Jump to content

Search the Community

Showing results for tags 'Wifi'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

  1. Hello! This firmware marks a massive release for the WiFi Pineapple Mark VII, with a huge set of feature additions, bug fixes and improvements to many aspects of the project and it's user experience. From reliability fixes in PineAP and Recon to the addition of the Package browser and a WPA/2 Evil AP or out of the box support for supported 802.11ac adapters, there is sure to be something in this version for you. As always, you can grab the update OTA by giving your WiFi Pineapple an internet connection and navigating to Settings -> Software Update in the Web UI. A huge thank you to the beta testers for this release who provided great feedback and bug reports, you are invaluable and much appreciated! To further join the discussion, feel free to join the Discord chat. You can catch the full changelog below, and highlights of the new firmware in the second reply to this topic. Changelog 1.1.1: General Update the Pineapple Python library. Setup Fix a UX issue where the Filter description doesn't show until a mode is selected. Recon Fix an issue where some partial handshake captures would not have enough data to be crackable. Settings Remove the Nightly Update channel. Changelog 1.1.0: General Add a setup walkthrough dialog when attaching an AC-capable USB radio to the WiFi Pineapple. Improve the displaying of dates from the future in some UI pages. Move warnings into an "Informational Messages" dialog. This new dialog adds more information about system messages, and provides convenient links directly to the relevant setting. Removed bluelog and other bluetooth related tools from firmware. Note: You can now install these packages and more with ease using the Package Manager. Swap PineAP and Recon location in sidebar. Enable SSH earlier in Setup process. Removed polling for Reset button. Add password reset functionality. Notifications Notifications are now previewed in the title bar. Notifications can now be reported as "success", with a green color. Changed to a better download icon. Decrease clutter in title bar for mobile displays. Fix an issue where some kernel modules would cause the device to reboot. Setup Add Sweden to WiFi Country Code list. Fix typo in Client Filters page. Added GIFs to indicate how to proceed with verification. Added the ability to fine-tune filters during setup. Generally improved layout of various setup elements. Dashboard Improved connection error message for "Get News". Campaigns Fix an issue where some reports will use the first Recon scan, instead of the latest. Fix an issue where reports would not be removable. PineAP Fix a crash. Fix an issue where extended Recon scans would lead to a memory leak. Add Sweden to WiFi Country Code list. Fix a hang introduced in the beta which would cause Recon and Filters to show an incorrect status. Change "WPA & Open" tab to "Access Points". Change "Authenticated AP" card title to "Evil WPA AP". Add "View Handshakes" button to Evil WPA AP card. Evil WPA AP handshakes now only send one notification per client. Fix an issue where empty SSIDs would be added to the SSID Pool. Add a new tab for Management and Open APs. Fix an issue where the "Handshakes Captured" counter wouldn't be accurate. Add Evil Twin WPA Access Point. Recon Add a dialog to clarify what a handshake capture does, when clicking "Start Handshake Capture". Fix an issue where handshakes in custom locations couldn't be downloaded. Scan settings are now loaded from the current scan across devices. Added the ability to specify save location for Recon scans. Added the ability to specify save location for Handshakes. Fix an issue introduced in Beta 1 where handshakes could not be deleted. Fixed an issue where the table would become unsorted during a scan. Added graphs for wireless landscape and channel distribution. Moved Settings into a new card, with search functionality. Added the ability to select which radio is used for Recon scanning. Supported devices are listed at docs.hak5.org Add dual-band scanning support for supported adapters. Add the ability to download handshakes in hashcat format. Improved the user experience for cloning access points. Cloning options can now be fine tuned from inside Recon. Add the ability to clone WPA/2 access points. Fixed an issue where BSSIDs would not be highlightable in some browsers. Fixed an issue where a handshake capture button might show for open APs. Massively improved scanning performance by rewriting result de-duplication logic. Massively improved WPA/2 Handshake capture performance. Changed how partial and full handshakes are written to disk. Fixed a rare crash when scanning in client-heavy landscapes. Handshake MAC addresses are now censored when censorship mode is enabled. Handshake MAC addresses now use colon seperators. Logging Improve default colours for log entries in dark theme. Improve column width for the System Log. Improve parsing of System Log. Added the ability to specify PineAP log save location. Added pagination and search functionality to the PineAP Log. Create a new system module for logging. Add ability to download and search the device system log. Modules Add hot-link support for Available Modules, Package Manager, and Develop tabs. Move search box into table footer. Add a new tab for package management. Add the ability to search and download a wide variety of packages. Improve user experience when the device is offline. Settings General Improve user experience when the device is offline. Added a scrollbar for longer changelogs such as this one. Networking Add a placeholder for when the Pineapple hasn't receieved a Client Mode IP address yet. Add signal strength to discovered Client Mode networks. Rewrote Client Mode handling to improve reliability of connection. Improved reliability of automatic route setting when handling USB Ethernet, ICS, or Client Mode connections. Disconnect button is now disabled after being clicked once. Thanks, foxtrot
  2. Hi Has anyone had any experience with using, the Raspberry Pi zero W to stream SDR via WiFi to a SDR receiver app on a phone? what advice can you give? What was the performance like?
