an issue. (module.py:84) 2021-02-18 21:21:29,041 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 21:21:29,073 - evilportal - DEBUG - Sending response {"payload": "Portal has been activated."} (module.py:83) 2021-02-18 21:21:29,261 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 21:21:29,281 - evilportal - DEBUG - Calling handler for action list_portals and passing {'module': 'evilportal', 'action': 'list_portals'} (module.py:108) 2021-02-18 21:21:29,303 - evilportal - DEBUG - Creating portal folder (module.py:473) 2021-02-18 21:21:29,359 - evilportal - DEBUG - Listing directories (module.py:476) 2021-02-18 21:21:29,459 - evilportal - DEBUG - Building list (module.py:479) 2021-02-18 21:21:29,569 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 21:21:29,599 - evilportal - DEBUG - Sending response {"payload": [{"title": "twitter-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/twitter-login", "active": false}, {"title": "google-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/google-login", "active": false}, {"title": "facebook-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/facebook-login", "active": false}, {"title": "cliqq-payload", "portal_type": "basic", "size": 4096, "location": "/root/portals/cliqq-payload", "active": false}, {"title": "Cisco-Update", "portal_type": "targeted", "size": 4096, "location": "/root/portals/Cisco-Update", "active": false}, {"title": "Prueba", "portal_type": "basic", "size": 4096, "location": "/root/portals/Prueba", "active": false}, {"title": "o2-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/o2-login", "active": false}, {"title": "yahoo-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/yahoo-login", "active": false}, {"title": "Cisco", "portal_type": "basic", "size": 4096, "location": "/root/portals/Cisco", "active": false}, {"title": "starbucks-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/starbucks-login", "active": false}, {"title": "Netflix", "portal_type": "basic", "size": 4096, "location": "/root/portals/Netflix", "active": false}]} (module.py:83) 2021-02-18 21:23:12,698 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 21:23:12,727 - evilportal - DEBUG - Calling handler for action check_dependencies and passing {'module': 'evilportal', 'action': 'check_dependencies'} (module.py:108) 2021-02-18 21:23:13,903 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 21:23:13,911 - evilportal - DEBUG - Sending response {"payload": {"installed": true, "installing": false, "job_id": null}} (module.py:83) 2021-02-18 21:23:14,013 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 21:23:14,042 - evilportal - DEBUG - Calling handler for action load_file and passing {'module': 'evilportal', 'action': 'load_file', 'path': '/tmp/EVILPORTAL_CLIENTS.txt'} (module.py:108) 2021-02-18 21:23:14,085 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 21:23:14,116 - evilportal - DEBUG - Sending response {"payload": "172.16.42.42\n\n172.16.42.178\n\n"} (module.py:83) 2021-02-18 21:23:14,397 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 21:23:14,412 - evilportal - DEBUG - Calling handler for action list_portals and passing {'module': 'evilportal', 'action': 'list_portals'} (module.py:108) 2021-02-18 21:23:14,423 - evilportal - DEBUG - Creating portal folder (module.py:473) 2021-02-18 21:23:14,482 - evilportal - DEBUG - Listing directories (module.py:476) 2021-02-18 21:23:14,590 - evilportal - DEBUG - Building list (module.py:479) 2021-02-18 21:23:14,735 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 21:23:14,763 - evilportal - DEBUG - Sending response {"payload": [{"title": "twitter-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/twitter-login", "active": false}, {"title": "google-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/google-login", "active": false}, {"title": "facebook-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/facebook-login", "active": false}, {"title": "cliqq-payload", "portal_type": "basic", "size": 4096, "location": "/root/portals/cliqq-payload", "active": false}, {"title": "Cisco-Update", "portal_type": "targeted", "size": 4096, "location": "/root/portals/Cisco-Update", "active": false}, {"title": "Prueba", "portal_type": "basic", "size": 4096, "location": "/root/portals/Prueba", "active": false}, {"title": "o2-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/o2-login", "active": false}, {"title": "yahoo-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/yahoo-login", "active": false}, {"title": "Cisco", "portal_type": "basic", "size": 4096, "location": "/root/portals/Cisco", "active": false}, {"title": "starbucks-login", "portal_type": "basic", "size": 4096, "location": "/root/portals/starbucks-login", "active": false}, {"title": "Netflix", "portal_type": "basic", "size": 4096, "location": "/root/portals/Netflix", "active": false}]} (module.py:83) 2021-02-18 21:23:14,903 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 21:23:14,908 - evilportal - DEBUG - Calling handler for action status and passing {'module': 'evilportal', 'action': 'status'} (module.py:108) 2021-02-18 21:23:15,327 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 21:23:15,335 - evilportal - DEBUG - Sending response {"payload": {"running": true, "webserver": true, "start_on_boot": false}} (module.py:83) 2021-02-18 21:23:15,397 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 21:23:15,430 - evilportal - DEBUG - Calling handler for action load_file and passing {'module': 'evilportal', 'action': 'load_file', 'path': '/pineapple/ui/modules/evilportal/assets/permanentclients.txt'} (module.py:108) 2021-02-18 21:23:15,478 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 21:23:15,510 - evilportal - DEBUG - Sending response {"payload": "172.16.42.42\n172.16.42.178\n"} (module.py:83) 2021-02-18 21:23:23,179 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 21:23:23,185 - evilportal - DEBUG - Calling handler for action toggle_evilportal and passing {'module': 'evilportal', 'action': 'toggle_evilportal'} (module.py:108) 2021-02-18 21:23:23,403 - evilportal - DEBUG - Stopping Evil Portal (module.py:332) 2021-02-18 21:23:24,281 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 21:23:24,287 - evilportal - DEBUG - Sending response {"payload": "Evil Portal stopped."