Jump to content

Search the Community

Showing results for tags 'Wifi'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

  1. Hi, This is a module that allows you to control your WiFi Pineapple over IRC. It uses a custom configuration file that you can edit in the Web Interface. The configuration file contains four sections, "Network", "Security", "Commands" and "Other". Firstly, "Network" contains the network information such as the server, port, nickname and channel to join. The new "Security" block contains the name of the Master and the trigger. "Commands" contains your commands in the format of "phrase: command to execute". Finally the "Other" block is for other options such as debugging. For more information on the config file format, see here. Heres some screenshots: Thanks! -Foxtrot
  2. Hi all, I'm using an Alfa AWUS036h with a 7dbi directional. I would have thought, through general reading-up, I would have gotten around 100-200 meters worth of distance with these. However, it's only picking up access points up to around 70m away, and I tried connecting to my WiFi from only 42m away and it fails to connect, even though it sees the access point. The line-of-sight is only broken by one exterior wall. TX power is currently out-of-the-box at 24 dBm. Most of the access points have worse-than-I-would-have-hoped-for signal strength, with most being worse than -60 PWR, even for access points that are less than 30m away! Any thoughts on how to improve this / why this happening? Thanks.
  3. Are there any available scripts, tool kits or modules for the Pineapple which would allow me to only passively capture probe frames from iOS9 and other wifi enabled smartphones via the temporary setup of soft APs? My requirement is to upload a list of wifi networks such as 'Starbucks' or 'Virgin123' to create soft APs for the iOS devices (and any other device) to connect to and respond with their real MAC address. Once the real MAC addresses have been captured, I need to drop the connection and not re-establish with the device for the duration of its time in range. The final output (csv/pcap) should contain both the uncovered real MAC addresses and the bunch of random addresses.
  4. Hi all, A relative is a farmer and has a Raspberry Pi set up in a field, that monitors various stuff. He would like to be able to connect to the RPi from the farmhouse, rather than travel down to the field just to get the data from it. The distance is around 1.5 miles from farmhouse to RPi, with a fairly clear line-of-sight (a few sparse trees and potentially the very edge of someone's house). What would be the best way to connect to it? I've considered using a 3G dongle on the RPi and using SSH over the net, or bridging the 2 with a Yagi on each end (pointed at each other). But which would be best, or something else? I have to consider power requirements as well, as at the moment the RPi doesn't take much (it's battery can last a good few days), but I don't want connecting extra equipment to it to make it last much less. *edit* I also found this; https://www.cooking-hacks.com/sx1272-lora-shield-for-raspberry-pi-868-mhz Any good? Also, I'm techie-minded, but haven't connected to an RPi using any of these methods before, so any links to tutorials or instructions on how one would go about this would be great. Thank you for your time.
  5. Hello, I need to implement WiFi 802.11 a/b/g/n/ac protocol with SDR at 470MHz. - Is it possible to implement WiFi at this frequency? - Is any existing implementations about it?
  6. Hi I am a newbe so sorry if this question has been answered before but I have searched but failed to find solution. I have the pineapple tetra configured on andriod one+ phone with usb tethering enabled. Under networking I set up an access point called test but when i try to connect to test with another device I get "unable to join the network test"
  7. Hi all, Its showing as android os mobiles like samsung,motorola,etc but the wifi access point ssid be like random letters with open access.I have connected those wifi but there's no internet connection.I am curious about the app and whats will be fun with it. any suggestions? Thanks
  8. I wonder if I can get into the pineapple nano nesesidad your settings without cable and without this connected to interneth , if possible as I do from android browser which is the ip a tutorial step by step to get it took 5 days and not on trying achieved thanks
  9. Hi everyone, I need to use the pineapple nano to generate a heat map with google earth (or google map) of the signal strenght. Here is what I have done until now: 1. install kismet, gpsd and share gps (android) 2. send the gps data to gpsd and bind kismet with gpsd to get the gps data I tried giskimsmet, to generate a .kml file to import in google earth and see the access point. This is working. Now the heatmap! I tried kisheat (https://github.com/roobixx/kisheat) , but it failed (the image generated are too small and doesn't represent the real spec). I know there is some paid software that can do that, but I want to use the pineapple to do that. Any idea? :)
  10. I Picked up an unused alfa 800mhz pen booster for something stupid like $4, but it didn't come with anything. Can any one give me the specs of the barrel DC to USB cord or a link to one? I'd hate to order one and end up being another cord to go in the junk cord milk crate.