  3. Hello, I need some clarification to understand what I am doing. After plugging my RT5390 WiFi adapter (sold by Hak5 with my WiFi Pineapple NANO, but not used until yet…), I can verify if the adapter is recognised by the Pineapple… root@Pineapple:~# dmesg | tail -n 5 [ 865.323205] usb 1-1.3: new high-speed USB device number 5 using ehci-platform [ 865.613332] usb 1-1.3: reset high-speed USB device number 5 using ehci-platform [ 865.783339] ieee80211 phy2: rt2x00_set_rt: Info - RT chipset 5390, rev 0502 detected [ 865.869931] ieee80211 phy2: rt2x00_set_rf: Info - RF chipset 5370 detected [ 865.902917] ieee80211 phy2: Selected rate control algorithm 'minstrel_ht' root@Pineapple:~# lsmod | grep rt2x00 cfg80211 232618 11 rtlwifi,rtl8187,rt2x00lib,mt76x02_usb,mt76x02_lib,mt76,ath9k_htc,ath9k,ath9k_common,ath,mac80211 mac80211 465192 14 rtl8192cu,rtl_usb,rtlwifi,rtl8187,rt2800lib,rt2x00usb,rt2x00lib,mt76x2u,mt76x02_usb,mt76x02_lib,mt76_usb,mt76,ath9k_htc,ath9k rt2x00lib 36563 3 rt2800usb,rt2800lib,rt2x00usb rt2x00usb 8473 1 rt2800usb usbcore 134398 35 smsc95xx,sierra_net,rndis_host,qmi_wwan,cdc_ether,ax88179_178a,asix,usbnet,ums_usbat,ums_sddr55,ums_sddr09,ums_karma,ums_jumpshot,ums_isd200,ums_freecom,ums_datafab,ums_cypress,ums_alauda,cdc_wdm,cdc_acm,rtl8192cu,rtl_usb,rtl8187,rt2800usb,rt2x00usb,mt76x2u,mt76x02_usb,mt76_usb,ath9k_htc,usb_storage,uhci_hcd,ohci_platform,ohci_hcd,ehci_platform,ehci_hcd root@Pineapple:~# root@Pineapple:~# lsusb Bus 001 Device 004: ID 05e3:0745 Genesys Logic, Inc. Logilink CR0012 Bus 001 Device 003: ID 0cf3:9271 Qualcomm Atheros Communications AR9271 802.11n Bus 001 Device 005: ID 148f:5370 Ralink Technology, Corp. RT5370 Wireless Adapter Bus 001 Device 002: ID 058f:6254 Alcor Micro Corp. USB Hub Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub root@Pineapple:~# I think that everything is ok… The WiFi adapter look like recognized and ready to use. Nothing has changed in the the web admin interface of the WiFi Pineapple NANO, which is normal since the adapter is not yet configured in /etc/config/wireless (https://docs.hak5.org/hc/en-us/articles/360010471494-WiFi-Client-Mode). I found a config mini how-to at the URL: http://h-wrt.com/en/mini-how-to/wifi_openwrt I think that I need to append the following lines in the existing /etc/config/wireless file. config wifi-device 'radio2' option type 'mac80211' option channel 'auto' option hwmode '11n' option path 'platform/ehci-platform/< must be completed > option disabled '0' config wifi-iface option device 'radio2' option network 'wwan' option mode 'sta' Do you agree with this first step? How can I found the path to use for the radio device configuration ? Will 'radio2' be automatically linked to 'wlan2'? In the OpenWRT doc I read, the credentials to the access point connection (SSID & key) are stored in the /etc/config/wireless file: config wifi-iface option device 'radio2' option network 'wwan' option mode 'sta' option ssid 'testwifi' option encryption 'psk2' option key '1234567890' Does that mean, that I can configure only one access point? Can I use a wpa-supplicant configuration for one network at home, one at work and so on, like on a Linux laptop? But I did not find a file like wpa_supplicant.conf in the WiFi Pineapple NANO system files… Thank you in advance for your explanations. Regards, Éd.
