Jump to content

Search the Community

Showing results for tags 'enterprise'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Hak5 Cloud C²
    • Plunder Bug
    • Bash Bunny
    • Signal Owl
    • USB Rubber Ducky
    • Packet Squirrel
    • LAN Turtle
    • Screen Crab
    • Shark Jack
  • O.MG (Mischief Gadgets)
    • O.MG DemonSeed EDU
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 4 results

  1. Hi, I'm a security architect and double up as the internal pen tester for my company. I showed my company why they shouldn't use just credentials to authenticate to the wireless network by setting up the pineapple and using PineAP to capture the creds in cleartext (using the GTC downgrade). I recommended they use a certificate on all laptops to connect to the wireless. My question is, how can I test to ensure this certificate setup is secure? Can I still capture the certificate to use myself and, if so, how? (I know I can create my own certificate to lure the users onto my rogue AP, but that won't get me onto my company's wireless network. Thank you in advance for any help! James.
  2. Got a question im wondering about. Lest say i plug a Turtle on an Enterprise Network. The kind that have Active Directory and Cisco Routers, That filter devices by Mac address and not allowing machines that are not approved to connect and set off Unwanted Alarms. Will a Turtle survive or become Turtle soup?! I didn't undertood exactly the way it work. Does it have its own nic to get an ip and create vpn or share the ip of the machine and create vpn with that machine. In an enterprise Network its better to use 3G Turtle right? If i don't have outside network or its filtered. If the Turtle SD does have a nic and wont work(get blocked).
  3. My first thread here on Hak5, so bare with me I don't follow rules. If I violate anything please ask me to stop, within reason I will comply. I'm just going to say this one time: I'm not responsible for your poor decision to do this. You break it, youre buying a new one, not me. Blame me for anything and I will laugh in your face, and make fun of you to my friends. That being said, lets start hacking some Pineapples! Goals: I want to construct a chroot environment discussed here by Matt Burch https://www.optiv.com/blog/pineapple-corporate-toolkit-part-1 Where he discusses capturing enterprise credentials from RADIUS servers using EAP authentication. We begin by sshing to the pineapple and sending the update command opkg update And setting up fstab with an external powered usb hub and a 16gb thumbdrive. In linux, format the drive as an extended partition. Setting the majority of the drive as ext4 and the remaining portion as swap space.Here is a copy of my fstab config global automount option from_fstab 1 option anon_mount 1 config global autoswap option from_fstab 1 option anon_swap 1 config mount option target /usb option device /dev/sda5 option fstype ext4 option options rw,sync option enabled 1 option enabled_fsck 0 config swap option device /dev/sda6 option enabled 1 From what I understand so far, we are going to need a copy of the Hak5 Tetra firmware.bin So pulling the git to my linux machine, my layout looks like this: git clone https://github.com/WiFiPineapple/openwrt-pineapple-tetra.git ~/Desktop/PINESHIT/pineGIT There are several prerequisites for the host nix machine that are not always easy to find/fix. For example, to get the required libz-dev and libc headers I had to install sudo aptitude build-dep nginx Open ~/Desktop/PINESHIT/pineGIT/openwrt-pineapple-tetra and run sudo make-config This will open the GUI for building a custom image for the Tetra. So there are about 2000 customization options. If you chose something that the pineapple dosent like, you may end up with a fruity brick. Study and understand what you are building, and what the options are. Start with blind compiling an image just to make sure that it builds. Meaning dont chose any options, just complete a build, not be saved, used or tested. If it completes, then our build space is solid and we can start understanding the build requirements to ensure full awesomeness. My init build took about 4 hours on Ubuntu 16.04.1 LTS 2gb RAM 2 i7 4770R @3.20GHz. It completed, but the next 2 didn't because I didnt invoke with sudo. sudo make -j1 V=s Also, I'm stuck with chroot giving me unhelpful feedback. root@BDU_Fruit:~# chroot /usb/chroot chroot: can't execute '/bin/ash': No such file or directory root@BDU_Fruit:~# Until I can get passed the chroot my project is dead in the water. I ask the community to help me finish! Hows that go.... apt-get help
  4. I just got my WiFi Pineapple Nano a few days ago, and have been trouble getting it connected to the internet. The WiFi AP I'm trying to get it to connect to is secured via WPA2 Enterprise. You have to use a username and password to login to the network. My laptop is connected successfully, and I have shared the network connection to the Pineapple, but it still wont connect. Routing Table attached.
×
×
  • Create New...