Jump to content

Search the Community

Showing results for tags 'aireplay'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 5 results

  1. So I had some issues happen in the video but it just turns out I remembered things wrong although it still all works out in the end so I hope you all enjoy the video on this tool. Also I do a slight comparison of the node mcu vs aireplay.
  2. So yesterday it occured to me that I've never actually cracked a WEP network. I've heard that it's extremely easy, so I figured I'd give it a try. From what I was reading I seen you needed clients connected, and they needed to be active. I took an old router with DDWRT on it and dropped it to WEP encryption and added three clients and booted up a Kali live cd. Step one: I put my card into monitor mode. (It's the ALFA NEH from the Hak5 store) Step Two: I ran airodump to start capturing the packets. "Airodump-ng -c 1 -w WEP --essid Fallen wlan1mon" (And I also tried everything again using
  3. For testing I have a Zyxel Router with an AP (SSID - FUSION) and a laptop connected via wifi to it. The router has no internet just the wifi's AP running. I also have my MKV setup with Karma and Jammer - at this point the Zyxel router is further away from the laptop than the Pineapple. And the Pineapples signal is stronger. When I enable Jammer it doesn't jam/deauth the laptop from Fusion although the jammer's logs says it has sent deauth packets. Tried this many times using different Interfaces and Modes etc. Not sure if im doing something wrong, could someone be kind enough just to put some
  4. So I've had my Pineapple for a few days and started to learn the in's and outs of the MKV. I'm quite comfortable with using Karma and the other features, but would like to take it to the next step, by going out and doing deauth attacks.... In an early edition of HAK5 Darren Kitchen had an airport challenge where he was using Karma with a newish feature (at the time) called airdrop-ng, he showed an example of it, and looked easy to use. It dosnt seem to be on the MKV, however the aireplay-ng feature is. I've come across aireplay-ng but never used it. My question is, are these the same featur
  5. Hello - first post, and my first bite of the pineapple. I requested and received one for the holidays, and have spent the last few days playing with it. I'm attempting to perform a simple deauth/hijack of a client on my local network, and my use of the Alfa adapter isn't working out the way I had hoped. Some details: - Connecting the USB adapter does not show an interface available - lsusb reflects that a device was connected - iwconfig or ifconfig can be used to bring the device up, light the LED, and perform further commands after which the device is 'usable' - Once the device is avai
×
×
  • Create New...