  4. Hello all! This monumental 1.1.0 Beta release gives you some amazing new features for your WiFi Pineapple that would not have been possible had it not been for the great feedback and feature requests from our community. Thank you. We hope you enjoy these new features and as always invite you to join us on Discord and the forums. Changes since Beta 1 and Beta 2 begin with NEW. Beta 3 Change Log: General NEW: Move warnings into an "Informational Messages" dialog. This new dialog adds more information about system messages, and provides convenient links directly to the relevant setting. Removed bluelog and other bluetooth related tools from firmware. Note: You can now install these packages and more with ease using the Package Manager. Swap PineAP and Recon location in sidebar. Enable SSH earlier in Setup process. Removed polling for Reset button. Add password reset functionality. Notifications Notifications are now previewed in the title bar. Notifications can now be reported as "success", with a green color. Changed to a better download icon. Decrease clutter in title bar for mobile displays. Fix an issue where some kernel modules would cause the device to reboot. Setup NEW: Add Sweden to WiFi Country Code list. NEW: Fix typo in Client Filters page. Added GIFs to indicate how to proceed with verification. Added the ability to fine-tune filters during setup. Generally improved layout of various setup elements. Dashboard Improved connection error message for "Get News". Campaigns Fix an issue where some reports will use the first Recon scan, instead of the latest. Fix an issue where reports would not be removable. PineAP NEW: Fix an issue where extended Recon scans would lead to a memory leak. NEW: Add Sweden to WiFi Country Code list. NEW: Fix a crash. NEW: Fix a hang introduced in the beta which would cause Recon and Filters to show an incorrect status. Change "WPA & Open" tab to "Access Points". Change "Authenticated AP" card title to "Evil WPA AP". Add "View Handshakes" button to Evil WPA AP card. Evil WPA AP handshakes now only send one notification per client. Fix an issue where empty SSIDs would be added to the SSID Pool. Add a new tab for Management and Open APs. Fix an issue where the "Handshakes Captured" counter wouldn't be accurate. Add Evil Twin WPA Access Point. Recon NEW: Fix an issue where handshakes in custom locations couldn't be downloaded. NEW: Scan settings are now loaded from the current scan across devices. Added the ability to specify save location for Recon scans. Added the ability to specify save location for Handshakes. Fix an issue introduced in Beta 1 where handshakes could not be deleted. Fixed an issue where the table would become unsorted during a scan. Added graphs for wireless landscape and channel distribution. Moved Settings into a new card, with search functionality. Added the ability to select which radio is used for Recon scanning. Supported devices are listed at docs.hak5.org Add dual-band scanning support for supported adapters. Add the ability to download handshakes in hashcat format. Improved the user experience for cloning access points. Cloning options can now be fine tuned from inside Recon. Add the ability to clone WPA/2 access points. Fixed an issue where BSSIDs would not be highlightable in some browsers. Fixed an issue where a handshake capture button might show for open APs. Massively improved scanning performance by rewriting result de-duplication logic. Massively improved WPA/2 Handshake capture performance. Changed how partial and full handshakes are written to disk. Fixed a rare crash when scanning in client-heavy landscapes. Handshake MAC addresses are now censored when censorship mode is enabled. Handshake MAC addresses now use colon seperators. Logging NEW: Improve column width for the System Log. NEW: Improve parsing of System Log. Added the ability to specify PineAP log save location. Added pagination and search functionality to the PineAP Log. Create a new system module for logging. Add ability to download and search the device system log. Modules NEW: Add hot-link support for Available Modules, Package Manager, and Develop tabs. Move search box into table footer. Add a new tab for package management. Add the ability to search and download a wide variety of packages. Improve user experience when the device is offline. Settings General Improve user experience when the device is offline. Added a scrollbar for longer changelogs such as this one. Networking Rewrote Client Mode handling to improve reliability of connection. Improved reliability of automatic route setting when handling USB Ethernet, ICS, or Client Mode connections. Disconnect button is now disabled after being clicked once. You can catch the beta release OTA, by following the instructions outlined in the Hak5 Docs article for Beta/Nightly updates. Thanks again for the continued feedback. - Foxtrot
