Jump to content
Hak5 Forums

Search the Community

Showing results for tags 'iphone'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapple University
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Bash Bunny
    • Packet Squirrel
    • LAN Turtle
    • USB Rubber Ducky
  • Hak5 Shows
    • Hak5
    • HakTip
    • Metasploit Minute
    • Threatwire
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Found 7 results

  1. iOS Wifi Scanning App

    I found out that you can use the Airport Utility App to scan for active wifi on your iPhone. in the airport utility settings, toggle wi-fi scanner and the app gives you a button at the bottom for scanning WiFi. The results show SSID, BSSID, MAC addresses, RSSI, channels, and clicking on a result shows past scans signal strength and channel. This seems to be the only app that has access to the MAC address under the new IOS 11+.
  2. Iam so curious to someone. I want know her more. Can i hack her iphone with wifi connection? or something else can i do? please help me
  3. Using iPhone gps with kismet

    I found the iPhone app gps2ip and got it to send gps data to kismet on my laptop. nc -l -p 11123 | tee /dev/ttys0 When I have time I'm going try to run it on the nano. A pineapple nano and an iPhone4 would make a nice small wardriving/walking rig. If if there is any interest I can post my notes on the set up.
  4. NetworkToolbox - Network scanning and analyzing by Marcus Roskosch https://appsto.re/us/9wa2M.i https://networktoolbox.de/ Shits extensive. I don't pay for apps willy-nilly, this one has not failed to impress. Heres a list of it's features: Features of NetworkToolbox Scan your local home- or corporate-network within seconds. Explore all connected devices and get a complete picture of your network. Over 26 individual tools are available to analyze your network, to perform various security checks or even connect to devices on your network. SCANNING – FAST AND COMPLETE The included Network scanner runs repeated scans to get the most accurate results. To prevent from being detected by Firewalls or IDS (Intrusion detection systems), the scanned addresses are selected randomly. For the fastest possible speed, scans will be performed in hundreds of concurrent tasks at the same time. This results in the fastest and most reliable scan results compared to any other app. Devices, found by the Network scanner can be further analyzed by scanning for services using the Portscan tool. Portscans may reveal known and unknown (hidden) services of devices. All tools are highly integrated. Wherever you want to dig deeper into the results of one tool, a single tap will allow you to open the internal browser, start a telnet or FTPsession, ping the host, get information about a SSL certificate, perform certain security checks and more. Scan results can also be logged and multiple scans can be compared to each other. This way, it is easy to find out, if devices have been added, removed or changed between two scans. NO NETWORK SPECIALIST – (YET) ? If you are not a network expert, don’t worry and don’t be scared. NetworkToolbox makes it easy for you to dig into those networking details. Several included How-To’s and Guides will show you how easy it is, for instance, to perform an open-port analysis. By this, you will be able to quickly scan your home network to find ports that are unintentionally open to the web. Such ports will often be used by cyber criminals to break into your internal network. The app also includes Video tutorials, samples and other learning resources. Each tool also has a comprehensive Help text that explains the purpose of each tool and how to use it. Last but not least, a Glossary is included that explains terms from A like “Access control” to Z like “Zero day”. TELNET AND SSH TERMINAL NetworkToolbox also includes a telnet or SSH terminal which allows you to connect to linux devices, routers with telnet interfaces or any other telnet or SSH device. SHODAN AND MORPHEUS DEVICE SCANNING SHODAN is a search engine that lets you find specific computers (routers, servers, etc.). SHODAN can be seen as a public port scan directory. Web search engines, such as Google and Bing, are great for finding websites. But what if you’re interested in finding computers running a certain piece of software (such as Apache)? Or if you want to know which version of Microsoft IIS is the most popular? Or you want to see how many anonymous FTP servers there are? Maybe a new vulnerability came out and you want to see how many hosts it could infect? Traditional web search engines don’t let you answer those questions. SHODAN is fully integrated in NetworkToolbox. In addition to SHODAN, NetworkToolbox integrates it’s own Device scanning engine called Morpheus. Like SHODAN, Morpheus runs on a distributed network of scanning engines around the world and can be queried from inside NetworkToolbox. ALL FEATURES : The above just shows a fraction of the possibilities of NetworkToolbox. Below is a list of features. This list may already incomplete because NetworkToolbox is being extended and updated continuously. If you are missing a feature or have questions, please feel free to ask. Local device and network information Local and public IP address Network Gateway and DNS Server addresses WiFi network information Cell network information Shodan and Morpheus search engines DNS lookup Reverse DNS lookup IP Geo-Location Provider information MX, NS, SOA DNS Server record information Graphical PING Network Scan Shows Device Type MAC address Device Network name Device Vendor Individual names can be assigned Port Scan Individual port ranges Traceroute Telnet client FTP client SSH client SFTP client HTTP Header analyzer Internal Webbrowser Individual User-Agents to mimic iPhone, Windows PC, Mac Individual Mime types Standard password test function HTTP traversal exploit test function Source display with syntax highlighting XML browser Website Spider WEB-Service analyzer Individual Endpoint, Service header and body GET, PUT, POST methods XML, JSON, plain-text SOAP, REST support Results will be displayed in a drill-down browser SSL Certificate inspector Bonjour scanner Bluetooth LE (4.0) scanner Port forward tool MAC address database IP address calculation Security check tool Router exploit tests mongoDB exploit test and more Mail server check Reports mail client settings Identifies mail server issues Glossary Logbook To collect scan results To remember Addresses and links To compare two scan results and find differences Ability to integrate external apps For instance, your preferred VNC or SSH app can be fully integrated Support URL-Scheme Other apps can call NetworkToolbox e.g. to use the WebService tool Additional resources and links Vulnerability databases Exploit archive Internet Storm Center and definitely much more…
  5. no clients

