Search the Community
Showing results for tags 'Karmetasploit'.
Using karmetasploit is the same as using the Jasager on the WiFi pineapple, right? You use karma in karmetasploit to respond to all probes as soon as WiFi is turned on. The fake access point provided by airbase-ng from the aircrack-ng suite. Is that right? If so I have a question about using airdrop-ng, also from the aircrack-ng suite at the same time as using karmetasploit. My set up is Backtrack 5r3, Alfa Awus036h as my usb wireless card and my laptops internal WiFi card and my own Desktop PC in this case playing the “victim” Both wireless card support packet injection. Everything is up-to-date. In setting everything up I have loaded up Backtrack and connected my internal WiFi card to my own internet access point so I have internet access. I then connect my Alfa Awus036h and set it up as my fake access point which will be used by Karmetasploit. Everything works, using my Desktop PC I am able to connect the fake access point (provided by airbase-ng on Alfa wireless card) and use the internet because my other wireless card is connected to my internet hub. But I would like to use airdrop-ng but I am having some trouble setting up the rules to force my PC to connect to my fake ap. In the allowed rules do I put the bssid of my fake ap so they can connect to it but also do I have to use the bssid of my wireless router so everyone can get internet access. Do I use one or both bssids? How would that look like? I am doing all this from my backtrack machine so when using airdrop I don’t want to lose my connectivity which is providing the internet to the fake ap. I saw Darren using the WiFi pineapple on the “Airport WiFi Challenge” using Jasager and airdrop-ng together. Just wondering how he got them to play nice together - using Jasager (Karma + fake ap) and airdrop-ng while still maintaining internet access