  5. Hi! We've just pushed Beta 1 for 1.0.2 to the WiFi Pineapple BETA Channel. This update features some small bug fixes and UX improvements since 1.0.1. If you'd like to try the upcoming release, updating is easily done by following the above guide. Change Log: Recon Fixed an issue where the dBi column would not sort. Show a message if all table columns are disabled. Fixed an issue where results would not update when navigating back to a running scan. Campaigns Added the functionality to delete campaign reports. Misc Fix an issue with ICS routing introduced in 1.0.1. Cloud C2 Improvements to Cloud C2 functionality. Add the ability to manage Client Mode whilst in C2 Mode. Upcoming Changes: Improved support for WPA3 and WPA2/3 Mixed Client Mode Have a suggestion? Let us know! We're constantly looking for feedback, especially during the public beta programs. If you're interested in joining the discussion, be sure to check out the community page and say hello! Thanks, Foxtrot
  6. Hello! We're happy to announce the release of 1.0.1 for the WiFi Pineapple Mark VII. Based on your invaluable feedback (especially the Beta channel testers, thank you!) - numerous improvements to PineAP, Recon, Settings and more have been made. Be sure to check out the changes below and grab the new release by giving your WiFi Pineapple Mark VII an internet connection and going to "Settings > Check for Updates". Changelog: Setup Improve screen real-estate on smaller mobile screens. Button delay now says 4 seconds, to match the recovery wizard. PineAP Dramatically reduce the CPU percentage used by PineAP during idle and during scans. Logging options can now be persistently stored in the browser. Tweak the appearance of the logging options side bar. A spinner now shows when PineAP is saving the users configuration. Fixed an issue where the PineAP Source MAC option was not saving. Fixed an issue where the PineAP Autostart functionality would not work correctly. Fixed an issue where the PineAP Autostart toggle would not report a correct status. Fixed a rare issue where PineAP would not start after being disabled. Improved the settings save time. Recon Recon Table Columns can now be toggled to show or hide. Added an OUI column to the Recon Table. Scan duration choice is now remembered when you navigate away from Recon. Fixed an issue introduced in Beta 2, where Recon would sometimes show an error if PineAP was not running. Result cards are now clickable, instead of using a button to open the bigger view. Result cards for Clients now render the timestamp in human-readable format. Modules Fixed an issue introduced in Beta 3 where modules would not start due to a missing SSL dependency. Modules can now use PNG icons as well as SVGs. Settings Add censorship mode. Keyboard shortcuts can now be enabled or disabled from the Advanced Settings tab. Software Update will now accurately display when the selected update channel is closed. Small text changes to Software Update. Fixed an issue where Client Mode may not report an error correctly. Improve reliability of Client Mode. Client Mode settings are now saved automatically, and will re-connect on boot automatically. Add an option to reinstall the current firmware if no update is found. Greatly improve Network page for smaller mobile screens. Greatly improve Settings page for smaller mobile screens. Cloud C2 Improved the reliability of Recon scans. Misc Fix an issue where the Web Terminal would not connect when connected to the WiFi Pineapple via WAN. Updated the Python library for WiFi Pineapple Mark 7 modules. Fixed a rare issue where the internet connectivity check would fail despite having internet. Add support for USB Ethernet adapters using the ASIX AX88179 chipset. Add support for USB Ethernet adapters using the Realtek RTL8152 chipset. As always, feedback is greatly appreciated, and you're encouraged to join the community to discuss!
  7. Hi. I'm trying to devise a means to quite literally find a phone - perhaps in a field etc. I can see with various tools some makes of phones and even detect how far away they are by seeing the signal strength. However, some phones appear to be silent or perhaps are using random MACs? In my use case I wont know the MAC address of the phone so all I need is to know there is one and how far away it is. I appreciate the range is limited, but thats fine. I've seen old and newish Samsung phones get detected while out of range from their APs. Equally, I've seen Huawei not. What happens for the ones that cant be detected away from their home AP is that as they come in range, I suddenly see them. This is with the likes of airodump-ng, kismet, and from gitgub trackerjacker. On the Tetra, I cant see this 2nd class of phone with Recon, signal strength or site survey modules. I'd tried to use the Tetra with the likes of airodump-ng in parallel to get get the Tetra to respond to probe requests. My assumption if the phone isn't using random MACs is that it is in fact silent until the AP reaches out 1st. Does anybody have any thoughts or way of detecting such devices. My remaining idea is to simply try to detect any 2.4G signals emanating from the phones. Thanks.
