Search the Community
Showing results for tags 'mark7'.
Looking at Darren and Shannon's post below. I attempted to set up Easy Tether Pro by connecting my smartphone with the Pineapple Mark VII, Has anyone gotten this to work? The instructions work good until i get to the 10:30 minute mark. There is not a install available for the CPU architecture for the MarkVII. I have tried the latest version and downloading older versions, but none seem to have the architecture of the MarkVII which is either "mips" or "MediaTek MT7628", however I'm not 100% sure that info i have found is correct. So none of the installs work because the architecture is not compatible, hence can't get EasyTether to work. Just wondering if anyone else has had this issue
Hello, I am new to Hak5 forums and still have to learn a lot about the Pineapple. I just started, so please have mercy with me 🙂 Maybe someone can clarify and answer some of my (sure in your eyes silly) questions regarding the Mark 7. 😅 Recon: ===== Settings - Time interval like 30 seconds does REFESH every given amount of time (e.g.30 sec) and list newly connected devices AND adds or removes in-/active APs - is this correct? Or should it only scan one time for 30 seconds and NOT refresh again (Snapshot)? I am seeing different results. Sometimes no flickering/refresh, and sometimes it does refresh every few seconds. Issue: - I deauthed a client, which came back to reconnect succesfull BUT never showed up again on this AP's connected devices. Instead goes and stays under "unassociated clients", which is not true. No chance to get it back from the unassociated area again (started phone again, reconnected to the AP, did a new recon scan, disabled PineAP, checking filters, switching to another AP and back to my main AP etc.) Even after rebooting the Pineapple or switching my phone/clientdevice to another AP (5) and back to the normal AP (2,4) of my home router it still does not get back catched by a fresh or existing recon 😕 PineAP & Filters: ============ If I add a specific MAC to the filter, and select "Allow List", I would expect to only monitor and look for this client device. Same with the SSID. But still everything gets collected. is this ment to work this way? In my test I did enter my MAC Address like "aa:aa:aa:aa:aa:aa " (= just an exampl ehere for my phones MAC) to the "Allow List" MAC. The SSID Pool - Filter was set to an empty "Deny List". Still every client got collected. Am I doing it wrong there? Is it for a different use case? Maybe I don't want to set it to "Deny List" (with no entry/ monitor everything). How would I setup a targeted Campaign or Recon for a specific MAC or SSID ONLY? I did try to add the Target Client MAC Address in the PineAP via "Target MAC Address". What kind of effect does this have? I guess the "Source MAC Address" is to spoof the FakeAP/Broadcasted SSID? What is "PineAP Enterprise" for? Campaigns-Reports: =============== Why isn't there an option to delete chosen html-campaign-reports from the GUI? Currently you can only download them, but not delete (doing it via console/webshell at the moment). I would love to buy a Book/Guide on this awesome Mark 7 and learn more. Checked for YT videos so far. Hopefully some questions can be answered here. Sorry again, I just started learning about this amazing area of tech. Thank you for taking your time to guide me a it in this 🙂
Hi! We've just pushed Beta 1 for 1.0.2 to the WiFi Pineapple BETA Channel. This update features some small bug fixes and UX improvements since 1.0.1. If you'd like to try the upcoming release, updating is easily done by following the above guide. Change Log: Recon Fixed an issue where the dBi column would not sort. Show a message if all table columns are disabled. Fixed an issue where results would not update when navigating back to a running scan. Campaigns Added the functionality to delete campaign reports. Misc Fix an issue with ICS routing introduced in 1.0.1. Cloud C2 Improvements to Cloud C2 functionality. Add the ability to manage Client Mode whilst in C2 Mode. Upcoming Changes: Improved support for WPA3 and WPA2/3 Mixed Client Mode Have a suggestion? Let us know! We're constantly looking for feedback, especially during the public beta programs. If you're interested in joining the discussion, be sure to check out the community page and say hello! Thanks, Foxtrot