Jump to content

Search the Community

Showing results for tags 'tcpdump'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 13 results

  1. Hello, I would appriciate help running the squirrel TCPDUMP payload in CLONE mode packet squirrel version the squirrel is running on: 3.2 Downloaded payload from github: packetsquirrel-payloads/payloads/library/sniffing/tcpdump/payload.sh When running the script in TRANSPARENT mode it runs OK. When changing the mode to CLONE - can not have network connection. Thx
  2. Hey guys, I have a packet squirrel setup in Cloud2 and I can successfully start a terminal session. In a terminal session I would like to run a packet capture. If I run the command tcpdump -nni eth1 -f /mnt/loot/tcpdump/test2.pcap I am able to capture some packets. I can Exfil the packet capture with the command: C2EXFIL /mnt/loot/tcpdump/test2.pcap and the file shows up in the C2 dashboard. However, when I download the pcap, Wireshark cannot open it. I get an error message: "The file test2.pcap isn't a capture file in a format that Wireshark understands" Screenshot: https://imgur.com/a/t9MJtoZ I can open the pcap file with Wireshark from the USB stick, if I remove it from the Packet Squirrel and plug it into my PC. Could the C2EXFIL command be modifying the .pcap file when it moves it? I've used the C2EXFIL command to move other files like .txt and .nmap and have not had any issues. Has anyone else experienced this or figured out a way to move pcap's using C2EXFIL?
  3. Hi, I installed the module tcpdump on my sd card. When I click on start, nothing happens. How can I resolve that bug? I really don t understand. thanks a lot
  4. Has anybody been able to mitm a printer which was using a (windows) print server? I tried running default payload 1: tcpdump to sniff traffic going to a printer. I read the payload and saw it put the PS into transparent netmode. Hookup: [printer] --CAT5--> in-[PS]-out --CAT5--> [wall-jack-to-switch] The printer is hardcoded to a specific IPv4 address and uses a print server for spooling. Whenever the PS is placed inline, all systems & print-server say the printer is no longer reachable. Confirmed by pinging the hardcoded IP of printer that it is not reachable. PS boots up fine (blue-blinky) then starts payload, even though the printer's not available I still sent a print-job waited, hit the PS button and connected it back to my attack platform. The payload didn't seem to have run, as there was no "loot/tcpdump" folder created. The fact the printer dropped off, makes me wonder about transparent mode as well. Pretty sure there's no port-security, the other network segments don't have it. I also tried swapping the in/out cables to the PS and rebooted it, still no success.
  5. When i start the PS the capture isnt working, its blinking red, green, blue when attempting to start tcpdump payload and dont get internet access on computer. SSH to device works.
  6. Module: tcpdump Version: 1.4 Features: Manage dependencies Configure tcpdump options and filters Dump History Change log: 1.4 Bug fixes
  7. I'm sniffing using: tcpdump -i wlan0 -e I'm not receiving any information about what channel or frequency is used. Is this normal for these nics? I've tried to change the channel using ifconfig but to no change. On my laptop i get information like: "6.0 Mb/s 5180 MHz 11a". 12:55:36.413325 8361052374567211200us tsft cfp 0.0 Mb/s 0 MHz Turbo -128dB signal [bit 29] BSSID:ff:ff:ff:ff:ff:ff DA:ff:ff:ff:ff:ff:ff
  8. Hello everyone. I want to know whether there is a way to triangulate data from wifi pineapples kept at various locations. I have 2 wifi pineapples and will be using tcpdump to store data. So is there a way to obtain the complete data in one particular file which makes it easy to access it.
  9. Thanks to Hak5 for bring the Mark V to the masses--would like to see more examples of various hacks thus I assume this is what the forums are for so, here are some questions. I went to the link below and thinks its a good tutorial but think the person left out a bunch of Stuff and has it wrong on the whole Whitelist thing they mentioned in the guide--I think they met to say you need to black list----- file:///home/q/Downloads/Phishing%20for%20Facebook%20logins%20with%20the%20WiFi%20Pineapple%20Mark%20V%20from%20HAK5%20%28Setup%20Guide%29%20|%20.%20.%20TheSecurityBlogger%20.%20.%20..html ==================================================== While these are Mundane ---I think Hak5 should address them or put out a printed living document on the various options Questions: I want to create a rouge AP ( for edutional purposes only ) to get those in my vacinity ( class rooms) outside perimieter to connect through my Mark V. As in article above I want to use the 3 tools TCPDUMP ( need wireshark ro look at dump file??? ) WIFI manager and SSLstrip PLus using Karma the follwing questions arise hoe top get feed back. I am running a laptop, with a WIFI router connection ( rouge AP ) and Pineapple connected to my laptop 1) Where in the WIFI setup tabs do I " Share " the network? 2) Should both Wlano --my wifi and Wlan1 my wired --should both be enabled? 3)In Wifi Manager Should both Physicial interfaces be enabled? >DO you have to click "start Monitor" for both interfaces or do you need only to monitor the wireless? 4)On my laptop under network connections should the setting be on ad hoc or infrastructure? 5)When using TCPdump--what should be selcted in the drop menu , Wlano,Mono,LO,Etho,Br-lan ??? What is Br -Lan 6)TcpDump--SHould Verbose be used? Does Dont resolve host names or Dont resolve Portnames should it be used? 7)When I click SSlstrip log file it just displays a black page in a window webbrowser--this requires using the back button to get back into mark V pannel -- KARMA As I read the forum--with the above scanrio-- I want or HAVE to Blacklist my SSID ??? Correct??? AND I also have to Blacklist my MAC addresses??? Both Wireless ( which is under SSID ) AND Wired MAC ??? I am unclear on this Thank you in advance for your replies!
  10. Hey there folks.. Just got the pineapple fired up and capturing using a honeypot... Any ideas how i write the output of tcpdump to the mounted SD card in the unit?
  11. i ssh into pineapple tried installing nmap this is what i get root@Pineapple:~# opkg update Downloading http://cloud.wifipineapple.com/packages/Packages.gz. Updated list of available packages in /var/opkg-lists/snapshots. root@Pineapple:~# opkg install --dest usb nmap Unknown package 'nmap'. Collected errors: * opkg_install_cmd: Cannot install package nmap. i'm on v2.7.7 i tried installing through browser ui without success. i'm new to this plz help
  12. Is possible to run sslstrip on bridge interface or only over NAT ? like on pic. I want to decode https data on the fly in network between WiFi Router & ISP without accessing in local network & changing ip addresses
  13. Hello! Can anyone help me to solve problem with multiple interfaces sniffing on wifi pineapple m4 ? I want cut in into ethernet cable to sniff RX/TX data over eth0 & eth1 interfaces & write it to dump on flashdrive but when i run : tcpdump -vv -i eth0 -i eth1 -w /usb/dump.cap [/CODE] I've only capture eth0 or eth1 interface when i conected via wireless interface & run : [CODE] brctl addbr sniff brctl delif sniff eth0 brctl addif sniff eth0 brctl addif sniff eth1 tcpdump -vv -i sniff -w /usb/dump.cap [/CODE] I've capture data from bottom interfaces but cannot connect to ssh or webgui via br-lan (wireess interfaces) sorry for my english
×
×
  • Create New...