  8. Hello, I have a problem with my nano when I log in to a connection with my iPhone my nano becomes a client and has no internet access... a solution? thank un
  9. What can be other use of Pineapple in daily life (w/ Pineapple firmware!), not just for pen testing. My initial setup also has Alfa awus036nha. Can it be used as Wifi signal booster; connects to wifi with awus036nha and you can connect to internet through AP121U LAN; other (name them). I presume, if you don't have stock firmware, which came with AP121U then you are stuck with Pineapple for life?
  10. Do we neeed external wireless wifi adapter for performing deauthentication attack?
  11. Hey guys I am pretty new here in this forums guys my problem is that I using aircrack-ng method to get handhake but I am not getting it . I am doing everything correct with no error but time goes by . not getting any handshakes and I am sending infinty deauth packets to the victims but then also i did not get handshake and a client is there and by the way if I try the attack on my own network I get the handshakes in minutes. Please help me
  12. Eric69

    Mac

    Anyone have experience hooking up a wifi pineapple to a macbook pro, can it be done, and how so?
  13. Hi Guys, I seem to be having a bit of difficulty getting the screen crab to connect to WiFi. I have my C2 server on my local network and am attempting to connect to my local wireless AP. Here's what I've done to troubleshoot so far. I've looked through the debug output, and as far as I can tell, it confirms a lack of connection to C2. Util: exec [stop adbd]|Util: stop adbd shell exited value: 0|Util: exec [stop logd]|Util: stop logd shell exited value: 0|Util: exec [source system/bin/crab && upgrade_check_on_boot]|Util: Service start shell exited value: 0|Util: exec [source /system/bin/crab && do_gpio_setup && leds_off]|Util: RunThread shell exited value: 0|Util: exec [source /system/bin/crab && upgrade_framework 1.0.6]|Mirror: NEW HDMI Status; Input: true|Mirror: HDMI INSERTED|Util: crabframeworkupgrade shell exited value: 0|CrabFramework: Crab framework up to date|Util: exec [source /system/bin/crab && red]|ShellThread: setCPU Shell Thread Starting|Util: exec [source /system/bin/crab, source /system/bin/crab && sleep 120 && do_cpu_setup]|Mirror: camera opened 1920 x 1080|Util: Main setLEDsNow() shell exited value: 0|Util: exec [source /system/bin/crab && wait_for_sd_location]|Mirror: SETTING UP PREVIEW|Util: waitforSD shell exited value: 0| Util: exec [source /system/bin/crab && led_off]|Util: Main setLEDsNow() shell exited value: 0|DeviceConfig: C2 Device.config PARSE COMPLETE|RunThread: C2 ENABLED|RunThread: CREATING C2 THREAD|RunThread: Loading Crab Config from SD|Util: exec [source /system/bin/crab && locate_sd && touch /storage/AC93-4313/version.txt && echo 1.0.6 > /storage/AC93-4313/version.txt]|Util: versionfile shell exited value: 0|CrabConfig: CONFIG OPTION WIFI_SSID|CrabConfig: CONFIG ARG SkinnyRD|CrabConfig: CONFIG OPTION WIFI_PASS|CrabConfig: CONFIG ARG |CrabConfig: CONFIG OPTION DEBUG_LOG|CrabConfig: CONFIG ARG ON|CrabConfig: DEBUG LOG CONFIG OPTION SET TO: ON| CrabConfig: WIFI CONFIGURED|Util: exec [source /system/bin/crab && diff_config_enable_wifi SkinnyRD ]|Util: psk wifi config shell exited value: 0|CrabConfig: WiFi configured successfully|SDREADER: NO FILE AT PATH|SDWatch: SD Watch Thread Starting|Util: exec [source /system/bin/crab, watch_sd_location]|ButtonListener: Button Listener Thread Starting|Util: exec [source /system/bin/crab, wait_for_button_press]| RunThread: STARTING C2 THREAD|LEDRunner: LED Runner Thread Starting|Util: exec [source /system/bin/crab, led_off]|C2Run: C2 Thread started|C2Run: C2 notification added to device queue: Capture Starting|Util: LEDRunner shell exited value: 0|C2Run: C2 Update crab config called|C2Device: C2 FLAG SEND UPDATED STATE|C2Run: C2 Waiting for capture thread to start|RunThread: STARTING NEW CAPTURE THREAD|CaptureThread: CAPTURE THREAD START|CaptureThread: Signal Check