} (module.py:83) 2021-02-18 21:23:24,315 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 21:23:24,337 - evilportal - DEBUG - Calling handler for action status and passing {'module': 'evilportal', 'action': 'status'} (module.py:108) 2021-02-18 21:23:24,616 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 21:23:24,622 - evilportal - DEBUG - Sending response {"payload": {"running": false, "webserver": false, "start_on_boot": false}} (module.py:83) 2021-02-18 21:23:24,685 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 21:23:24,706 - evilportal - DEBUG - Calling handler for action load_file and passing {'module': 'evilportal', 'action': 'load_file', 'path': '/tmp/EVILPORTAL_CLIENTS.txt'} (module.py:108) 2021-02-18 21:23:24,740 - evilportal - ERROR - Exception occurred while reading file: (module.py:462) 2021-02-18 21:23:24,778 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 21:23:24,808 - evilportal - DEBUG - Sending response {"error": ""} (module.py:83) 2021-02-18 21:23:39,085 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 21:23:39,103 - evilportal - DEBUG - Calling handler for action toggle_webserver and passing {'module': 'evilportal', 'action': 'toggle_webserver'} (module.py:108) 2021-02-18 21:23:39,919 - evilportal - DEBUG - NGINX START STDOUT: b'' (module.py:122) 2021-02-18 21:23:39,934 - evilportal - DEBUG - NGINX START SERROUT: b'' (module.py:123) 2021-02-18 21:23:40,380 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 21:23:40,387 - evilportal - DEBUG - Sending response {"payload": true} (module.py:83) 2021-02-18 21:23:40,415 - evilportal - DEBUG - Processing request. (module.py:211) 2021-02-18 21:23:40,443 - evilportal - DEBUG - Calling handler for action status and passing {'module': 'evilportal', 'action': 'status'} (module.py:108) 2021-02-18 21:23:40,851 - evilportal - DEBUG - Accepting on module socket (module.py:79) 2021-02-18 21:23:40,858 - evilportal - DEBUG - Sending response {"payload": {"running": false, "webserver": true, "start_on_boot": false}} (module.py:83) root@mk7:/tmp/modules# * Here without any active portal * Here after activating the web server * And here after activating the captive portal where it starts to fail and I have to change each link manually.
  6. I downloaded the portals from this github project https://github.com/kbeflo/evilportals and also from this https://github.com/JonnyBanana/Netflix_EVIL_PORTAL however the problem that my pineapple presents is with the symbolic links that are they create in the www directory, which are created wrong or not modified and end up causing the evil portal to fail and the false Access Point working.
  7. Good morning, I hope you can get help from the developers. A few days ago I tried to create my own fake captive portal for a client based on cisco, copy the facebook-login files from the evil portal folder and edit them to modify the visual part since I really like how that portal looks, after activating it I began to fail the evil portal module, searching in the forum and thanks to the user M4R3K I was able to solve it through the command <ln -sfn modifying the symbolic links in the www folder since they pointed to deleted routes> however despite to solve that problem exactly, others arose, among them that the portal is behaving strangely, for example if I activate the starbucks portal, the design of the twitter portal appears but without images, and another strange thing is that whenever the pineapple starts the web server is active even though I have not activated it manually. I already tried doing fimware reinstallation, deleting and reinstalling the module (evil portal) and also uninstalling the dependencies and reinstalling them and nothing works. Could someone please share the original files from the www folder and original pineapple/module/evilportal folder of pineapple mark VII without modifying with the evil portal or help me with any solution please?🙃
  8. I got the same error M4R3K, i delete the EP file who cause the problem, but for me i still having the same issue i have a mark 7 and il try to reinstall the firmware, reinstall dependencys and evil portal again and nothing, somebody can help me pls?
  9. I have a similar problem a few weeks ago I installed the evil portal portals and everything worked fine, but today I started the server to prepare a new portal for a client and although the server starts the captive portal does not get up and when I press activate in any portal The library is never activated, please, does anyone have a solution?
  10. Maybe you can add nirsoft modules like ChromePass and use the command who make you a txt with all the passwords he get.
×
×
  • Create New...