Jump to content

Search the Community

Showing results for tags 'new'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapple University
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Hak5 Cloud C²
    • Plunder Bug
    • Bash Bunny
    • Signal Owl
    • USB Rubber Ducky
    • Packet Squirrel
    • LAN Turtle
    • Screen Crab
    • Shark Jack
  • Hak5 Shows
    • Hak5
    • HakTip
    • Metasploit Minute
    • Threatwire
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 7 results

  1. So I just got my pineapple very recently and I had a simple question. how do I forced people to connect to my network. here's an example. I'm at Starbucks and the original Starbucks Wi-Fi is running. so I created a fake Starbucks SSID for people to connect to. Is there a way to forced people to connect to my fake Starbucks instead of the original?
  2. So I just got my pineapple very recently and I had a simple question. how do I forced people to connect to my network. here's an example. I'm at Starbucks and the original Starbucks Wi-Fi is running. so I created a fake Starbucks SSID for people to connect to. Is there a way to forced people to connect to my fake Starbucks instead of the original?
  3. Hello, I am almost finished a new module for the pineapple aptly titled "Themes". The concept of the module is to let users create and share their own custom stylings for the 172.16.42.1:1471 page! Here are some example screencaps: My goal is to have the model come with a set of themes users can select from if they dont want to select their own. I need your help to design some baseline themes for the module, and give your theme a name as well. You can create a new theme by navigating to the 172.16.42.1:1471 page, selecting Ctrl+Shift+i and modifying the main.css file. Once you are done modifying the file, paste the code here or email me your css stylings @ trashbo4t@protonmail.com. I appreciate any help and can answer any questions below!
  4. Today I received my nano version of the wifi pineapple. As per instructions shown here: https://www.youtube.com/watch?v=CrHbEZd4t00 I've connected the device to my laptop and eagerly started waiting for the blue led to show up at no avail. The device also came in a skeptical condition with the casing falling apart - see the picture. I've tried connecting it to a total of 2 laptops and a desktop pc with the same results. However, with lsusb the machine finds it under the name Any ideas ideas on what may be wrong?
  5. I'm creating this thread for myself and others that are newish to the Pineapple, Openwrt, CLI and linux. Please apply salt as this will probably be an ongoing thread. I tend to jump the gun with garishly heavy hands, often accompanied with moith feet. I come from a background of outsourcing, photography and color correction. None of which speak Linux or networking and nary a command line. (I did create a batch file once that deletes massive Lightroom catalogs in minutes; doesn't count though). I learn quickly but it's been slightly more than hairy. here are some of the Linux tools that the nano can utilize. The links go to the tool via kali.org tool page. PineAP - PineAP is a highly effective rogue access point suite for the WiFi Pineapple. Nmap - Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. p0f - P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in any way responder - This tool is first an LLMNR and NBT-NS responder, it will answer to *specific* NBT-NS (NetBIOS Name Service) queries based on their name suffix. SSLsplit - SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. SSLstrip - sslstrip is a tool that transparently hijacks HTTP traffic on a network, watch for HTTPS links and redirects, and then map those links into look-alike HTTP links or homograph-similar HTTPS links. | Not in the module list but will be soon (https://forums.hak5.org/index.php?/topic/37077-sslstrip/) Aircrack-ng - Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. wifite - To attack multiple WEP, WPA, and WPS encrypted networks in a row. BeEF - Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors | Not a module but possible to use for the landing page. I just installed it and will play with it some. Not really sure of the extent of it's abilities.. PixieWPS - Pixiewps is a tool written in C used to bruteforce offline the WPS pin exploiting the low or non-existing entropy of some APs (pixie dust attack). | Not available yet, but will be ported over soon. This is all I know of so far. For more information about your modules, check out the Nano/tetra modules thread here. I'll try to keep this updated if my focus stays focused. There are a ton of great videos in these forums so use the search and as always, Keep Practe.
  6. Hey guys, Just got my BB the other day and loving it! I noticed I had a couple problems initially after running some custom scripts. It looks like it was due to locale and/or timezone not being set correctly. Are there any best practices that should be used when using the BB (aside from Wiki and other BB references)? I know @Darren Kitchen says the whole point is to be more 'drag and drop' and less confusing. Errring on the side of making this more complicated (because why not) - so I guess this question is two part... 1. Aside from running the install.sh - should we set locale, timezone, keyboard layout? If so, how far should we go into customizing this (like .bachrc_history size) and other nerd things without breaking the functionality? By customization, I'm thinking something sort of "raspi-config(ish)" for the BB and the settings changed there. I'd be interested in creating a BB-config similar to raspi-config if things don't break. 2. Riding on #1 - can the hostname of the BB be changed without affecting how it operates? I assume so since most scripts use the host variable.... -------------------- UNRELATED - Curious if normal behaviour: After running a QuickCreds (SW#2) on my Win10 machine - I removed the BB, put into ARMING, deleted payload from SW#2, put BB back into Win10 on SW#2 (to share internet), and noticed that the BB got a 192.168.100.1 address instead of a 172.16.32.x? Currently on a 10.x.x.x network. I tried to SSH in as I usually do and it wouldn't take the credentials... weird.
  7. Good Morning all, I have upgraded to the new Codename Buffalo Bulldozer release and have been running into some issues using PineAP. With the settings as Allow Associations, Log Probes, Log Associations, PineAP Daemon: Enabled, Capture SSIDs to Pool, Beacon Response and Beacon Response Interval set to Aggressive I have not been able to get clients to connect as before with the previous release, before these settings would work flawlessly and any device not connected to wifi but beaconing would be added to the SSID Pool and connected as a client. Now I am unable to get any automatic associations, matter of fact for the last two days I have been working with the new firmware I have yet to get any ( I have three devices set up probing right next to the Pineapple). It doesn't even seem to be reading the Probes but sporadically and even then its two at max. Just wondering if anyone else is having these issues? Also the Save active config as default dose not seem to be working as before, with the same settings annotated above every time I start up the NANO PineAP is Disabled... The previous version fired right up into the settings I needed. Thanks in advance for the support Oh and not to pile too much into one post but I have had the Recon hang at 100% again, I hope these issues are user error lol since the release directly addressed this issue.
×
×
  • Create New...