request sent|Mirror: REQUEST RECEIVED|Mirror: INTENT SIGNAL CHECK check|Mirror: Response sent:SIGNAL|CaptureThread: Response:SIGNAL|CaptureThread: CRAB HAS VIDEO SIGNAL|C2Run: C2 Update crab config called|CaptureThread: STARTING IMAGE CAPTURE|Util: exec [source /system/bin/crab && get_current_temp]|Util: tempcheckexit value: 0| Util: tempcheckshell output : 65228|CaptureThread: CURRENT TEMP: 65228|CaptureThread: 21908 captures avail|Util: exec [source /system/bin/crab && get_next_capture]|Util: GetNextCapexit value: 0|Util: GetNextCapshell output : /storage/AC93-4313/LOOT/2|CaptureThread: Capture Request Sent/storage/AC93-4313/LOOT/2.jpg|Mirror: REQUEST RECEIVED|Mirror: WAITING FOR CAPTURE TO COMPLETE|Util: exec [source /system/bin/crab, blue]|Util: LEDRunner shell exited value: 0| Mirror: WRITING CAPTURE TO SD|Mirror: CAPTURE COMPLETE597ms|Mirror: Response sent:/storage/AC93-4313/LOOT/2.jpg|CaptureThread: Response:/storage/AC93-4313/LOOT/2.jpg|Util: exec [source /system/bin/crab && has_signal_log]|Util: NoSignalLog shell exited value: 0|CaptureThread: capture interval 5000ms|CaptureThread: Time spent capturing 749ms|CaptureThread: Capture sleep 4251ms|CaptureThread: 21907 captures avail|Util: exec [source /system/bin/crab && get_next_capture]|Util: GetNextCapexit value: 0|Util: GetNextCapshell output : /storage/AC93-4313/LOOT/3| CaptureThread: Capture Request Sent/storage/AC93-4313/LOOT/3.jpg|Mirror: REQUEST RECEIVED|Mirror: WAITING FOR CAPTURE TO COMPLETE|Mirror: WRITING CAPTURE TO SD|Mirror: CAPTURE COMPLETE599ms|Mirror: Response sent:/storage/AC93-4313/LOOT/3.jpg|CaptureThread: Response:/storage/AC93-4313/LOOT/3.jpg| Util: exec [source /system/bin/crab && has_signal_log]|Util: NoSignalLog shell exited value: 0|CaptureThread: capture interval 5000ms|CaptureThread: Time spent capturing 749ms|CaptureThread: Capture sleep 4251ms|C2Run: C2 Thread starting|C2Device: C2 STARTUP SYNC|Util: exec [cat /proc/uptime | busybox awk {print ;} 2>/dev/null]|Util: C2DeviceUpdateexit value: 0|Util: C2DeviceUpdateshell output : 44.07|Util: exec [cat /sys/class/net/wlan0/statistics/rx_bytes]|Util: C2DeviceUpdateexit value: 0|Util: C2DeviceUpdateshell output : 0|Util: exec [cat /sys/class/net/wlan0/statistics/tx_bytes]|CaptureThread: 21906 captures avail|Util: exec [source /system/bin/crab && get_next_capture]|Util: C2DeviceUpdateexit value: 0|Util: C2DeviceUpdateshell output : 0|Util: exec [ifconfig wlan0 | grep inet addr | cut -d: -f2 | busybox awk {print ;}]| Util: C2DeviceUpdateexit value: 0|Util: C2DeviceUpdateshell output : |C2Run: C2 error error getting updated ip|C2Device: SEND C2 UPTIME|C2Device: SEND C2 MINIMAL|C2Device: SEND C2 NOTIFICATIONS|Util: GetNextCapexit value: 0|Util: GetNextCapshell output : /storage/AC93-4313/LOOT/4|CaptureThread: Capture Request Sent/storage/AC93-4313/LOOT/4.jpg|Mirror: REQUEST RECEIVED|Mirror: WAITING FOR CAPTURE TO COMPLETE|POST: C2 POST ERROR: java.net.ConnectException: failed to connect to /172.16.0.18 (port 8080): connect failed: ENETUNREACH (Network is unreachable)|C2Run: C2 error startup sync post failed|C2Run: C2 RETRYING STARTUP SYNC|Mirror: WRITING CAPTURE TO SD|Mirror: CAPTURE COMPLETE604ms|Mirror: Response sent:/storage/AC93-4313/LOOT/4.jpg|CaptureThread: Response:/storage/AC93-4313/LOOT/4.jpg|Util: exec [source /system/bin/crab && has_signal_log]|Util: NoSignalLog shell exited value: 0|CaptureThread: capture interval 5000ms| I've made a wireless capture, but without knowing what the MAC address OUI for the screen crab is, it does me no good as there is a ton of wireless traffic in the area. I've checked and double checked to make sure the config file is correct. The only thing in the config file is WIFI_SSID XxxxxxXxxX WIFI_PASS XxxxXXxXXxx DEBUG_LOG ON I have confirmed I can reach the C2 server over 8080 from both the wired and wireless side of my network. I've also deleted the device from Cloud C2, made another device, and re-downloaded the device.config file. Any suggestions? Thanks for any help you can provide!