  11. Hello! I have issue - I need to connect to wpa2 secured network automatically on nano boot, I would like to use bash script for this task, so I could extend script to some additional features. Could anyone give a hint to solve these tasks: 1 - which config file to edit (or better if can I use my own config file where I will put SSID, password and other necessary parameters) 2 - what command I need to run to connect to configured network) 3 - how to check if connection succeeded ( script need to check if IP was obtained via dhclient) Many thanks! (P.S. just in case if anyone is interested what I'm trying to do: I have a big password list for some particular wifi network and I need to find out which one is correct) King regards, imitm
  12. Maybe someone can share where to find the storage for WiFi Client Mode ssids and associated preshared keys *** no luck here grep -rnw '/' -e "psk" ...but found in plain text: /dev/mtdblock5:6947024:*mixed-psk▒1+tki)L▒.[PINEAPPLE ROOT WEB INTERFACE ACCESS PASS]' *** no luck here Found from the /etc/pineapple/ path then ran sqlite> .open ssid_list.db tried to select * from ssid_list; which yields nothing for me cause I haven't been been adding any to the filter lists I suppose. *** some success here Found from the /etc/config/wireless file held config wifi-iface option device 'radio1' option ifname 'wlan1' option mode 'sta' option key '[THE CURRENT KEY]' option network 'wwan' option ssid '[TO MY CURRENT GATEWAY SSID]' option encryption 'psk2+ccmp+tkip' BUT, I seem to remember these devices keeping the credentials for multiple gateway APs for WiFi Client Mode without having to retype them although the I believe you would need to be either out of range of a previously connected AP for it to connect automatically to the another previous AP that is in range....at worst you would need to restart the pineapple and it would remember the the other AP. My question is: Where does the pineapple store the rest of these ssid's and keys that are not in use? This way when I upgrade I don't have to revisit APs find/remember and fill out credentials every time but instead just copy and paste them to the correct file(s) over ssh or whatever.
  13. Hi there, I am fairly new to using the pineapple wifi Mark V and have been getting used to it over the past week but there is something I am having trouble with. I am trying to make my pineapple completely mobile, I have a portable battery with it, I can get it to connect wirelessly to my 3g network and can access the management console with my android that is also connected to the 3g network (I can also do the same with my laptop). The problem here is multi tasking is not possible when I have it set up this way, when I attempt to go into recon mode and scan for clients/APs, I lose the connection from my pineapple to the 3g network and thus losing my connection to the pineapples management window... I am assuming this is because there is a clash with recon mode trying to perform on the same interface as the one that is connected to the 3g network? I am also trying to find a way to log the information retrieved from devices mac addresses and what SSIDs they are probing for which can be found in the logs part of the PineAP module. Ideally I would like to have them sent to myself in an email, I have configured my email configuration in logs and reporting but it doesn't seem to work for me. Any help would be much appreciated. Thanks
  14. Hey all, Is this product any good for long-distance use of an open WiFi hotspot? https://www.ubnt.com/airmax/nanobeamm/ There are around 10 houses between me and the Open Wifi hotspot, however this thing states it can do 15km and the hotspot is only around 2-3km away. I could probably raise it high enough to see over the top of a few of the houses. Ta.
  15. Hi Folks, I just received my pineapple Tetra a few days ago but I have been feeling frustrated due to being unable to use it properly. I have watched a few videos made by Hak5 on YouTube to setup Tetra and it worked fine at the beginning. I was able to set it up on Kali Linux, created root account, accessed dashboard/control panel and I am receiving an IP which indicates that I have connection to Tetra device. However, I have an issue that when I connect to the "open" or the "protected" wifi that is broadcasting from Tetra using my windows machine, I can't browse internet at all. It only stays connected for a few mins then it loses connection to Tetra and it then switches to my home wifi. Although it shows that "1 Client connected". I have also tried this on Mac machine and it is doing the same thing. I don't have the "Deny" mode enabled though. I even switched it to enable and added the devices Mac Address but there was no luck. At this point when I lose connection to Tetra, I tried rebooting device, reconnect it using different USB port, reboot my kali linux but it will never come back online until I have to rest it. I have rest Tetra about 5 times in the past two days. Second thing is that when Tetra is showing online and no devices connected, I tried to search for the network on airmong on kali linux, but it doesn't show up there. I can see al networks around me even hidden ones but I can't see tetra listed. Lastly, I would like to know that Is there any sort of settings need to be done on my home network (Comcast modem) in order for Tetra to work properly ? I mean do I have to open/close ports? Do I also need to have Tetra connected to Ethernet cable or only Via USB to my Kali Linux machine ? please let me know if I am missing something or any extra recommendation that you would like me to check/do to get this going!! Thanks All in advance!!