    Hi Just got my first nano, hooked it up. And decided to have a look at it, just a breif play, went into recon found what I would expect for around where I live. So went into pineAP selected everything and started the deamon. On the main page I think it said 5 ssid's and 0 clients, now the problem is I've not been getting any clients (I was looking at it for quite a few hours), even when Ive been selecting my own stuff and deauth'ing it etc. I was watching my iphone while this was running, every few seconds the current network would switch to an unsecured one (which was the nano pineap in action, when I turned it off it stopped doing it), but would then switch right back again to the correct network, my secure one rather than sticking with the nanos insecure one. While this was happening there was no clients in the main screen. Now ive been refreshing these screens for as long as I was giving it a go, its not just my iphone I was looking at, tho my iphone mac address never seemed to be listed in the recon, but guessing this could be missed. I was expecting to get at least one client I could look at, but nothing. Any advice, know how on whats going on would be great, seemed to me the iphone new that it was on the wrong network and switched back. Anyway Thanks in advance for any advice.
  6. Heyhey, I recently bought a NANO to start experimenting with wireless security and pretty quckly I encountered my first problem. About half a year ago I've met a security researcher who demonstrated his pineapple setup to a bunch of managers. While he was prepping for his short talk on the stage he switched on the pineapple and I looked at my iPhone which then displayed almost ALL my "known" wireless networks. Airports, Hotels, Restarurants, you know what I mean. My phone also immediately connected to one of them. Now I wanted to reproduce this, but I fail miserably. When I enably PineAP on my NANO, log all probes and broadcast all known SSIDs it just seems my phone isn't asking for ANY previously associated open network. No hotels, no airports or restaurants. It just sits there and does not probe for wifi networks, so the NANO does not learn any new SSIDs and thats about it. When I manually enter a SSID into the iphone to connect to it associates itself immediately and the counter on the NANO increases by one, but that's not how I wanted it to work. So my question actually is: In a room with about 15 persons, all with smartphones, why is no phone looking for it's previous WiFi networks? :/
  7. I just got the pineapple nano in the mail today. I tried hooking it up to the Note 4 and enabling the USB tethering as shown from the setup video. For some reasons there have been issues enabling the USB tether. I'm not sure if it's because I am using Verizon. Are there any ways to go around this issue.
×