  14. I've no idea whats happening here. I bough the AWUS036ACH wifi adapter. It sports the RealTek 8812AU chipset. anyways, like i said no idea, ill set the adapter to 802.11AC and prioritize 5Ghz band, run a internet speed test and get speeds like 16mbps down. Ill then set it to 802.11 a/n also prioritize 5Ghz band and get 66 mbps download. What the actual fuck? Whats even weirder is when i view my adapter through windows it shows 300mbps when using 802.11 n and like 620 for 802.11 AC. (Yes im aware my isp has bandwidth limits and i know i cant expect to achieve those speeds that my devices are capable of because of ISP bottle necking. And its not the router hardware limitation my router is a Archer A7 TPlink 1750AC.) Whats confusing me is why when i use 802.11 a/n im hauling ass. but when i use 802.11 AC im getting significantly less download speed? I dont know exactly where to look anymore. AC has just been SUPER finicky. It'll pop in a out of connectivity. ill have to disable and re-enable to get it to work, but even if i get it to maintain connection the speeds stay in that 16 mbps range. I dont understand i dont have enough knowledge to figure it out by myself please someone give me some guidance here. I've tried multiple drivers, with this chipset the ones from ALFA the ones from RealTek, the default windows ones, im just at a complete loss. it feels like something is bottle necking the 802.11AC protocol and i have no idea how to figure out where or why. And before someone suggests it im gonna hop on the router and see if i can update the firmware or something. but if anyone has any other suggestions or ideas please let me know. thanks
  15. I'm trying to run wifislax on limbo for Android and it is installed successfully but it doesn't run .when installation is done I just get this black screen in attachments.any help?thanks My phone is redmi note 8 pro with mediatech core and 6 GB of ram,limbo version is 4.1.0 And the most recent wifislax version from their website
  16. Hi! We're pleased to announce a new release for the WiFi Pineapple NANO: 2.7.0. This update addresses some of the bugs reported by the great community here on the forums and in the Hak5 Discord, as well as updates to some community packages and updates to OpenWRT. 2.7.0 Changelog: General OpenWRT version is now 19.07.2. Kernel has been updated from 4.14.133 to 4.14.171. Fixed an issue where OpenVPN would cause a kernel panic upon establishing tunnel. Recon Fixed an issue where live scans would fail on the WiFi Pineapple TETRA. Reporting Fixed an issue where emails would not be sent. Improved the user experience by automatically saving email settings when testing emails. Improved the user experience by forcing an email to send when testing, regardless of whether the "Send Email" option was checked. Advanced Fixed an issue where swap would not be mounted automatically on the NANO's SD Card. Renamed "USB" panel to "USB & Storage". Misc Added SSLSplit package to repositories. This fixes the SSLSplit module dependencies. Updated Kismet package in repositories. Updated Kismet-RemoteCap package in repositories. You can update your WiFi Pineapple NANO Over-The-Air via the Advanced module or manually at the Hak5 Download Center. ♥ - The Hak5 Development Team
  17. Hi! We're pleased to announce a new release for the WiFi Pineapple TETRA: 2.7.0. This update addresses some of the bugs reported by the great community here on the forums and in the Hak5 Discord, as well as updates to some community packages and updates to OpenWRT. 2.7.0 Changelog: General OpenWRT version is now 19.07.2. Kernel has been updated from 4.14.133 to 4.14.171. Fixed an issue where OpenVPN would cause a kernel panic upon establishing tunnel. Recon Fixed an issue where live scans would fail on the WiFi Pineapple TETRA. Reporting Fixed an issue where emails would not be sent. Improved the user experience by automatically saving email settings when testing emails. Improved the user experience by forcing an email to send when testing, regardless of whether the "Send Email" option was checked. Advanced Fixed an issue where swap would not be mounted automatically on the NANO's SD Card. Renamed "USB" panel to "USB & Storage". Misc Added SSLSplit package to repositories. This fixes the SSLSplit module dependencies. Updated Kismet package in repositories. Updated Kismet-RemoteCap package in repositories. You can update your WiFi Pineapple TETRA Over-The-Air via the Advanced module or manually at the Hak5 Download Center. ♥ - The Hak5 Development Team
  18. I was testing evil twin attack on my laptop using one wireless adapter. I ran it on airmegaddon and while I have successfully created a rogue AP, my laptop can't connect to the AP. It failed numerously. Is there a way to get connected to the AP that I have created?