  16. Hi all. I've got a WPA2 handshake to crack, I know the format is 8 upper case A-Z and 0-9. I was thinking of using an AWS GPU instance to pipe Crunch output into Pyrit GPU, as I don't have masses of storage space to save the output. Does this sound like a feasible option, or can you think of a better way? Cheers
  17. So yesterday it occured to me that I've never actually cracked a WEP network. I've heard that it's extremely easy, so I figured I'd give it a try. From what I was reading I seen you needed clients connected, and they needed to be active. I took an old router with DDWRT on it and dropped it to WEP encryption and added three clients and booted up a Kali live cd. Step one: I put my card into monitor mode. (It's the ALFA NEH from the Hak5 store) Step Two: I ran airodump to start capturing the packets. "Airodump-ng -c 1 -w WEP --essid Fallen wlan1mon" (And I also tried everything again using BSSIDs, but no difference.) Step Three: Wait for IVs. Step Four: Speed up the process. A.K.A. Where the problem starts. The first step was to run aireplay-ng -1 0, I believe this is some sort of fake authentication. I got the message "Sending authorization request" over and over. One had (ACK) beside it, the rest said (OPEN). Next I needed to run aireplay-ng -3, which was supposed to look for or create ARP packets I believe. Unfortunately, It was showing that it was reading tons of packets, but never found a single ARP request. Considering by this time I only had about 200 IVs, I figured I was doing something wrong. So I decided to use automated tools to see if it worked. My first try was my beloved Wifite. "wifite -c 1 -wep -e Fallen" It gets all the way to the actual attack. Here it tries about seven different types of attacks (Chop-Chop, Fake Authentication, Ect) All of them fail, and by the time it's done I have about 19 IVs. Just for the heck of it I also tried to use the Fern-wifi-cracker, which wasn't any different. Thinking maybe it was either y laptop or the card causing the issue, I tried the same steps on my NANO. I used wlan1, and then also tried the NEH again. Can anyone tell me what I'm doing wrong here? Thanks. If you need any more information just let me know.
  18. Hi, I'm considering buying a Mark V, however I wanted to get some idea of the setups people are using for distance. I assume the standard setup won't do more than 50 meters or so (obviously depending on open spaces, dense materials in the way, etc.) What kinds of aerials are you using, and what kinds of distances have you acheived? Thanks.
  19. I get the following error about date time when making new driver file found 1/2016 on website of alfa. Makefile:10: *** mixed implicit and normal rules: deprecated syntax CC [M] /root/Downloads/AWUS036NHV_v4.3.0.4_11485.20140519/core/rtw_debug.o /root/Downloads/AWUS036NHV_v4.3.0.4_11485.20140519/core/rtw_debug.c: In function ‘dump_drv_version’: /root/Downloads/AWUS036NHV_v4.3.0.4_11485.20140519/core/rtw_debug.c:66:64: error: macro "__DATE__" might prevent reproducible builds [-Werror=date-time] DBG_871X_SEL_NL(sel, "build time: %s %s\n", __DATE__, __TIME__); ^ /root/Downloads/AWUS036NHV_v4.3.0.4_11485.20140519/core/rtw_debug.c:66:1: error: macro "__TIME__" might prevent reproducible builds [-Werror=date-time] DBG_871X_SEL_NL(sel, "build time: %s %s\n", __DATE__, __TIME__); How can I correct this?
