Jump to content

Zaagr

Active Members
  • Posts

    10
  • Joined

  • Last visited

Everything posted by Zaagr

  1. 2 days of using. No crashes. It's really important to add one fundamental thing - while using any attack or rogue scan device must ignore his own interfaces and internet-wifi connection. Get his own MACs in the initial state of any attack, or maybe additional "ignore" list. And the second thing is sorting of SSIDs in Recon menu. I need to sort them depending of signal strength, but it resets immediately to alphabetical order. One more thing - there are no more setting to disable/enable management wifi and to hide both management and open wifi AP. By the way - disabling of open AP is also useful. Sometimes wanna stay under radar.
  2. 2 days of using. No crashes. It's really important to add one fundamental thing - while using any attack or rogue scan device must ignore his own interfaces and internet-wifi connection. Get his own MACs in the initial state of any attack, or maybe additional "ignore" list. And the second thing is sorting of SSIDs in Recon menu. I need to sort them depending of signal strength, but it resets immediately to alphabetical order.
  3. Thank you, Mark. I know that you are right in your way. As i said - this is just about my expectations. I was buying a product. Neither just a hardware, nor a DIY kit. Finished product. Like a Skyrim from pentesting - huge list of mods, but also awesome as itself. At least something equal to previous version. Tetra is an epic THING, and also an awesome product. Just give me the same tools built-in at MK7, and i'll be happy. By the way you can store all sources for modules on a little memory card. So it will be unnecessary to use internet connection for work. One more suggestion - how about changing MAC addresses right in a GUI? Three modes - built-in, random and programmed. Sunshine for everyone.
  4. I've spent about an hour in a metro with PineAP in active mode, and internet input. It was about 5-13 different clients connected at any moment. some of them for 20 minutes. I've collected huge list of SSIDs and MACs. 40 minutes of watching on the HTTPeek. "sniffer enabled. listening active". And there is nothing in HTTPeek. No URLs, no images, no cookies. What is my mistake?
  5. Do you see the difference between "Hey, you can use my collection of stuff, i've united in this toolpack. Just check if firmware is compatible. I'm not responsible for any damage" and "We are Hak5. And this is our best product for all types of Wi-Fi pentesting. All tools are accessible with one click in a menu" ? Internet is full of thing of the first type. We'd like to see the second one. The one and only 😍
  6. I've got some tools like python scripts and popular Kali-software. All this stuff is supported and well known. Like https://github.com/drygdryg/OneShot I've spend many time trying to automate all of this, and i have a result. Not perfect, but good enough. I don't think that I'm pro - so I'd like to get similar tools made by the true experts - hak5 team. And I'm agree to pay $$$ for that sweet candy. And your answer is - "repeat your way again to help us. We are not going to do that for you, dude."
  7. Hi. I can't agree with you. If you are making your product just for expert-surrounding of Silicon Valley - maybe you're right. However, your stuff is working all around the world. There are so many places where WPA2 is not in use. Open wifi networks without separating clients, weak passwords, unexperienced PC users. Even smartphone is a part of luxury. So Karma, SSLStrip, Pixiedust, Evilportal, bruteforce, non-professional phishing - everything is still useful. Think like your clients, not like your friends. Give us more modules, pls. 🙂
  8. I've recieved my MK7 yesterday. Spend about 12 hours with it. I was waiting for that stuff for about couple of years. I've paid 100$ for item and 100$ more for delivery. I love that thing from the dark interface to thick usb cable and pineapple stickers. However.. my item seems very unstable for me. On 1.0.2 firmware actually. 1.0.1 wasn't fluctuating. Probably the reason is - i just don't understand what it's doing right now. Initial setup. "push button once, to disable wifi..." You know that sometimes it goes to "disabled" mode even with button holded more that 5 seconds? Maybe you need to just type "for initial setup connect it with usb. open web-interface on http://xx.xx.xx.xx:1471. Done." Ok, after the second firmware updateI I'vemade a mistake in root password configuration. Can't get in. And I can't just reset it with one button like other routers - I need to turn it in maintenance mode, connect with usb, config new ethernet adapter, download default image from hak5.org, upload it to the device and waaait. ORLY? Everyone are using just one button way. Just hold main button for 10-30 seconds for reset. Ok you want to make it safer - button must be pushed with a paperclip. That's enough. I see that this is my high expectations - I was waiting something like iPhone for wardriving. Ready for fun just from the box. For scriptkiddies. Something that will make my job easier. BlHowever it's very complex stuff. Almost complex as my RaspberryPi with Kali onboard and 2xAlfa adapters. And sadly less stable. How about Pixiedust attack module? Or colorful one-button Karma with SSLstrip? Handshakes? You know that there are some troubles with it. Sorry, this is just about my expectations. I love that stuff, i'll be waiting for new modules and stable firmwares. But now i'll continue working with my Franken-Raspberry-Kali-stein. And hold my MK7 under my pillow. So nobody can steal my treasure. 🙂
  9. You trying to use latest update on a new device. Try lower version. With the same error on 1.0.2 and 1.0.1 - 1.0.0 worked well for me. And the i've updated it.
×
×
  • Create New...