  19. https://bestestredteam.com/2019/11/28/building-a-better-wifi-pineapple-with-open-source-tools/
  20. Ok, so a while back I updated the owl and now I can't seem to get it to do anything! I'm trying to connect it to wifi, but it won't work! It goes through the boot process, then it stops blinking all together! I don't know why it won't work, I don't know how I can erase it to start over in case it was something I did trying to get it to work... when I push the button on the back, it does work to put it into arming mode. Any help would be fantastic!
  21. Hello everyone, I've been playing around with a freshly acquired Wifi Pineapple Tetra. I upgraded, did a few factory resets and frimware reset too I there a two problems that need to be fixed. The first one apparead with the firmware upgrade from 2.4.something to the latest 2.6.2. : The live scan results don't print. We need to do a scan, stop it and load the scan file to output the results. I have seen this issue a few times on the forums but no admin/dev here made any answer or fix. WE NEED TO FIX THIS. This feature is important for the field pentesting. The second one is linked to wlan1mon. When I enable the PineAp, wlan1 goes into monitor mode and becomes wlan1mon. When PineAP gets disabled, the reverse operation is not done, making the red LED to keep blinking even though the PineAP is stopped. Any admin or dev here could take a look at this please ?
  22. Hello I am an IS auditor and I need to perform an IT audit of a network in a large complex far outside a metropolitan aera . One key point of the audit is to be able to identify all Wifi Access Points in te complex. My customer wants to be sure that only the one that he has autorized are installed. So I will be during 3 days at various intervals walking through the facility to cover the all perimeter. I have just order a wifi pineapple nano and I would like to use it to have the following information (that will allow me to identify rogue AP) SSID Security (WPA/WEP/WPA2) Manufacture/Model * (This one is important so I can filter out all AP that are Cellphone from the employees) Thanks a lot for the support In addition, is there a documentation an tutorial of all I can do with my new toy/tool
  23. I have (most probably) an EPON connection providing speeds of 600/600 Mbps. However, the modem that has been supplied by my ISP is really crappy. When it works, it performs well, but once in a while it just freezes up, until it manually restarted. I talked to the technician, and he told me that my connection was EPON (had some doubts) but he was sure that the fiber line wasn’t locked to the modems from one particular brand, hence I am free to use any other modem I want. I found some really cheap ONTs on AliExpress, but all of them are GPON ones. If I buy those, will those work on my connection ? (PPPoE auth) https://www.aliexpress.com/item/32799325864.html?spm=a2g0s.8937460.0.0.62fc2e0eRhskot This is what my modem page shows :
  24. So I just got my pineapple very recently and I had a simple question. how do I forced people to connect to my network. here's an example. I'm at Starbucks and the original Starbucks Wi-Fi is running. so I created a fake Starbucks SSID for people to connect to. Is there a way to forced people to connect to my fake Starbucks instead of the original?
  25. Hi everyone, I bought a wifi pineapple about a couple of years ago. I've been searching for a battering thin enough to fit the case and be plugged using the U shaped usb connector. I know about the anker and pineapple juince models.. however, I can't find them online (shipping to belgium). Has anyone else found another battery that fits?? Thanks a lot!
×
×
  • Create New...