  20. Hi, I am kristoff, ham radio operator ON1ARF. One of the things I am interested in this: pi@hsmm23-2:~ $ iwconfig wlan0 IEEE 802.11bgn ESSID:"HSMM-MESH-ON1ARF" Mode:Ad-Hoc Frequency:2.357 GHz Cell: Not-Associated Tx-Power=30 dBm (...) ra0 Ralink STA ESSID:"" Nickname:"MT7610U_STA" Mode:Ad-Hoc Frequency=5.82 GHz Cell: 3A:7C:B3:6B:19:FC Bit Rate=65 Mb/s Modifying kernel-modules for wifi for ham-radio mesh-network applications (HSMM-mesh). Sofar, I managed to extend the range of the certain wifi devices to the complete ham-radio bands (2.3-2.45 Ghz and 5.65-5.85 Ghz), but I like to go further then this: - changing the frame-formats to make then incompatible with normal wifi (especially on 2.4-2.45, 5.65-5.71 and 5.735-5.835, which overlap with normal wifi) - longrange wifi: e.g. the 10 MHz or 5 Mhz bandwidth version of 802.11a-2007 (certain atheros chipsets should be able to do this ?) - reducing the kernel-drivers to ham-radio use only (remove 802.11n and ac, remove encryption, only ad-hoc mode). Does anybody have any practicle experience with this? My current platform is on RPi (by cross-compiling the kernel on ubuntu LTS). This is intended for licensed ham-radio operators that have permission to operate on the 13 cm and 6 cm ham-bands. Cheerio! Kr. Bonne.
  21. Good day all. I am in need of some help to prove to my service provider that the internet they are proving me sucks, its slow, and to many people are connected to the network. I recently moved into a student building where they only provide me with an Wifi internet. I;ve connected to it and I can see about 3 smart TVs, 8 printers, and 1 apple TV. No one in this building has a wired connection, and everyone has friends who come over and share the password with them. Im no IT professional, but i want to test and prove to the people that give me this shitty wireless service that they suck and they are charging me too much. everyone in this building (22 students) have thier own contained studios.. Where do I start by testing my own network?
  22. I plan on using a Raspberry Pi 2 running Raspian. I want to wardrive wifi and bluetooth at the same time also while using gpsd of course for a rough location on one Raspberry Pi. I will be using an Alfa w/ external antenna and an Ubertooth w/ external antenna. Now for some questions... 1. Will I need to run (2) instances of Kismet, or can it be done is (1) instance, keeping in mind the Ubertooth needs to run a plug-in? 2. If I need to run (2) instances of Kismet, will I need to use (2) separate config files, and/or two installations of Kismet in differing locations? 3. I'm assuming gpsd can feed GPS coordinates to both the wifi and bluetooth scanning? 4. Offer any insight to some problems you think I might run into, or recommandations on the best way to accomplish this, or even perhaps a better way? Any feedback would be much appreciated..Thanks
  23. SSL stripping no longer works. I've been researching but gotten little results as to tutorials for other types of infusions. I want to get an infusion that can either get me wifi passwords or passwords to someone's accounts as they log into them. If possible, I would like some er infusions to start with downloading. I tried the wps infusion and it didn't work well with my router (which is why I want to use RubyReaver or Auto-Reaver). So, what other infusions could be used to monitor my other computer's web activities and the passwords that I get when I log in with my other computer (that I'm using as a target)? If possible, it would be nice if it was something I could use information I get from the PineAP log and input into such an infusion to get my passwords. I learned from this video about how to use the pineAP: https://www.youtube.com/watch?v=IdhuX4BEK6s&index=2&list=PLuXfzxj2yX_uCE8dPbP39rQIB0a8PkFHT So yeah, I don't want to buy too many new devices. I want to rely on my pineapple, but if possible I might want the documentation or something similar to learn to use such infusions. I might plug a wireless modem into my pineapple someday and go wardriving, but I want to learn to hack my own wifi first to learn before I go wardriving.
  24. Hi, I've been wetting my feet in penetration testing. I've been ramping up on metasploit and aircrack, etc. Now I know that detection evasion is a big topic when it comes to pentesting computers, and servers, etc, but I'm curious about guidelines and evasion techniques for wifi hacking. I've used systems like wifite and aircrack, but how susceptible are these types of attacks to detection, and are there any guidelines to avoid detection? Thank you
  25. Interesting, if a little short, article on HackerNews today; http://thehackernews.com/2016/01/long-range-wifi-network.html Technically, this could make WiFi pentesting a teenie bit easier. Could certainly pick up/send a signal from futher away, with less equipment, based on the longer waves. Thoughts?
×
×
  • Create New...